This invention relates to the authorisation of online transactions. In particular, the invention relates to a method and system for conducting authorisation of batched transactions from a mobile device.
A significant number of commercial transactions are currently being conducted by way of online commerce. In particular, electronic bank payments have become the preferred way of conducting payments between transacting parties. Organisations and individuals alike conduct large numbers of banking transactions by way of online banking on a recurring, mostly monthly, basis, some of these transactions representing recurring payments and others once-off or intermittent payments.
As a result of the proliferation of online security breaches and, in particular, fraudulent transactions resulting from the breach of security measures to protect personal account information, various systems have been put in place to safeguard account owners against fraudulent transacting being conducted on their accounts. One such safeguard is a system by way of which each transaction that is requested against an account has to be independently verified by a trusted or authorised account user other than the user that has loaded the transaction details against the account. So, for example, a first individual may load payment transactions against an account, but the transactions will not be allowed to be processed before a second authorised account user has independently reviewed and authorised each of the transactions. Depending on the size of an organisation, the number of transactions that may be pre-loaded against an account and waiting to be authorised may be substantial.
In the case of personal bank accounts, a user may wish to load a number of different transactions during a single session, all of which are to be processed in a single “batched” transaction.
In order to authorise pre-loaded batched transactions, or load and process batched transactions on a bank account, the authorising user typically has to log onto the account with the bank through a secure online web portal. During the logon procedure the user is sent an out of band verification request, typically in the form of a verification code that has to be entered into the online portal, which has to be complied with to gain access to the account. Once access has been gained the authorised user is, in the majority of countries, allowed to authorise the pre-loaded batched transactions in batches, or load and process batched transaction without having to re-enter verification codes. To the applicant's knowledge it is not, however, possible to conduct bulk authorisations of pre-loaded transactions from the authorised user's mobile device, as mobile devices are subjected to stricter security requirements due to increased complexity in securing online communications conducted from them.
In some countries, however, the user may not be allowed to authorise more than one pre-loaded transaction or load and process more than one transaction while being logged in with the same out of band verification credentials. In these countries the user will typically be sent a new verification request for each transaction that has to be authorised or loaded and processed, as the case may be. This places an undesirable administrative burden on the user.
In the remainder of this specification the term “mobile device” should be interpreted to include any mobile communications device capable of communicating over a communications network, such as a cellular network, and having at least a limited amount of processing power. The term should be interpreted to specifically include all mobile or cellular phones but may also include tablet computers and the like.
Embodiments of the invention provide a method for conducting batched transaction authorisations, the method being conducted at an authentication server and including the steps of:
Further features provide for the method to include the steps of receiving the batched transaction list as part of an authentication request from an online transaction host which hosts the account; and transmitting the verified authorisation results, individually or as a batched message, to the online transaction host upon completion of the verification.
A further feature provides for the unique digital certificate resident on the mobile device to have been previously issued to the mobile device by a trusted certificate authority.
The invention also provides a method of authorising batched transactions from a mobile device of an authorised user of an account, the method being conducted on the mobile device and including the steps of:
Further features provide for the step of displaying the details of the transactions to include displaying them on a touch-operated display of the mobile device; for the step of receiving the user input to include receiving a finger swipe by the user over the designated area displaying the transaction details, a finger swipe in a first direction indicating an approval of the transaction and a finger swipe in a second, preferably opposite direction indicating a rejection of the transaction; and transmitting the signed authorisation messages or batched transaction authorisation message, as the case may be, to the authorisation server upon receiving a completion confirmation input from the user.
A still further feature provides for the step of receiving the user input to include receiving a press-and-hold input by the user over a designated area on the touch-operated display, the press-and-hold input indicating an approval of all the transactions displayed on the display at that time or, alternatively, all the transaction included in the batched transaction list.
A further feature provides for the unique digital certificate to have previously been issued to the mobile device by a trusted certificate authority.
The invention still further provides a system for conducting batched transaction authorisations, comprising:
receive a batched transaction list including details of multiple transactions loaded against the account and awaiting authorisation from the online transaction host; establish a secure connection with the mobile device or an application operating on it using the mobile device digital certificate; transmit the batched transaction list to the mobile device over the secure connection;
and to receive signed authorisation messages relating to two or more of the transactions from the mobile device over the secure connection, either individually or as a batched transaction authorisation.
A further feature provides for the digital certification to have been previously issued to the mobile device by a trusted certificate authority.
Further features provide for the batched transaction authorisation message to include a positive or negative authorisation result in respect of two or more of the transactions in the batched transaction list; and for each authorisation result to have been individually signed a private key associated with the unique digital certificate of the mobile device.
A still further feature provides for the mobile device to have an application operating on it which is configured to: establish the secure connection with the authentication server; receive the batched transaction list over the secure connection; display the details of two or more of the transactions in the batched transaction list on a display of the mobile device, each in a designated area of the display; receive input from the user indicating an approval or rejection of two or more of the displayed transactions; store each approval or rejection of a transaction as an authorisation result; individually sign each authorisation result with the private key associated with the unique digital certificate; batch the individually signed authorisation results in the batched transaction authorisation message; and transmit the batched transaction authorisation message to the authentication server over the secure connection.
Yet further features provide for the application to be further configured to identify a finger swipe by the user over the designated area displaying the transaction details as the input and to identify a finger swipe in a first direction as an approval of the transaction and a finger swipe in a second, preferably opposite direction as a rejection of the transaction.
The invention also provides a computer program product for conducting batched transaction authorisations, the computer program product comprising a computer-readable storage medium having computer-readable program code configured to:
The invention also provides a computer program product for conducting batched transaction authorisations, the computer program product comprising a computer-readable storage medium having computer-readable program code configured to:
Further features provide for the computer program product to comprise a non-transient computer-readable storage medium.
In order for the invention to be more fully understood, implementations thereof will now be described with reference to the accompanying drawings.
The patent or application file contains at least one drawing executed in color. Copies of this patent or patent application publication with color drawing(s) will be provided by the Office upon request and payment of the necessary fee.
In the drawings:
A system (1000) for conducting batched transaction authorisations according to an embodiment of the invention is shown in
The system (1000) further includes an authentication server (1060) with which the transaction host (1010) as well as a mobile device (1070), in this example a mobile phone, of the user (1020) is registered. During registration of the user's mobile device (1070) with the authentication server (1060), an application is installed on the mobile device (1070) and a unique digital certificate (1080) containing a private (not shown) and public key (1090) pair is issued to the mobile device (1070). As with all standard Public Key Infrastructure (PKI) protocols, the private key associated with the certificate (1080) is only known to the mobile device (1070) and the associated public key (1090) is available for verification purposes to third parties. The digital certificate (1080) is resident on the mobile device (1070), preferably stored in a secure storage location on the device. The authentication server (1060) also holds a database (1100) in which identifiers and other details of registered users are stored. The authentication server (1060) is configured to establish a secure connection (1110) with the mobile device (1070) application over a telecommunication network using the digital certificate (1080).
A block diagram (2000) of a method of using the system (1000) of
The user (1020) is then presented on the web interface with a list (4000) of the loaded transactions (4010) as shown in
At step (2030), the transaction host (1010) sends an authorisation request including the batched transaction list to the authentication server (1060). The authorisation request also includes an identifier of the authorised user tasked with authorising the batched transactions. At step (2040), the authentication server (1060) looks up the identifier in the database (1100) of registered users and, if found, establishes a secure connection (1110) with the application on the mobile device (1070) of the identified user at step (2050). The secure connection is established by way of mutual handshakes and certificate and/or other key exchanges between the authentication server (1060) and mobile phone application. Once the secure connection (1110) has been established, the authentication server (1060) transmits the batched transaction list to the application over the secure connection at step (2060), which in turn displays it on the display (1120) of the mobile device (1070) at step (2070), as shown in
At step (2080), an icon (5020) on the display instructs the user to provide an input in respect of each transaction to either approve or reject the transaction. By swiping his or her finger across the designated area (5010) of an applicable transaction from left to right, the user indicates that the transaction is approved. By swiping his or her finger over the designated area (5010) of a transaction from right to left, the user indicates that the transaction is rejected. Alternatively, a user may press and hold anywhere on the display, or on an indicated designated area, for a predetermined amount of time to accept all of the displayed transactions as indicated by a second icon (5030). The approval or rejection of each transaction (5000) is stored in an authorisation result and, upon receiving the approval or rejection instruction, the applicable transaction is highlighted in a corresponding colour as shown in
At a next step (2090), and as shown in
Upon receiving confirmation of the authorisation of the transactions, the application individually signs each of the authorisation results with the private key associated with the mobile device digital certificate (1080) at step (2100), and transmits the signed authorisation results back to the authentication server (1060) over the secure connection (1110), either individually or as a batched transaction authorisation message at step (2110). The authentication server (1060) in turn transmits the batched transaction authorisation message back to the transaction host (1010) server at step (2120), which is then able to validate the authenticity of the individually signed authorisation messages using the mobile device certificate public key (1090), and process the approved transactions at step (2130). Finally, at step (2140), the transaction server displays the results of the authorisation process to the user (1020) on the web interface as shown in
The system and method of the invention therefore makes it possible for an online transaction host such as a bank, to enable authorised users to unambiguously authorise batched transactions from their mobile devices. With the use of the authentication server the transaction host is assured that the user authorising the transaction is who he or she purports to be and therefore alleviates the need to initialise new verification requests in respect of each transaction that has to be authorised.
It is foreseen that the public/private key pair can be generated by the phone in cases where it has sufficient processing power to enable it to do so, or it can be issued to the phone by an independent certificate authority at a prior enrollment step.
Any of the steps, operations, or processes described herein may be performed or implemented with one or more hardware or software modules, alone or in combination with other devices. In one embodiment, a software module is implemented with a computer program product comprising a computer-readable medium containing computer program code, which can be executed by a computer processor for performing any or all of the steps, operations, or processes described.
Although in the above description, a mobile phone has been used as an example of a mobile device, it would be appreciated that any other mobile device may be used, including, but not limited to, a tablet computer, a personal digital assistant, or the like.
Furthermore, the exact method or process steps described, as the case may be, do not all have to occur in the order described. A key aspect of the described invention is the fact that each authorisation result pertaining to the batched transaction list is individually signed by the application resident on the mobile device, and transmitted back to the authentication server.
The computing device (9000) may include subsystems or components interconnected via a communication infrastructure (9005) (for example, a communications bus, a cross-over bar device, or a network). The computing device (9000) may include at least one central processor (9010) and at least one memory component in the form of computer-readable media.
The memory components may include system memory (9015), which may include read only memory (ROM) and random access memory (RAM). A basic input/output system (BIOS) may be stored in ROM. System software may be stored in the system memory (9015) including operating system software.
The memory components may also include secondary memory (9020). The secondary memory (9020) may include a fixed disk (9021), such as a hard disk drive, and, optionally, one or more removable-storage interfaces (9022) for removable-storage components (9023).
The removable-storage interfaces (9022) may be in the form of removable-storage drives (for example, magnetic tape drives, optical disk drives, floppy disk drives, etc.) for corresponding removable-storage components (for example, a magnetic tape, an optical disk, a floppy disk, etc.), which may be written to and read by the removable-storage drive.
The removable-storage interfaces (9022) may also be in the form of ports or sockets for interfacing with other forms of removable-storage components (9023) such as a flash memory drive, external hard drive, or removable memory chip, etc.
The computing device (9000) may include an external communications interface (9030) for operation of the computing device (9000) in a networked environment enabling transfer of data between multiple computing devices (9000). Data transferred via the external communications interface (9030) may be in the form of signals, which may be electronic, electromagnetic, optical, radio, or other types of signal.
The external communications interface (9030) may enable communication of data between the computing device (9000) and other computing devices including servers and external storage facilities. Web services may be accessible by the computing device (9000) via the communications interface (9030).
The external communications interface (9030) may also enable other forms of communication to and from the computing device (9000) including, voice communication, near field communication, Bluetooth, etc.
The computer-readable media in the form of the various memory components may provide storage of computer-executable instructions, data structures, program modules, and other data. A computer program product may be provided by a computer-readable medium having stored computer-readable program code executable by the central processor (9010).
A computer program product may be provided by a non-transient computer-readable medium, or may be provided via a signal or other transient means via the communications interface (9030).
Interconnection via the communication infrastructure (9005) allows a central processor (9010) to communicate with each subsystem or component and to control the execution of instructions from the memory components, as well as the exchange of information between subsystems or components.
Peripherals (such as printers, scanners, cameras, or the like) and input/output (I/O) devices (such as a mouse, touchpad, keyboard, microphone, joystick, or the like) may couple to the computing device (9000) either directly or via an I/O controller (9035). These components may be connected to the computing device (9000) by any number of means known in the art, such as a serial port.
One or more monitors (9045) may be coupled via a display or video adapter (9040) to the computing device (9000).
The mobile device (10000) may include a processor (10005) (e.g., a microprocessor) for processing the functions of the mobile device (10000) and a display (10020) to allow a user to see the phone numbers and other information and messages. The mobile device (10000) may further include an input element (10025) to allow a user to input information into the device (e.g., input buttons, touch screen, etc.), a speaker (10030) to allow the user to hear voice communication, music, etc., and a microphone (10035) to allow the user to transmit his or her voice through the mobile device (10000).
The processor (10005) of the mobile device (10000) may connect to a memory (10015). The memory (10015) may be in the form of a computer-readable medium that stores data and, optionally, computer-executable instructions.
The mobile device (10000) may also include a communication element (10040) for connection to communication channels (e.g., a cellular telephone network, data transmission network, Wi-Fi network, satellite-phone network,
Internet network, Satellite Internet Network, etc.). The communication element (10040) may include an associated wireless transfer element, such as an antenna.
The communication element (10040) may include a subscriber identity module (SIM) in the form of an integrated circuit that stores an international mobile subscriber identity and the related key used to identify and authenticate a subscriber using the mobile device (10000). One or more subscriber identity modules may be removable from the mobile device (10000) or embedded in the mobile device (10000).
The mobile device (10000) may further include a contactless element (10050), which is typically implemented in the form of a semiconductor chip (or other data storage element) with an associated wireless transfer element, such as an antenna. The contactless element (10050) may be associated with (e.g., embedded within) the mobile device (10000) and data or control instructions transmitted via a cellular network may be applied to the contactless element (10050) by means of a contactless element interface (not shown). The contactless element interface may function to permit the exchange of data and/or control instructions between mobile device circuitry (and hence the cellular network) and the contactless element (10050).
The contactless element (10050) may be capable of transferring and receiving data using a near field communications (NFC) capability (or near field communications medium) typically in accordance with a standardized protocol or data transfer mechanism (e.g., ISO 14443/NFC). Near field communications capability is a short-range communications capability, such as radio-frequency identification (RFID), Bluetooth, infra-red, or other data transfer capability that can be used to exchange data between the mobile device (10000) and an interrogation device. Thus, the mobile device (10000) may be capable of communicating and transferring data and/or control instructions via both a cellular network and near field communications capability.
The data stored in the memory (10015) may include: operation data relating to the operation of the mobile device (10000), personal data (e.g., name, date of birth, identification number, etc.), financial data (e.g., bank account information, a bank identification number (BIN), credit or debit card number information, account balance information, expiration date, loyalty provider account numbers, etc.), transit information (e.g., as in a subway or train pass), access information (e.g., as in access badges), etc. A user may transmit this data from the mobile device (10000) to selected receivers.
The mobile device (10000) may be, amongst other things, a notification device that can receive alert messages and access reports, a portable merchant device that can be used to transmit control data identifying a discount to be applied, as well as a portable consumer device that can be used to make payments.
The foregoing description of the embodiments of the invention has been presented for the purpose of illustration; it is not intended to be exhaustive or to limit the invention to the precise forms disclosed. Persons skilled in the relevant art can appreciate that many modifications and variations are possible in light of the above disclosure.
Some portions of this description describe the embodiments of the invention in terms of algorithms and symbolic representations of operations on information. These algorithmic descriptions and representations are commonly used by those skilled in the data processing arts to convey the substance of their work effectively to others skilled in the art. These operations, while described functionally, computationally, or logically, are understood to be implemented by computer programs or equivalent electrical circuits, microcode, or the like. Furthermore, it has also proven convenient at times, to refer to these arrangements of operations as modules, without loss of generality. The described operations and their associated modules may be embodied in software, firmware, hardware, or any combinations thereof.
The software components or functions described in this application may be implemented as software code to be executed by one or more processors using any suitable computer language such as, for example, Java, C++, or Perl using, for example, conventional or object-oriented techniques. The software code may be stored as a series of instructions, or commands on a non-transitory computer-readable medium, such as a random access memory (RAM), a read-only memory (ROM), a magnetic medium such as a hard-drive or a floppy disk, or an optical medium such as a CD-ROM. Any such computer-readable medium may also reside on or within a single computational apparatus, and may be present on or within different computational apparatuses within a system or network.
Any of the steps, operations, or processes described herein may be performed or implemented with one or more hardware or software modules, alone or in combination with other devices. In one embodiment, a software module is implemented with a computer program product comprising a non-transient computer-readable medium containing computer program code, which can be executed by a computer processor for performing any or all of the steps, operations, or processes described.
Finally, the language used in the specification has been principally selected for readability and instructional purposes, and it may not have been selected to delineate or circumscribe the inventive subject matter. It is therefore intended that the scope of the invention be limited not by this detailed description, but rather by any claims that issue on an application based hereon. Accordingly, the disclosure of the embodiments of the invention is intended to be illustrative, but not limiting, of the scope of the invention, which is set forth in the following claims.
Number | Date | Country | Kind |
---|---|---|---|
201304765 | Jun 2013 | ZA | national |