Cardless challenge systems and methods

Information

  • Patent Grant
  • 11481742
  • Patent Number
    11,481,742
  • Date Filed
    Monday, February 25, 2019
    5 years ago
  • Date Issued
    Tuesday, October 25, 2022
    2 years ago
Abstract
Systems, methods, and apparatus for handling and/or authorizing payment requests by a consumer for a transaction are provided. Challenge questions may be presented from the non-merchant to the consumer after receiving the payment information, thereby allowing a Judicious determination of when to ask such challenge questions and allowing complex and probative questions. The time limit for such challenge questions may advantageously be unconstrained, while still preserving security. Also, a risk analysis may be started prior to the consumer submitting payment information, thus showing an efficient and complex risk analysis. Information about an access device used by the consumer may be obtained at the non-merchant from the access device with code sent to the access device from the merchant, and the device information may be used in the risk analysis.
Description
BACKGROUND

The present application is generally related to payment transactions, and more specifically to handling and/or authorizing payment requests by a consumer for a transaction.


Many Internet transactions are performed using credit, debit, or other type of account number. If an unauthorized person is able to obtain the account number or other information used in a transaction, the account may be compromised. The result may be unauthorized withdrawals or charges made by the unauthorized person. Most fraud occurs because of compromised merchants and acquirers who have received the account information during the transaction.


Although other systems attempt to prevent the merchant from obtaining the account number, such implementations require enrollment and extensive infrastructure changes. For example, in Google Checkout, a merchant must write new code to interface with a new entity, i.e. Google. Many additional requests and receiving of responses are added to the infrastructure of the merchant web site, e.g., via a plug-in. The merchant also needs to configure settings for the checkout, or monitor a merchant page in order to track an order. The merchant also has to cross-reference its order number with a unique identification number generated by Google. Also, the consumer needs to enrolls with Google to obtain the benefit of the Google Checkout procedure. All of these and other steps require a lot of work by the merchant and consumer, and at a minimum frustrate the adoption of Google Checkout, along with the lack of other features.


Additionally, additional steps may be performed to protect a card that is compromised, stolen, or is being used without proper authorization of the cardholder. Prior methods attempt to authenticate the consumer in order to prevent security risks, such as fraud. However, such attempts have met with limited success. With the burgeoning growth of e-commerce and transactions conducted online, opportunities for payment card theft have become more readily available. As a result, online payment card fraud has also accordingly increased over the last few years. Despite many prevention efforts, payment card fraud continues to account for annual losses in the range of hundreds of millions of dollars. In addition to losses incurred due to payment card fraud, transactions lost due to false-positive declines (i.e., transactions that are incorrectly identified as fraudulent) also annually cost merchants and issuers hundreds of millions of dollars in sales.


Furthermore, existing industry solutions that combat payment card fraud tend to be account- and issuer-oriented. In other words, individual issuers may employ different solutions to detect fraudulent activities on their respective accounts and detection is at a single account level. As a result, payment card fraud that occurs across multiple accounts from multiple issuers often goes undetected. For example, it would be difficult for an individual issuer to determine that an usually high number of payment cards used at a particular merchant have been compromised and subject of fraud, since the fraud may only involve a small number of payment cards issued by that individual issuer.


Additionally, a limited time is typically allowed for an authorization to occur after a consumer has initiated the transaction, e.g., submitting a payment request via button on a web page. Thus, mechanisms that are used to authenticate the person, in order to prevent fraudulent activity, have very little time to run. Thus, only very simple mechanisms have been achieved thus far.


Better ways to perform electronic financial transactions and to authenticate consumers, particularly when the consumer is initiating a transaction over the Internet, are desirable. Embodiments of the invention address the above problems, and other problems, individually and collectively.


BRIEF SUMMARY

Embodiments of the present invention provide systems and methods for handling and/or authorizing payment requests by a consumer for a transaction. In one aspect, a challenge question is sent from the non-merchant to the consumer subsequent to receiving from the consumer a consumer message including payment information, which may be done directly. Thereby, additional authentication information may be obtained. Such additional authentication information can be advantageously obtained when appropriate, and highly probative questions may be utilized, thereby providing greater security than previously available. In one embodiment, only after the challenge period would the non-merchant authorize or send an authorization request to an issuer or send payment information to another entity, thus the time limit of the authorization request does not limit the challenge period. The result of the authorization may then be sent to the merchant as in conventional methods, thus not requiring the merchant to alter any other mechanisms or parts of its infrastructure.


In another aspect, a non-merchant server initiates a risk analysis prior to the consumer submitting payment information and calculates a first risk score based on the risk analysis. In this manner, a more efficient and/or complex risk analysis procedure may be implemented. In one embodiment, challenge questions are presented to the consumer depending at least partially on the first risk score.


In yet another aspect, the merchant serves an application (e.g. Web) page to the consumer, where the page includes code that sends device information from the consumer to the non-merchant. The device information may be advantageously used to begin a risk analysis in anticipation of receiving payment information from the consumer.


As used herein, the term “directly” can mean that the contents of a message are not viewed by another entity during the path between the stated sender and receiver of the message. A direct transmission via a network, such as the Internet, will probably be sent through routers on its way to the receiver from the sender; however, such a transmission is still direct. Although the message may be routed by a routing server that is part of the internet backbone, such a server does not view the contents. Also, as used herein, the term “server” can refer to a computing system of one or more computers and network inputs and/or outputs that act as portals for a local network to a larger (wider) network, such as the Internet. Also, as used herein, the term “based on X” can mean that an analysis, result, or ether determination uses X in a calculation but that other factors may also be used. Also, as used herein, the term “application page” may be a web page, a local page (e.g. a window) of an application running on a PCS terminal, or any other window, screen, or page through which an application receives, sends, or displays information to a consumer, including via text messages.


Other embodiments of the invention are directed to systems, portable consumer devices, and computer readable media associated with the above-described methods.


These and other embodiments of the invention are described in further detail below with reference to the Figures and the Detailed Description.





BRIEF DESCRIPTION GF THE DRAWINGS


FIG. 1 shows a block diagram of a system 20 according to an embodiment of the invention.



FIG. 2 shows a block diagram of one type of portable consumer device.



FIG. 3 shows a plan view of a second type of portable consumer device.



FIG. 4 shows a block diagram for a method 400 illustrating the flow of data during a transaction according to an embodiment of the present invention.



FIG. 5 shows a screen shot of a checkout page 500 according to an embodiment of the present invention.



FIG. 6 shows a block diagram of a method 600 illustrating the flow of data during a transaction where transaction information is sent from the access device to the payment processing network 26 according to another embodiment of the present invention.



FIG. 7 shows a block diagram for a method 700 illustrating the flow of data during a transaction where challenges are presented to the consumer according to an embodiment of the present invention.



FIG. 8 shows a screen shot of a checkout page 800 used for presenting challenge questions to a consumer according to an embodiment of the present invention.



FIG. 9 shows a block diagram for a method 900 illustrating the How of data during a transaction where a type of payment information is sent to the merchant 22 from the payment processing network 26 according to an embodiment of the present invention.



FIG. 10 shows a block diagram for a method 1000 illustrating the flow of data during a transaction where a type of payment information is sent to an acquirer 24 from the payment processing network 26 according to an embodiment of the present invention.



FIG. 11 shows a block diagram of an exemplary computer apparatus usable with system and methods according to embodiments of the present invention.





DETAILED DESCRIPTION

Embodiments of the present invention provide systems and methods for handling and/or authorizing payment requests by a consumer for a transaction. Challenge questions may be presented from the non-merchant to the consumer after receiving the payment information, thereby allowing a judicious determination of when to ask such challenge questions and allowing for the possibility of asking more complex and probative questions. The time limit for such challenge questions may not be constrained. Also, a risk analysis may be started prior to the consumer submitting payment information, thus allowing an efficient and complex risk analysis. Information about an access device used by the consumer may be obtained at the non-merchant from the access device with code sent to the access device from the merchant, and the device information may be used in the risk analysis.


I. System and Challenge Overview


FIG. 1 shows an exemplary system 20 according to an embodiment of the invention. Other systems according to other embodiments of the invention may include more or less components than are shown in FIG. 1.


The system 20 shown in FIG. 1 includes a merchant 22 and an acquirer 24 associated with the merchant 22. In a typical payment transaction, a consumer 30 may purchase goods or services at the merchant 22 using a portable consumer device 32. The merchant 22 could be a physical brick and mortar merchant or an e-merchant. The acquirer 24 can communicate with an issuer 28 via a payment processing network 26. The consumer may interact with the payment processing network 26 and the merchant through an access device 34, such as a point of sale (POS) terminal, personal computer, and a mobile phone. The merchant 22 may also have, or may receive communications from, an access device 34 that can interact with the portable consumer device 32, such as a debit card, credit card, smartcard, and a mobile phone.


In one aspect, communications to/from the merchant 22 are provided by one or more servers. A server may be any computer device that is connected to the communication channels provided. As used herein, the term merchant may be used interchangeably with a merchant server. Similar communications involving the acquirer and issuer may also use a server.


As shown in FIG. 1, the payment processing network 26 may comprise a server 26(a), which may comprise a challenge question engine 26(a)-1. The server 26(a) may also be in communication with a transaction history database 26(b) and a challenge question database 26(c), The challenge question engine 26(a)-1 may simply extract challenge questions from the challenge question database 26(c). Alternatively or additionally, the challenge question engine 26(a)-1 may generate challenge questions using information in the transaction history database 26(b).


The challenge questions may be static or dynamic in nature, as is described in U.S. patent application Ser. No. 11/763,240, fled on Jun. 14, 2007 entitled “CONSUMER AUTHENTICATION SYSTEM AND METHOD,” which is incorporated by reference in its entirety for all purposes. For example, the challenge question engine 26(a)-1 may receive an authorization request message, for example, in response to a consumer's request to purchase goods. It may thereafter retrieve suitable questions from the challenge question database 26(c) or may generate suitable challenge questions on its own. For instance, in some cases, the challenge question engine 26(a)-1 may retrieve the question “What is your mobile phone number?” from the challenge question database 26(c) after receiving an authorization request message from a particular consumer. Alternatively, the challenge question engine 26(a)-1 may generate a dynamic question such as “Did you use this credit card at McDonald's last night?” The information pertaining to the particular restaurant that the consumer 30 was at the preceding day could be retrieved horn the transaction history database 26(b).


The challenge question database 26(c) may be populated with questions of any suitable type. The questions may relate to a past location (e.g., the consumer's current home, the city that the consumer recently visited) or current location (e.g., the current location of the store that the consumer is currently at), the type or name of the merchant that the consumer is presently visiting or has visited in the past, the consumer's family or personal data (e.g., name, phone number, social security number, etc.), etc. The questions in the challenge question database 26(c) may be generated by the challenge question engine 26(a)-1 and subsequently stored in the challenge question database 26(c). As will be described later, the challenge question engine 26(a)-1 may determine whether to ask a question and which questions to ask based on device information received from the access device 34 and/or the selection of items to purchase, or type of transaction involved.


Alternatively, or additionally, the challenge questions may be generated from an external source and then subsequently stored in the challenge question database 26(c), For example, the consumer 30 may use a browser on a personal computer or the like to supply specific challenge questions to the server 26(a) via a communication medium (not shown) such as the Internet.


In some embodiments, a consumer may determine the kinds and/or quantity of challenge questions to ask himself or herself. For example, the consumer may specify that the consumer wants to be asked three challenge questions if the consumer visits a jewelry store, but only one question if the consumer visits a fast food restaurant. The types of questions posed by the consumer may be based on the merchant type, frequency of purchasing, etc. Some concepts relating to user defined authorization parameters are described in U.S. patent application Ser. No. 10/093,002, filed on Mar. 5, 2002, which is herein incorporated by reference in its entirety for all purposes.


In preferred embodiments, the challenge questions are derived from past transaction data in the transaction history database 26(b). The consumer 30 may conduct many, many transactions with the payment processing network 26 (and/or the issuer 28) over time. This consumer transaction information may be stored in the transaction history database 26(b) over time, and challenge questions may be generated using the transaction information. The past transaction information provides a good basis for authenticating the consumer 30, since the consumer 30 will know about what transactions that the consumer 30 has conducted in the past. For example, the consumer 30 may have used his credit card to pay for a hotel room in New York the previous day, and on the next clay may be asked a question such as “Did you stay at a hotel in New York yesterday?” In another example, the consumer 30 may have purchased an item that is more than $2000 the day before, and on the next day may be asked “Did you make a purchase for more than $2000 yesterday?” The questions/answers that are presented to the consumer 30 may be free form in nature and/or may include pre-formatted answers such as multiple choice or true-false answers from which the user may select.


The description below describes a process where the consumer 30 buys an item over the internet through a personal computer, e.g. at home or at work. However, in other embodiments the consumer may use an access device at the merchant 22 to select the item, much in the same way as on the Internet. For example, a consumer 30 may obtain items and scan them in to make the selection. In one embodiment, the application page (e.g. a web page) would then already be at the access device and thus would not need to be sent. The scanning device could also communicate with a consumer's phone, where either can communicate with the merchant 22, and the payment processing network 26.


II. Secure and Convenient Transactions

Methods according to embodiments of the invention can be described with reference to FIGS. 1 and 4. In a typical purchase transaction, the consumer 30 initiates a purchase of a good or service at a merchant server 22 (e.g. through a merchant's website) using a portable consumer device 32 such as a credit card.



FIG. 4 shows a block diagram for a method 400 illustrating the flow of data during a transaction according to an embodiment of the present invention. In step 401, the stems and the type of payment method are selected by the consumer 30. As part of a checkout request, this information is sent from the access device 34 to the merchant server 22, also referred to as the merchant. For example, the consumer 30 picks the stock-keeping unit (SKU) number of items desired. In this example, the access device 34 may be a point of sale (PCS) terminal at the merchant 22.


In a pure Internet commerce transaction embodiment, the consumer 30 has selected the items on a merchant's website by placing them in a shopping basket or similar part of the merchants website. The consumer 30 is then offered various payment options (also termed payment mechanism options herein). Then, once the consumer selects a particular payment option such as a particular credit card (e.g. VISA, MasterCard, American Express, or Discover), the above information (i.e., shopping basket information, and credit card information) is sent to the merchant 22.


In a POS (point of sale) terminal example, a consumer 30 may scan in items at a checkout kiosk. This effectively fills up a virtual shopping basket. The consumer 30 can then select a type of payment by making a selection on a display screen associated with the PCS terminal. Alternatively, the consumer 30 may initiate a payment with the portable consumer device 32, for example, by swiping a card through an appropriate slot in the POS terminal. In another example, the PCS terminal may be a contactless reader, and the portable consumer device 32 may be a contactless device such as a contactless card. The POS terminal can then identify the payment type and send in Formation regarding the type of transaction to the merchant 22.


In step 402, the merchant server 22 sends transaction information to the payment processing network 26 or other non-merchant entity. The transaction information may be sent in a transaction message. In one aspect, a server of the payment processing network 26 receives the transaction information, as well as other messages and receiving other messages mentioned herein.


The transaction information includes a merchant identification (ID), an amount of the transaction, and a correlation ID, which ties together messages associated with the same transaction. The correlation ID may be the same ID that the merchant normally uses internally to track a transaction, which is advantageous, since the merchant 22 does not have to create any additional infrastructure. The merchant 22 creates a message and sends it (Method=“POST”) to the payment processing network 26 in a process via a communication channel that is different than the communication channel that exists between the access device 34 and the merchant 22. Optionally, information relating to the items (e.g. SKU) selected may also be sent as part of the transaction info.


Note that this step typically involves sending credit card information from the merchant 22 to the payment processing network 26. However, it is not necessary to do this at this point, particularly in embodiments where the merchant 22 does not receive the credit card information. For example, in some cases, only information related to the shopping basket is sent. This information may just be the amount of the transaction, but also may include information about the items selected, which may be used to select challenge questions as described below. For example, an item being purchased may be an item that the consumer 30 does not normally purchase and/or the merchant 22 may have a reputation for being a risky merchant (e.g., past fraud has been associated with the merchant).


In step 403, a checkout page, or other type of application page, with a mapping to the payment processing network 26 is sent to the access device 34. The page may be sent in response to the consumer 30 selecting an option to check out with the items selected in the virtual shopping cart. In one embodiment, the merchant 22 serves a checkout page to the consumer 30, where the checkout page has a “Submit Payment” button (or other mapping element) that has a destination address mapped to the payment processing network 26 The destination address can be mapped to one or many computer apparatuses in the payment processing network 26.


In step 404, payment information is sent from the access device 34 to the payment processing network 26 or other non-merchant entity. The payment information may be sent via a consumer message from the access device, which may be done by any suitable protocol. A consumer message may be any message sent from the consumer via any device used by the consumer (e.g. access device 34).


The payment information includes account information (such as the account number or other account identifier) of the consumer's account to be used for the transaction, and may include other numbers such as the credit card verification (CCV) number. In one embodiment of the invention, the payment information is obtained from the consumer entering data into the checkout page. A purpose of sending the identified consumer account is so that the account may be used as a funding source for the transaction, e.g., to buy selected items or otherwise send money to another individual or business.


In another embodiment of the invention, the payment information is obtained from the consumer 30 initiating the transaction with the portable consumer device 32, for example, at a POS terminal (acting as the access device 34). Similarly, for this transaction, the destination of the account information is the payment processing network 26. The access device 34 can be programmed to permanently erase the account information once the transaction is complete.


As the account information is advantageously not sent to the merchant 22, there is not a risk of a security breach at the merchant 22, which can cause a compromise in consumer's information (e.g., credit card information).


In one embodiment, the receiver of the account information (i.e. non-merchant, payment processing network 26) already is aware of the account information. In one aspect, the credit card is created at least partially through or in cooperation with the entity that administers or runs the payment processing network 26 (e.g. a credit card provider). For example, the payment processing network 26 may create a portion of the account identifier as a Bank Identification Number (BIN) that is associated with the issuer 28. Accordingly, during the transaction, no new entities may become aware of the account information, and the account information is held by a minimum number of entities. In another embodiment, the payment processing network 26 can perform clearing and settlement services. In yet another embodiment, the payment processing network 26 is able to send the account information directly to the issuer 28.


In step 405, an authorization request message is sent from payment processing network 26 to the issuer 28. Note that the merchant 22 does not provide an authorization request message in the example shown. In step 406, the issuer 23 responds to the authorization request, which was initiated by the payment processing network 26.


In step 407, the payment processing network 26 creates and sends a status message, which contains the correlation ID and the status of the transaction, e.g., whether or not the transaction is a success (with receipt) or failure. Accordingly, the merchant server 22 does not see the account information in this embodiment. In some embodiments, the status information may also include the transaction amount and/or items to be purchased, e.g., when the merchant 22 has not received this information yet. The status message is one type of a funding message that is sent from the payment processing network 26 to the merchant server 22. A funding message may be any message sent from a non-merchant server (such as payment processing network 26) to a merchant server 22.


Normally, in a conventional transaction, the merchant 22 would receive an authorization response from the acquirer 24, which would be in response to the merchant 22 sending an authorization request message after receiving the payment information. In the embodiment of FIG. 4, the merchant 22 still receives an authorization response message in the form of the status information. The merchant 22 has the convenience of still using this same mechanism after it has matched the correlation ID with the items selected, thus providing simple mechanisms for merchants to adopt more secure methods of conducting transactions.


In step 408, a receipt or confirmation of the transaction may be sent to the consumer 30. As shown, the receipt is sent from the merchant 22 to the consumer 30. In another embodiment, the payment processing network 26 may also send the consumer 3D the receipt.


Specific embodiments of how the payment information is directed to the payment processing network 26 will now be described.


III. Adoption of Secure Transactions

It is desirable to make it easy for merchants and consumers to adopt the secure transaction processes described herein. Unless the parties of the transaction can perform secure transactions with little or no effort on their part, the secure transaction are less likely to be adopted. If the secure transactions are not adopted, fraud cannot be reduced. Accordingly, the embodiments described herein are easy to use and are likely to be adopted.



FIG. 5 shows a screen shot of a checkout page 500 according to an embodiment of the present invention. The checkout page 500 is served to the consumer 30 (e.g., via an access device that the consumer is operating) from the merchant 22 (e.g., from a merchant's web server). This may occur after the consumer 30 has selected items and activated a general checkout button (checkout request) on the merchant's website or at the merchant's POS terminal. The information relating to the selected items may then be transferred from a previous page to page 500. Thus, page 500 may already have all or some of the items and quantity information filled in. In another example, the page is presented on a POS display and the items are shown once an item is scanned.


The frame 510 of the window 500 shows the selections made by the consumer. For example, the consumer may have chosen 1 set of Golf Clubs, 5 Golf Tees, and 1 pair of Golf Shorts. The quantity and price (Individual and total) for each of the items may be displayed. The frame 520 includes options for selecting the type of payment mechanism desired, such as different types of credit/debit cards or other payment options. The payment frame 530 includes a place to input payment information, such as the name and address of the payee, the account (card) number and a credit card verification number, if applicable. The Submit Payment button 535 causes the payment information to be sent to either the merchant 22 or the payment processing network 26 depending on which payment option was selected. In one embodiment, the payment frame 530 does not appear until the payment type is selected.


When the consumer clicks on the option A 525, the shopping basket information from frame 510 is sent to the merchant 22 as described for step 401. Option A 525 may be a stand alone button as shown, or it may be chosen from a drop-down list or from some other list. When option A 525 is selected, the destination of the payment information when the submit payment button 535 is pressed is the payment processing network 26. Thus, the payment information may be sent directly to the payment processing network 26. The submit payment button 535 and the payment options 525 and 527 are payment objects of the application page.


In one embodiment, the destination of the submit payment button 535 is changed to the payment processing network 26. In another embodiment, the destination of the submit payment button 535 can start out being the payment processing network 26, and thus the destination stays the same. In yet another embodiment, the destination address has no set value and the destination is set to be the payment processing network 26.


Option A 525 may be a single option or it may be a subset of options, e.g., a subset of four different options. In one embodiment, these four options correspond to different payment mechanisms that can be processed by the payment processing network 26. For example, a set of credit cards (such as VISA and MasterCard) may be processed by payment processing network 26.


In one embodiment the destination of the submit payment button 535 is changed by a new payment frame 530 being sent from the merchant 22 to the access device 34. The new payment frame 530 has the “Submit Payment” button 535 with a destination mapped to the network 26. This may be the only change to the frame so that as far as the consumer is concerned, the page has not changed. In another embodiment, the new payment frame 530 may have a different presentation with different fonts, locations to input the payment information, different payment information to enter, and different logos or advertising.


As to changes that are needed to be implemented by the merchant 22, the option A button can have functionality for sending the shopping basket information of frame 510 to the merchant 22. Also, the merchant 22 can have the destination of submit payment 535 changed. The change may be done by sending over a new piece of HTML or other code, or having the destination change dynamically based on code originally sent with the page, when the checkout process was initiated by the consumer 30.


In one embodiment, the new payment frame 530 is sent by the merchant 22 as an IFrame (an HTML element) that points to a location within the payment processing network 26, and the payment frame 530 is served from the payment processing network 28. In this case, the new payment frame 530 is sent from payment processing network 26. For example, once the IFrame is received by the access device 34, it then submits a request to the payment processing network 26 for the display information for the Iframe.


Advantageously, the consumer 30 does not have to enroll into a program or create an account to conduct secure transactions. As noted above, payment information can be sent automatically to the payment processing network 26, even though the consumer 30 does not supply a username and/or password. A secure checkout is automatically performed when the payment option 525 is chosen. Accordingly, it is likely that consumers will adopt embodiments of the invention, since it is easy and convenient to use.


In one embodiment of the invention, as far as the consumer 30 knows, the payment information is still sent to the merchant 22. Thus, this step can be transparent to the consumer. For example, the URL in the browser that is used by the consumer would not change and the rest of the page also would not change. In other words, the change in the destination of the submit payment button 535 can be hidden from the consumer 30, so that the consumer's shopping experience is the same as it has been in the past.


When the consumer 30 selects other options 527, then the transaction may proceed as normal. For example, the destination of the submit payment button 535 would still be directed to the merchant 22. An authorization request message would be sent from the merchant 22, to the payment processing network 26, and back to the issuer 28 in some embodiments. Also, the virtual shopping basket information may not be sent to the merchant 22 when the button 527 is activated, but the virtual shopping basket information may be sent when the submit payment button 535 is pressed.


As mentioned above, the change or selection of the destination of the “submit payment” button 535 may be performed with code sent to the access device 34 operated by the consumer 30 in the initial serving of the page 500. Also, the transmission of the transaction information may be different from method 400.



FIG. 6 shows a block diagram of a method 600 illustrating the flow of data during a transaction where transaction information is sent from the access device 34 to the non-merchant, payment processing network 26 according to another embodiment or the present invention. Method 600 shows other embodiments where the initial checkout page 500 includes code for sending payment information to the network 26 when the option A 525 is chosen and/or where the transaction information is sent from the access device 34 to the payment processing network 26, as opposed to being sent born the merchant 22 to the payment processing network 26.


In step 601, a checkout page (e.g. page 500) is served from the merchant 22 to the access device 34 operated by the consumer 30. The checkout page 500 may have a place for the consumer 30 to select the items or may already have all or some of the item and quantity information filled in, which may be transferred from a previous page. In one embodiment, this checkout page 500 includes logic to select among a plurality of destinations for the payment information to be sent once a submit payment element (e.g. 535) is activated. The selection is based on the payment type selected. This may be done with IF statements, a CASE statement, or similar logic.


In one embodiment of the invention, the payment option A 525 has a destination mapped to the payment processing network 26. Thus, in step 602 at least some of the transaction information is sent to the payment processing network 26 (without first being sent to the merchant 22) when payment option 525 is selected (e.g., clicked). This transaction information includes at least the amount of the transaction, and a merchant ID or merchant identifier. The transaction information may also include a transaction or correlation ID, which was sent by the merchant 22 in page 500 or that was created at the access device 34, e.g., by code embedded in page 500. If the correlation ID is created at the access device 34, then the correlation ID may be sent from the access device 34 to the merchant 22, e.g. in step 603 or in another step.


The payment option A 525 may also have a destination mapped to the merchant server 22 so that the same transaction information is also sent to the merchant server 22 in an optional step 603. If this information is sent to the merchant 525, the, payment frame may be served from the merchant 22 as described in FIG. 4. The payment frame may be of a universal type or the merchant can specify one that is designed to it (e.g. includes branding that it desires). Alternatively, the payment processing network 26 can provide its own branding.


In the embodiment shown in FIG. 8, the web page 500 already includes the IFrame to retrieve the payment page 530 from the network 26. Once the option 525 is chosen, the code In the checkout page 500 automatically knows to obtain a new payment frame 630 from the payment processing network 26.


Thus, in step 604, the payment frame is sent from the payment processing network 26 to the access device 34. This payment frame has a “Submit Payment” element (e.g. 535) directed to the network 26.


Accordingly, in one embodiment, information regarding the payment type is not received by the merchant 22. The page sent to the consumer via the access device 34 when a general checkout is requested may already have a mapping of the submit payment element to payment processing network 22 even though the consumer has not selected the form of payment yet. Once the consumer 30 has selected the payment option A, the link to the payment processing network 26 is established using the mapping that has already been sent. In one aspect, information indicating that the payment network 26 was chosen is sent to the merchant 22.


The rest of the steps of method 600 may be performed as the comparable steps in method 400, or as described herein. For example, step 606 can send an authorization request to issuer 28; step 607 can send hack the authorization response from the issuer 28; and step 608 can send the status information to merchant 22.


in one embodiment, the status information sent in step 608 can include the amount of the transaction and the items selected as the merchant 22 may not be aware of this information if step 603 is not performed. In step 609, a receipt or confirmation of the transaction may be sent to the consumer 30.


In one embodiment, an entity associated with the payment processing network 26 can incentivize the use of embodiments of the invention by providing a discount in a fee charged to the merchant 22 if the merchant 22 uses embodiments of the invention.


IV. Complex Challenges and Risk Analysis

The ability of payment processing network 26 to obtain payment information from the access device 34 and not from the merchant 22 allows challenges to be presented from the payment processing network 26 to the consumer and the types of challenges can be more complex than those previously available. For instance, more time can be made available for challenges, thus allowing more challenges and more specific and complex questions.



FIG. 7 shows a block diagram for a method 700 illustrating the flow of data during a transaction where challenges are presented to the consumer according to an embodiment of the present invention. Method 700 presents a process flow similar to method 400 for the first few steps. However, in other embodiments, the first few steps may be similar to that of method 600 or other methods described herein.


In step 701, the items selected by the consumer 30 and the type of payment method are sent from the access device 34 to the merchant server 22. In step 702, the merchant server 22 sends the transaction information to the payment processing network 26 or other non-merchant entity. In one embodiment the transaction information includes a merchant identification (ID), an amount of the transaction, and a correlation ID, which ties together messages associated with the same transaction. As mentioned above, the payment information may also be sent from the access device 34 directly to the payment processing network 26.


In step 703, a checkout page with a mapping to the payment processing network 26 is sent to the access device 34. This page may be sent in response to the consumer 30 selecting an option to checkout (e.g. a checkout request) with the items selected in the shopping cart. In one embodiment, the merchant 22 serves a checkout page to the consumer, where the checkout page has a “Submit Payment” button that has a destination address mapped to one or more computer apparatuses (e.g., senders) in the payment processing network 26.


In step 704, device information may be obtained. In one embodiment, this occurs before the account information is sent. Device information may include an IP address for the access device 34, an operating system of the access device 34, a private value (such as a hash or other encrypted value) resulting from code running on the access device 34, or any other type of information correlated to a computing device. In one embodiment, the merchant 22 serves a checkout page to the consumer 30, where the checkout page has a “Submit Payment” button mapped to the payment processing network 26, and renders an Iframe for device information collection, with a correlation ID reference. This is discussed in more detail below. In one aspect, when the payment processing network 26 is chosen, the device information is sent and also then the items and amount are sent, either by the merchant 22 or the consumer 30.


In one embodiment, the device information is saved in a database or other storage device accessible to the payment processing network 26. The device information can be stored associated with a particular consumer and/or a particular consumer account. In this manner, the device information for a current transaction can be compared to the device information for previous transaction, which can be used in calculating a risk score as described herein. The database of device information may also include information based on the items that the person has purchased. The information in the database may then be used to deliver an offer to the consumer. For example, if a computer (access device) is known to be of a certain age and the location of the computer is known to be near a particular store, a coupon for that store (possibly targeted specifically for computers) may be sent to the consumer via post mail, e-mail, or mobile application (such as SMS or MMS).


In one embodiment, a merchant ID and the correlation ID are sent when the device information is sent. In one aspect, a specific device server is used in the collection that is different from the server used to verify the transaction.


The device information may also include a user unique ID (UUID), which is not the account number. The device server may also request DMA/pebbles through the user's browser based on the UUID. The device server can then push results to the application tier. The device information may be filled in a local flat activity in, e.g., an XML format.


The use of IFrames allows the device collection to work transparently and to not be compromised by browser controls, such as pop up blockers. In one embodiment, if the device server is not available then a “function not available” message is sent to the application server so that the transaction is not disrupted, thus allowing the user's experience to always be seamless.


In step 705, payment information is sent from the access device 34 to the payment processing network 26 or other non-merchant entity. The payment information includes the account number of the consumer, and may include other numbers such as the credit card verification (CCV) number. As mentioned above, the access device 34 may be a personal computing device (e.g. computer, phone, PDA, etc.) of the consumer 30, or the access device 34 may be associated with a retail establishment such as a POS terminal.


The payment processing network 26 may use the device information or the transaction information to initiate a risk analysis of the transaction. For example, if the IP address is not in the country, then the transaction would be riskier, or if it is an IP address never used before, e.g., not your home or work computer. Mechanisms may also determine whether an IP address is being spoofed.


Initiating a risk analysis can refer to the start of a risk analysis, parts of which may be partially performed by another entity, or actual performance of the risk analysis.


Also, if an item, the items taken as a whole, or the amount are unusual for the consumer 30 to purchase, then the transaction may be characterized as risky. Past transaction information may be used to determine whether or not an item is an unusual purchase for the consumer 30. Other information may also be used, such as the person's age, location of residence, or other information. For example, if the consumer 30 is 75 years old and purchased a hang glider, then the transaction might be characterized as risky.


A risk score that represents an account level risk associated with the corresponding transaction may be calculated from any of the information above. Additional discussion for the calculation of a risk score can be found in U.S. Pat. No. 6,658,393 and U.S. patent application Ser. No. 10/863,813, entitled “Method and System for Providing Risk Information in Connection With Transaction Processing” by Bruesewitz et al. A transaction with a high initial risk score compared to a threshold criteria may be supplemented via challenge questions submitted to the consumer.


In step 706, a challenge message is sent to the consumer 30. For example, when the device, item, consumer info, or other information suggests that the transaction being conducted is risky, then challenge questions may be presented in order to increase the security. The messages may be in the form of challenge questions. Examples of challenge questions may include questions about the consumer's zip code, mothers maiden name, or more specific questions such as past purchases, etc.


The challenges may be sent to the access device 34 from which the account information was received, or it may be another device associated with the consumer, e.g., the consumers mobile phone when it is not used as the access device 34. In one embodiment, a code is sent to the consumer's mobile phone, and the challenge question requests an input of the code. In one aspect, the code may be redeemable for a discount on the current transaction or a future transaction. This code may be sent before the payment mechanism is shown, thus incentivizing use of a payment mechanism that is compatible (processable) by the network 26 (e.g. option A 525).


In step 707, the consumer responds to the challenge question, e.g. providing a challenge answer. The process of sending challenge questions and receiving challenge answers may be repeated.


After the challenge response has been validated as being correct or incorrect, a risk score may be provided to the issuer 28 for use in determining whether to authorize the transaction. The risk score may account for correctness of the challenge response, the place of purchase, the history of the card, the amount of the purchase, or any combination of the other criteria mentioned herein. Thus, if an incorrect response is provided, the transaction is not necessarily denied. Also, more than one challenge can be used. If two challenges are used and the response to both are wrong, then there would be a greater chance that person would be turned down, i.e. a greater risk score. If one is wrong and the other right, then the total contribution to the risk score from the challenges may be zero or dependent on the confidence score (see below) of each challenge. One skilled in the art will appreciate the different contributions arising from multiple challenge questions.


Some challenge questions may be more reliable (confidence score) than other ones. The more reliable challenge questions may affect the risk score more. Thus, a more accurate and efficient risk score may be achieved. In one aspect, the confidence score may be used as a weighting in determining the overall risk score, or similarly whether the user is considered to be authenticated.


In one embodiment, the limited time for the authorization to occur after a consumer has initiated the transaction, e.g., submitting a payment request via button on a web page, does not begin until the authorization request is sent to the issuer 28. Thus, as many challenge questions may be presented as desired. Thus, more complicated mechanisms may be achieved.


In step 708, the authorization request message is sent from the payment processing network 28 to the issuer 28. Additional steps may be performed as in methods 400 or 600, or other methods described herein. The presentation of the challenge questions can be made to integrate with the checkout page presented to the consumer 30, as described in the embodiment below.



FIG. 8 shows a screen shot of a checkout page 800 used for presenting challenge questions to a consumer according to an embodiment of the present invention. In one embodiment, checkout page 800, or other type of application page, has a similar layout compared to the checkout page 500. The items 810-827 may have the same functionally as the corresponding items of checkout page 500. Option A 825 may also have enhanced functionality.


In one embodiment embedded software, such as a hidden frame, is included in the checkout page 800 when it is sent to the consumer. This code may be used to initiate the device information collection process. The code may be directly included in the page 800 or a link to the code may be included. An exemplary line of a link to the code sent from the merchant 22 to the access device 34 is <Iframe src=‘http:/www.ivisa.com/zfp_visa/php? Merchid=2000$corrid=123’ height=1 width=1 frameborder=0 scrolling=no></frame>. The device information may be sent at anytime after the page 800 is served to the consumer. For example, it may be immediately after the page is served, i.e. before the Option A 825 is activated. In another embodiment, the device information is sent to the network 26 after the option A 825 is activated, which selects the preferred payment processing network 26, or payment processing organization (e.g., Visa).


Also, after the option A 825 is chosen, the network-specific frame 830, which may use an IFrame, is presented to the consumer 30. The submit payment button 835 has a destination address linked to the payment processing network 26. After the submit payment button 835 is activated, e challenge question 840 may appear, along with a text box 845 for entering an answer to the challenge question 840. After any of these buttons or boxes are activated, they may disappear, as signified by the dotted lines. The challenge questions and answers may be used to determine or alter a risk score as defined above. In one embodiment, the incorrect answers may be used to immediately deny the transaction.


The frame 830 may also be used to provide the feedback of whether the transaction is approved or not, e.g., via a box 850.


The device information may also include information as to the type of browser being used. This information may be used to determine how to provide the frame 830 and the challenge questions. For example, by knowing the browser capabilities, the coda may be served in a manner that is easily displayable and functional with the browser of the consumer. For example, different code may be used based on whether or not the access device is using a browser of a mobile phone.


V. Additional Process Flows

In some embodiments, the organization and processing of the authorization may differ from the embodiments presented above. The payment processing network 26 does not always send an authorization request message to the issuer 28. For example, after the payment processing network 26 has received the payment information, e.g. in step 404, or after the payment processing network 26 has finishes the challenge process, e.g. after step 707, the payment processing network 26 can send some type of payment information to the merchant, a merchant acquirer, or a general use acquirer.



FIG. 9 shows a block diagram for a method 900 illustrating the flow of data during a transaction where a type of payment information is sent to the merchant 22 from the payment processing network 28 according to an embodiment of the present invention. Steps before step 904 may occur as described herein.


In step 904, payment information is sent from the access device 34 to the payment processing network 28 or other non-merchant entity. The payment processing network 28 may initiate a challenge process with the consumer 30, continue with a risk analysis, or perform other steps as described herein or known to one skilled in the art. In one embodiment, the payment information includes an account identifier for the account to be used for the transaction.


In step 905, payment information is sent from the payment processing network 26 (e.g. a server of a non-merchant entity) to the merchant 22. The payment information may be sent as one type of a funding message that is sent from the payment processing network 26 to the merchant 22.


In one embodiment, the information sent in this step may include a same account identifier as received in step 904 or it may include a different payment identifier. For example, the payment processing network 26 can create a new or artificial PAN (primary account number) or code from any symbols (possibly at random) and can associate that number with the credit card number received in step 904. The new number may be of the same size (e.g. # of characters) as the actual PAN.


in this manner, the merchant 22 still does not receive the actual credit card number of the consumer. The new number may also only be associated with the credit card number for a limited time (i.e. temporary), thus preventing that number to be used again. In one embodiment, the new number can have a prefix or ether part that signifies that it is not a real card number but an artificial one created for the purpose above.


In step 908, the merchant 22 sends a first authorization request message to the acquirer 24. In step 907, after the acquirer 24 receives the first authorization request message, the first authorization request message is then sent to the payment processing network 26. At this point, the payment processing network 26 can match the new number with the actual account number of the customer.


In step 907, the payment processing network 26 then, if necessary, towards the authorization request message with the account number and amount to the issuer 28 (step 908). This step is not necessary, e.g., when the payment processing network 26 is also the issuer of the consumer account.


In step 909, the issuer 28 responds to the authorization request message. For example, the issuer 28 may accept the transaction or decline the transaction, or may refer the transaction. In step 910, the payment processing network 26 forwards the authorization response to the acquirer 24, which then forwards the authorization results (step 911). Finally a receipt may be sent to the consumer (step 912).



FIG. 10 shows a block diagram for a method 1000 illustrating the flow of data during a transaction where a type of payment information is sent to an acquirer 24 from the payment processing network 26 according to an embodiment of the present invention. Steps before step 1004 may occur as described herein.


In step 1004, payment information is sent from the access device 34 to the payment processing network 26 or other non-merchant entity. The payment processing network 26 may then perform a challenge process with the consumer 30, continue with a risk analysis, or perform other steps as described herein or known to one skilled in the art.


In step 1005, payment information is sent from the payment processing network 26 (e.g. a server of a non-merchant entity) to an acquirer 24. In one embodiment, the information sent in this step may include a same account identifier as received in step 904 or it may include a different payment identifier as described above. In one embodiment, acquirer 24 may be an acquirer chosen or associated with the merchant 22, and thus each merchant may have a different acquirer. In another embodiment, the payment processing network 26 may use the same acquirer 24 for all transactions, or at least the same acquirer for a group of merchants.


In step 1006, the acquirer 24 sends a first authorization request message to the network 26. At this point, a server computer in the payment processing network 26 can match the new number with the actual account number of the customer.


In step 1007, the payment processing network 26 then, if necessary, forwards the authorization request message with the account number and amount to the issuer 28 (step 908). This step is not necessary, e.g., when the payment processing network 26 is also the issuer of the consumer account.


In step 1008, the issuer 28 responds to the authorization request message. For example, the issuer 28 may accept the transaction or decline the transaction, or may refer the transaction. In step 1009, the payment processing network 26 forwards the authorization response message to the acquirer 24, which then responds with the authorization results to the network 26 (step 1010). In step 1011, the payment processing network 26 can then send status information to the merchant 22 as in step 407. Finally a receipt may be sent to the consumer from the merchant 22 (step 1012). Alternatively, the payment processing network 26 can send the receipt to the consumer 30, e.g., in parallel with status information sent to the merchant 22.


VI. Various Embodiments

As used herein, an “acquirer” is typically a business entity, e.g., a commercial bank that has a business relationship with a particular merchant or an ATM. An “issuer” is typically a business entity (e.g., a bank) which issues a portable consumer device such as a credit or debit card to a consumer. Some entitles can perform both issuer and acquirer functions. Embodiments of the invention encompass such single entity issuer-acquirers.


The consumer 30 may be an Individual, or an organization such as a business that is capable of purchasing goods or services. In other embodiments, the consumer 30 may simply be a person who wants to conduct some other type of transaction such as a money transfer transaction or a transaction at an ATM.


The portable consumer device 32 may be in any suitable form. For example, suitable portable consumer devices can be hand-held and compact so that they can fit into a consumer's wallet and/or pocket (e.g., pocket-sized). They may include smart cards, ordinary credit or debit cards (with a magnetic strip and without a microprocessor), keychain devices (such as the Speedpass™ commercially available from Exxon-Mobil Corp.), etc. Other examples of portable consumer devices include cellular phones, personal digital assistants (PDAs), pagers, payment cards, security cards, access cards, smart media, transponders, and the like. The portable consumer devices can also be debit devices (e.g., a debit card), credit devices (e.g., a credit card), or stored value devices (e.g., a stored value card).


The access devices 34 according to embodiments of the invention can be in any suitable form. Examples of access devices include point of sale (POS) devices, cellular phones, PDAs, personal computers (PCs), tablet PCs, handheld specialized readers, set-top boxes, electronic cash registers (ECRs), automated teller machines (ATMs), virtual cash registers (VCRs), kiosks, security systems, access systems, and the like.


If the access device 34 is a point of sale terminal, any suitable point of sale terminal may be used including card readers. The card readers may include any suitable contact or contactless mode of operation. For example, exemplary card readers can include RF (radio frequency) antennas, magnetic stripe readers, etc. to interact with the portable consumer devices 32.


The access device 34 may also be a wireless phone. In one embodiment, the portable consumer device 32 and the access device are the same device. For example, a consumer may use a wireless to phone to select items to buy through a browser.


When the access device 34 is a personal computer, the interaction of the portable consumer devices 32 may be achieved via the consumer 30 or another person entering the credit card information into an application (e.g. a browser) that was opened to purchase goods or services and that connects to a server of the merchant, e.g. through a web site. In one embodiment, the personal computer may be at a checkout stand of a retail store of the merchant, and the application may already be connected to the merchant server.


An exemplary portable consumer device 32′ in the form of a phone may comprise a computer readable medium and a body as shown in FIG. 2. (FIG. 2 shows a number of components, and the portable consumer devices according to embodiments of the invention may comprise any suitable combination or subset of such components.) The computer readable medium 32(b) may be present within the body 32(h), or may be detachable from it. The body 32(h) may be in the form a plastic substrate, housing, or other structure. The computer readable medium 32(b) may be a memory that stores data and may be in any suitable form including a magnetic stripe, a memory chip, etc. The memory preferably stores information such as financial information, transit information (e.g., as in a subway or train pass), access information (e.g., as in access badges), etc. Financial information may include information such as bank account information, bank identification number (BIN), credit or debit card number information, account balance information, expiration date, consumer information such as name, date of birth, etc. Any of this information may be transmitted by the portable consumer device 32.


Information in the memory may also be in the form of data tracks that are traditionally associated with credits cards. Such tracks include Track 1 and Track 2. Track 1 (“international Air Transport Association”) stores more information than Track 2, and contains the cardholder's name as well as account number and other discretionary data. This track is sometimes used by the airlines when securing reservations with a credit card. Track 2 (“American Banking Association”) is currently most commonly used. This is the track that is read by ATMs and credit card checkers. The ABA (American Banking Association) designed the specifications of this track and all world banks must abide by it. It contains the cardholder's account, encrypted PIN data, plus other discretionary data.


The portable consumer device 32 may further include a contactless element 32(g), which is typically implemented In the form of a semiconductor chip (or other data storage element) with an associated wireless transfer (e.g., data transmission) element, such as an antenna. Contactless element 32(g) is associated with (e.g., embedded within) portable consumer device 32 and data or control instructions transmitted via a cellular network may be applied to contactless element 32(g) by means of a contactless element interface (not shown). The contactless element interface functions to permit the exchange of data and/or control instructions between the mobile device circuitry (and hence the cellular network) and an optional contactless element 32(g).


Contactless element 32(g) is capable of transferring and receiving data using a near field communications (“NFC”) capability (or near field communications medium) typically in accordance with a standardized protocol or data transfer mechanism (e.g., ISO 14443/NFC). Near field communications capability is a short-range communications capability, such as RFID, Bluetooth™, infra-red, or other data transfer capability that can be used to exchange data between the portable consumer device 32 and an interrogation device. Thus, the portable consumer device 32 is capable of communicating and transferring data and/or control instructions via both cellular network and near field communications capability.


The portable consumer device 32 may also include a processor 32(c) (e.g., a microprocessor) for processing the functions of the portable consumer device 32 and a display 32(d) to allow a consumer to see phone numbers and other information and messages. The portable consumer device 32 may further include input elements 32(e) to allow a consumer to input information into the device, a speaker 32(f) to allow the consumer to hear voice communication, music, etc., and a microphone 32(i) to allow the consumer to transmit her voice through the portable consumer device 32. The portable consumer device 32 may also include an antenna 32(a) for wireless data transfer (e.g., data transmission).


If the portable consumer device is In the form of a debit, credit, or smartcard, the portable consumer device may also optionally have features such as magnetic strips. Such devices can operate in either a contact or contactless mode.


An example of a portable consumer device 32″ in the form of a card is shown in FIG. 3. FIG. 3 shows a plastic substrate 32(m). A contactless element 32(o) for interfacing with an access device 34 may be present on or embedded within the plastic substrate 32(m). Consumer information 32(p) such as an account number, expiration date, and consumer name may be printed or embossed on the card. Also, a magnetic stripe 32(n) may also be on the plastic substrate 32(m).


As shown in FIG. 3, the portable consumer device 32″ may include both a magnetic stripe 32(n) and a contactless element 32(o). In other embodiments, both the magnetic stripe 32(n) and the contactless element 32(o) may be in the portable consumer device 32″. In other embodiments, either the magnetic stripe 32(n) or the contactless element 32(o) may be present in the portable consumer device 32″.


The payment processing network 26 may include data processing subsystems, networks, and operations used to support and deliver authorization services, exception file services, and clearing and settlement services. An exemplary payment processing network may include VisaNet™. Payment processing networks such as VisaNet™ are able to process credit card transactions, debit card transactions, and other types of commercial transactions. VisaNet™, in particular, includes a VIP system (Visa Integrated Payments system) which processes authorization requests and a Base II system which performs clearing and settlement services.


The payment processing network 26 may include a server computer. A server computer is typically a powerful computer or cluster of computers. For example, the server computer can be a large mainframe, a minicomputer cluster, or a group of servers functioning as a unit. In one example, the server computer may be a database server coupled to a Web server. The payment processing network 26 may use any suitable wired or wireless network, including the Internet.


The issuer 28 may be a bank or other organization that may have an account associated with the consumer 30. The issuer 28 may operate a server which may have a challenge question engine. A transaction history database and a challenge question database may be in communication with a server of issuer 28. The issuer server, challenge question engine, transaction history database, and challenge question database may operate in the same way or a different way than the payment processing network server 26(a), challenge question engine 28(a)-1, transaction history database 28(b), and challenge question database 28(c).


Embodiments of the invention are not limited to the above-described embodiments. For example, although separate functional blocks are shown for an issuer, payment processing network, and acquirer, some entities perform all or any suitable combination of these functions and may be inducted in embodiments of invention. Additional components may also be included in embodiments of the invention.


VII. Computer Apparatus


FIG. 11 shows typical components or subsystems of a computer apparatus. Such components or any subset of such components may be present in various components shown in FIG. 1, including the access device 34, server computers 28(a), 28(a), etc. The subsystems shown in FIG. 11 are interconnected via a system bus 1175. Additional subsystems such as a printer 1174, keyboard 1178, fixed disk 1179, monitor 1176, which is coupled to display adapter 1132, and others are shown. Peripherals and Input/output (I/O) devices, which couple to I/O controller 1171, can be connected to the computer system by any number of means known in the art, such as serial port 1177. For example, serial port 1177 or external interface 1181 can be used to connect the computer apparatus to a wide area network such as the Internet, a mouse input device, or a scanner. The interconnection via system bus 1175 allows the central processor 1173 to communicate with each subsystem and to control the execution of instructions from system memory 1172 or the fixed disk 1179, as well as the exchange of information between subsystems. The system memory 1172 and/or the fixed disk 1179 may embody a computer readable medium.


Embodiments of the invention provide for a number of advantages. For example, the number of entities that know a credit card number can be kept at a minimum. Also, the amount of changes that a merchant needs to perform are minimal, such as simply placing one or more IFrames into a checkout page. Also, transaction information, such as device info, amount of the transaction, and the subject items of the transaction can be provided to the network 26, so that the network 26 can, for example, get a head start on a risk analysis and also to determine whether or not to present challenge questions. The challenge questions can also be more complex since an authorization request need not sent until after the challenge questions have been answered and no more questions are deemed necessary.


The specific details of the specific aspects of the present invention may be combined in any suitable manner without departing from the spirit and scope of embodiments of the invention. However, other embodiments of the invention may be directed to specific embodiments relating to each individual aspects, or specific combinations of these individual aspects.


It should be understood that the present invention as described above can be implemented in the form of control logic using computer software in a modular or integrated manner. Based on the disclosure and teachings provided herein, a person of ordinary skill in the art will know and appreciate other ways and/or methods to implement the present invention using hardware and a combination of hardware and software


Any of the software components or functions described in this application, may be implemented as software code to be executed by a processor using any suitable computer language such as, for example, Java, C++ or Perl using, for example, conventional or object-oriented techniques. Computer programs incorporating features of the present invention may be encoded on various computer readable media for storage and/or transmission; suitable media include magnetic disk or tape, optical storage media such as compact disk (CO) or DVD (digital versatile disk), flash memory, and the like. The computer readable medium may be any combination of such storage or transmission devices.


Such programs may also be encoded and transmitted using earner signals adapted for transmission via wired, optical, anchor wireless networks conforming to a variety of protocols, including the Internet. As such, a computer readable medium according to an embodiment of the present invention may be created using a data signal encoded with such programs. Computer readable media encoded with the program code may be packaged with a compatible device or provided separately from other devices (e.g., via Internet download). Any such computer readable medium may reside on or within a single computer program product (e.g. a hard drive or an entire computer system), and may be present on or within different computer program products within a system or network.


The above description is illustrative and is not restrictive. Many variations of the invention will become apparent to those skilled in the art upon review of the disclosure. The scope of the invention should, therefore, be determined not with reference to the above description, but instead should be determined with reference to the pending claims along with their full scope or equivalents.


A recitation of “a”, “an” or “the” is intended to mean “one or more” unless specifically indicated to the contrary.


All patents, patent applications, publications, and descriptions mentioned above are herein incorporated by reference in their entirety for all purposes. None is admitted to be prior art.

Claims
  • 1. A method for conducting a transaction between a consumer and a merchant, the method comprising: receiving, at a merchant server from an access device used by the consumer, a checkout request to initiate the transaction;generating, by the merchant server, first code comprising instructions executable by the access device to cause the access device to at least display a checkout page and send information about the access device to a non-merchant server, wherein the checkout page includes a first payment option and a second payment option, wherein the first payment option is linked to the non-merchant server and the second payment option is linked to the merchant server;providing, from the merchant server to the access device, the first code, wherein the first code causes the access device to display the checkout page to the consumer, collect device information, and then transmit the collected device information and payment information to the non-merchant server in response to a selection of the first payment option by the consumer, wherein the non-merchant server analyses the collected device information to determine a risk for the transaction and processes the transaction using the payment information; andreceiving, at the merchant server, a response message regarding the transaction, the response message being sent by the non-merchant server.
  • 2. The method of claim 1, wherein the access device is a personal computer or a mobile phone.
  • 3. The method of claim 1, further comprising: transmitting, by the merchant server, transaction information comprising a merchant identifier to the non-merchant server, wherein the non-merchant server processes the transaction using the transaction information in addition to the payment information.
  • 4. The method of claim 3, wherein the transaction information includes at least one of: an amount of the transaction; and/orone or more items to be purchased in the transaction.
  • 5. The method of claim 1, wherein the response message comprises an amount of the transaction and items selected by the consumer on the checkout page.
  • 6. The method of claim 1, wherein the response message includes a response as to whether the transaction is authorized.
  • 7. The method of claim 4, wherein the transaction information includes a correlation ID, and the response message also includes the correlation ID.
  • 8. The method of claim 7, further comprising: generating the correlation ID and sending the correlation ID to the access device.
  • 9. The method of claim 8, further comprising: matching the correlation ID in the response message to the correlation ID that was generated.
  • 10. A system for conducting a transaction between a consumer and a merchant, the system comprising: a merchant server comprisingan external interface;one or more processors; andone or more memory devices containing instructions for directing the one or more processors toreceive, from an access device used by the consumer, a checkout request to initiate the transaction;generate first code comprising instructions executable by the access device to cause the access device to at least display a checkout page and send information about the access device to a non-merchant server, wherein the checkout page includes a first payment option and a second payment option, wherein the first payment option is linked to the non-merchant server and the second payment option is linked to the merchant server;provide, to the access device, the first code, wherein the first code causes the access device to display the checkout page to the consumer, collect device information and payment information to the non-merchant server in response to a selection of the first payment option by the consumer, wherein the non-merchant server analyses the collected device information to determine a risk for the transaction and processes the transaction using the payment information; andreceive a response message regarding the transaction, the response message being sent by the non-merchant server; andthe access device.
  • 11. The system of claim 10, wherein the access device is a personal computer or a mobile phone.
  • 12. The system of claim 10, further comprising the non-merchant server.
CROSS-REFERENCES TO RELATED APPLICATIONS

This present application is a continuation application of U.S. patent application Ser. No. 13/358,472, filed on Jan. 25, 2012, which is a divisional application of U.S. patent application Ser. No. 12/143,394, filed on Jun. 20, 2008, now U.S. Pat. No. 8,121,956 which is a non-provisional application of and claims priority to U.S. Patent Application No. 60/946,113, filed on Jun. 25, 2007 and to U.S. patent application Ser. No. 61/034,904, filed on Mar. 7, 2008 the entire contents of which are herein incorporated by reference for all purposes. The present application is related to commonly owned U.S. patent application Ser. No. 12/143,509, filed Jun. 20, 2008, now U.S. Pat. No. 8,121,942 on Feb. 21, 2012 and to U.S. patent application Ser. No. 11/763,240, filed on Jun. 14, 2007, the entire contents of which are herein incorporated by reference for all purposes.

US Referenced Citations (591)
Number Name Date Kind
4528442 Endo Jul 1985 A
5177342 Adams Jan 1993 A
5254843 Hynes et al. Oct 1993 A
5311594 Penzias May 1994 A
5420926 Low et al. May 1995 A
5434398 Goldberg Jul 1995 A
5465387 Mukherjee Nov 1995 A
5513250 McAllister Apr 1996 A
5530438 Bickham et al. Jun 1996 A
5539810 Kennedy, III et al. Jul 1996 A
5613012 Hoffman et al. Mar 1997 A
5615110 Wong Mar 1997 A
5625689 Indeck et al. Apr 1997 A
5627355 Rahman et al. May 1997 A
5708422 Blonder Jan 1998 A
5740244 Indeck et al. Apr 1998 A
5774525 Kanevsky et al. Jun 1998 A
5781438 Lee et al. Jul 1998 A
5812668 Weber Sep 1998 A
5819226 Gopinathan et al. Oct 1998 A
5834747 Cooper Nov 1998 A
5872834 Teitelbaum Feb 1999 A
5878337 Joao et al. Mar 1999 A
5883810 Franklin et al. Mar 1999 A
5903830 Joao et al. May 1999 A
5914472 Foladare et al. Jun 1999 A
5920628 Indeck et al. Jul 1999 A
5953710 Fleming Sep 1999 A
5956699 Wong et al. Sep 1999 A
5988497 Wallace Nov 1999 A
6000832 Franklin et al. Dec 1999 A
6012144 Pickett Jan 2000 A
6014635 Harris et al. Jan 2000 A
6029154 Pettitt Feb 2000 A
6044360 Picciallo Mar 2000 A
6047268 Bartoli et al. Apr 2000 A
6064990 Goldsmith May 2000 A
6095413 Tetro et al. Aug 2000 A
6157707 Baulier et al. Dec 2000 A
6163771 Walker et al. Dec 2000 A
6219793 Li et al. Apr 2001 B1
6227447 Campisano May 2001 B1
6236981 Hill May 2001 B1
6260146 Mos et al. Jul 2001 B1
6263447 French et al. Jul 2001 B1
6267292 Walker et al. Jul 2001 B1
6308890 Cooper Oct 2001 B1
6327578 Linehan Dec 2001 B1
6330550 Brisebois et al. Dec 2001 B1
6341724 Campisano Jan 2002 B2
6422462 Cohen Jul 2002 B1
6425523 Shem-Ur et al. Jul 2002 B1
6442532 Kawan Aug 2002 B1
6496936 French et al. Dec 2002 B1
6505171 Cohen et al. Jan 2003 B1
6529725 Joao et al. Mar 2003 B1
6535855 Cahill et al. Mar 2003 B1
6560581 Fox et al. May 2003 B1
6592044 Wong et al. Jul 2003 B1
6612488 Suzuki Sep 2003 B2
6632248 Isaac et al. Oct 2003 B1
6636833 Flitcroft et al. Oct 2003 B1
6675153 Cook et al. Jan 2004 B1
6684250 Anderson et al. Jan 2004 B2
6714918 Hillmer et al. Mar 2004 B2
6732082 Gavan et al. May 2004 B1
6748367 Lee Jun 2004 B1
6805287 Bishop et al. Oct 2004 B2
6832721 Fujii Dec 2004 B2
6836670 Castrogiovanni et al. Dec 2004 B2
6857073 French et al. Feb 2005 B2
6879965 Fung et al. Apr 2005 B2
6899269 Deland May 2005 B1
6901387 Wells et al. May 2005 B2
6913194 Suzuki Jul 2005 B2
6931382 Laage et al. Aug 2005 B2
6938019 Uzo Aug 2005 B1
6941285 Sarcanin Sep 2005 B2
6980670 Hoffman et al. Dec 2005 B1
6990470 Hogan et al. Jan 2006 B2
6991157 Bishop et al. Jan 2006 B2
7003497 Maes Feb 2006 B2
7004382 Sandru Feb 2006 B2
7024396 Woodward Apr 2006 B2
7044394 Brown May 2006 B2
7051002 Keresman, III et al. May 2006 B2
7051929 Li May 2006 B2
7069249 Stolfo et al. Jun 2006 B2
7096003 Joao et al. Aug 2006 B2
7100049 Gasparini et al. Aug 2006 B2
7103576 Mann, III et al. Sep 2006 B2
7113930 Eccles et al. Sep 2006 B2
7136835 Flitcroft et al. Nov 2006 B1
7143095 Barrett et al. Nov 2006 B2
7149895 Asokan Dec 2006 B1
7165051 Ronning et al. Jan 2007 B2
7177835 Walker et al. Feb 2007 B1
7177848 Hogan et al. Feb 2007 B2
7194437 Britto et al. Mar 2007 B1
7225156 Fisher et al. May 2007 B2
7231657 Honarvar et al. Jun 2007 B2
7249093 King Jul 2007 B1
7264154 Harris Sep 2007 B2
7272728 Pierson et al. Sep 2007 B2
7273168 Linlor Sep 2007 B2
7287692 Patel et al. Oct 2007 B1
7292999 Hobson et al. Nov 2007 B2
7319978 Minamishin et al. Jan 2008 B2
7330871 Barber Feb 2008 B2
7343149 Benco et al. Mar 2008 B2
7343351 Bishop et al. Mar 2008 B1
7350230 Forrest Mar 2008 B2
7353382 Labrou et al. Apr 2008 B2
7357310 Calabrese et al. Apr 2008 B2
7363257 Kunz et al. Apr 2008 B2
7373669 Eisen May 2008 B2
7379919 Hogan et al. May 2008 B2
RE40444 Linehan Jul 2008 E
7415443 Hobson et al. Aug 2008 B2
7430537 Templeton et al. Sep 2008 B2
7444676 Asghari-Kamrani et al. Oct 2008 B1
7469151 Khan et al. Dec 2008 B2
7483858 Foran et al. Jan 2009 B2
7500607 Williams Mar 2009 B2
7523067 Nakajima Apr 2009 B1
7545748 Riddle Jun 2009 B1
7548889 Bhambri et al. Jun 2009 B2
7548890 Shakkarwar Jun 2009 B2
7567934 Flitcroft et al. Jul 2009 B2
7567936 Peckover et al. Jul 2009 B1
7571139 Giordano et al. Aug 2009 B1
7571142 Flitcroft et al. Aug 2009 B1
7580898 Brown et al. Aug 2009 B2
7584153 Brown et al. Sep 2009 B2
7593896 Flitcroft et al. Sep 2009 B1
7606560 Labrou et al. Oct 2009 B2
7606770 Pinnell Oct 2009 B2
7620600 Patil Nov 2009 B2
7627531 Breck et al. Dec 2009 B2
7627895 Gifford et al. Dec 2009 B2
7650314 Saunders Jan 2010 B1
7685037 Reiners et al. Mar 2010 B2
7702578 Fung et al. Apr 2010 B2
7707120 Dominguez et al. Apr 2010 B2
7712655 Wong May 2010 B2
7734527 Uzo Jun 2010 B2
7740168 Hammad et al. Jun 2010 B2
7752084 Pettitt Jul 2010 B2
7753265 Harris Jul 2010 B2
7770789 Oder, II et al. Aug 2010 B2
7784685 Hopkins, III Aug 2010 B1
7793851 Mullen Sep 2010 B2
7801826 Labrou et al. Sep 2010 B2
7805376 Smith Sep 2010 B2
7805378 Berardi et al. Sep 2010 B2
7810165 Hammad et al. Oct 2010 B2
7819322 Hammad et al. Oct 2010 B2
7828220 Mullen Nov 2010 B2
7835960 Breck et al. Nov 2010 B2
7841523 Oder, II et al. Nov 2010 B2
7841539 Hewton Nov 2010 B2
7844550 Walker et al. Nov 2010 B2
7849020 Johnson Dec 2010 B2
7853529 Walker et al. Dec 2010 B1
7853995 Chow et al. Dec 2010 B2
7865414 Fung et al. Jan 2011 B2
7873579 Hobson et al. Jan 2011 B2
7873580 Hobson et al. Jan 2011 B2
7890393 Talbert et al. Feb 2011 B2
7891563 Oder, II et al. Feb 2011 B2
7896238 Fein et al. Mar 2011 B2
7922082 Muscato Apr 2011 B2
7931195 Mullen Apr 2011 B2
7938318 Fein et al. May 2011 B2
7954705 Mullen Jun 2011 B2
7959076 Hopkins, III Jun 2011 B1
7996288 Stolfo Aug 2011 B1
8025223 Saunders et al. Sep 2011 B2
8046256 Chien et al. Oct 2011 B2
8060448 Jones Nov 2011 B2
8060449 Zhu Nov 2011 B1
8074877 Mullen et al. Dec 2011 B2
8074879 Harris Dec 2011 B2
8082210 Hansen et al. Dec 2011 B2
8095113 Kean et al. Jan 2012 B2
8104679 Brown Jan 2012 B2
RE43157 Bishop et al. Feb 2012 E
8109436 Hopkins, III Feb 2012 B1
8121942 Carlson et al. Feb 2012 B2
8121956 Carlson et al. Feb 2012 B2
8126449 Beenau et al. Feb 2012 B2
8135647 Hammad et al. Mar 2012 B2
8171525 Pelly et al. May 2012 B1
8196813 Vadhri Jun 2012 B2
8205791 Randazza et al. Jun 2012 B2
8224702 Mengerink et al. Jul 2012 B2
8225385 Chow et al. Jul 2012 B2
8239330 Montero et al. Aug 2012 B2
8265993 Chien et al. Sep 2012 B2
8280777 Mengerink et al. Oct 2012 B2
8306908 Barker et al. Nov 2012 B1
8328095 Oder, II et al. Dec 2012 B2
8376225 Hopkins, III Feb 2013 B1
8380177 Laracey Feb 2013 B2
8387873 Saunders et al. Mar 2013 B2
8401539 Beenau et al. Mar 2013 B2
8401898 Chien et al. Mar 2013 B2
8403211 Brooks et al. Mar 2013 B2
8412623 Moon et al. Apr 2013 B2
8412837 Emigh et al. Apr 2013 B1
8417642 Oren Apr 2013 B2
8447699 Batada et al. May 2013 B2
8453223 Svigals et al. May 2013 B2
8453925 Fisher et al. Jun 2013 B2
8458487 Palgon et al. Jun 2013 B1
8484134 Hobson et al. Jul 2013 B2
8485437 Mullen et al. Jul 2013 B2
8494959 Hathaway et al. Jul 2013 B2
8498908 Mengerink et al. Jul 2013 B2
8504478 Saunders et al. Aug 2013 B2
8510816 Quach et al. Aug 2013 B2
8533118 Weller et al. Sep 2013 B2
8533851 Ginter et al. Sep 2013 B2
8538845 Liberty Sep 2013 B2
8555079 Shablygin et al. Oct 2013 B2
8566168 Bierbaum et al. Oct 2013 B1
8567670 Stanfield et al. Oct 2013 B2
8571939 Lindsey et al. Oct 2013 B2
8577336 Mechaley, Jr. Nov 2013 B2
8577803 Chatterjee et al. Nov 2013 B2
8578176 Mattsson Nov 2013 B2
8583494 Fisher Nov 2013 B2
8584251 McGuire et al. Nov 2013 B2
8589237 Fisher Nov 2013 B2
8589271 Evans Nov 2013 B2
8589291 Carlson et al. Nov 2013 B2
8595098 Starai et al. Nov 2013 B2
8595812 Bomar et al. Nov 2013 B2
8595850 Spies et al. Nov 2013 B2
8606638 Dragt Dec 2013 B2
8606700 Carlson et al. Dec 2013 B2
8606720 Baker et al. Dec 2013 B1
8615468 Varadarajan Dec 2013 B2
8620754 Fisher Dec 2013 B2
8635157 Smith et al. Jan 2014 B2
8646059 von Behren et al. Feb 2014 B1
8651374 Brabson et al. Feb 2014 B2
8656180 Shablygin et al. Feb 2014 B2
8688543 Dominguez Apr 2014 B2
8706621 Carlson et al. Apr 2014 B2
8744958 Carlson et al. Jun 2014 B2
8762191 Lawrence et al. Jun 2014 B2
8788324 Shetty Jul 2014 B1
10262308 Carlson et al. Apr 2019 B2
20010027439 Holtzman et al. Oct 2001 A1
20010029485 Brody et al. Oct 2001 A1
20010034720 Armes Oct 2001 A1
20010054003 Chien et al. Dec 2001 A1
20010056409 Bellovin et al. Dec 2001 A1
20020007320 Hogan et al. Jan 2002 A1
20020007352 Fieschi et al. Jan 2002 A1
20020016749 Borecki et al. Feb 2002 A1
20020029193 Ranjan et al. Mar 2002 A1
20020035548 Hogan et al. Mar 2002 A1
20020035622 Barber Mar 2002 A1
20020062257 Minamishin et al. May 2002 A1
20020073045 Rubin et al. Jun 2002 A1
20020077978 O'Leary Jun 2002 A1
20020087344 Billings et al. Jul 2002 A1
20020091562 Siegel et al. Jul 2002 A1
20020108062 Nakajima et al. Aug 2002 A1
20020111919 Weller et al. Aug 2002 A1
20020116341 Hogan et al. Aug 2002 A1
20020120846 Stewart et al. Aug 2002 A1
20020133462 Shteyn Sep 2002 A1
20020133467 Hobson et al. Sep 2002 A1
20020147913 Lun Yip Oct 2002 A1
20030028481 Flitcroft et al. Feb 2003 A1
20030050896 Wiederin Mar 2003 A1
20030112942 Brown et al. Jun 2003 A1
20030130955 Hawthorne Jul 2003 A1
20030140004 O'Leary et al. Jul 2003 A1
20030154139 Woo Aug 2003 A1
20030154406 Honarvar Aug 2003 A1
20030191709 Elston et al. Oct 2003 A1
20030191945 Keech Oct 2003 A1
20030208684 Camacho et al. Nov 2003 A1
20040010462 Moon et al. Jan 2004 A1
20040019564 Goldthwaite Jan 2004 A1
20040050928 Bishop et al. Mar 2004 A1
20040059682 Hasumi et al. Mar 2004 A1
20040078340 Evans Apr 2004 A1
20040093281 Silverstein et al. May 2004 A1
20040107170 Labrou et al. Jun 2004 A1
20040139008 Mascavage, III Jul 2004 A1
20040143532 Lee Jul 2004 A1
20040158532 Breck et al. Aug 2004 A1
20040171406 Purk Sep 2004 A1
20040185830 Joao et al. Sep 2004 A1
20040210449 Breck et al. Oct 2004 A1
20040210498 Freund Oct 2004 A1
20040210536 Gudelj et al. Oct 2004 A1
20040232225 Bishop et al. Nov 2004 A1
20040260646 Berardi et al. Dec 2004 A1
20050037735 Coutts Feb 2005 A1
20050080730 Sorrentino Apr 2005 A1
20050097320 Golan May 2005 A1
20050108178 York May 2005 A1
20050119978 Ates Jun 2005 A1
20050122209 Black Jun 2005 A1
20050170814 Joao et al. Aug 2005 A1
20050199709 Linlor Sep 2005 A1
20050240527 Goldman Oct 2005 A1
20050246278 Gerber et al. Nov 2005 A1
20050246293 Ong Nov 2005 A1
20050269401 Spitzer et al. Dec 2005 A1
20050269402 Spitzer et al. Dec 2005 A1
20050273442 Bennett Dec 2005 A1
20050278542 Pierson et al. Dec 2005 A1
20060010072 Eisen Jan 2006 A1
20060059110 Madhok et al. Mar 2006 A1
20060156385 Chiviendacz Jul 2006 A1
20060202025 Calabrese et al. Sep 2006 A1
20060235795 Johnson et al. Oct 2006 A1
20060237528 Bishop et al. Oct 2006 A1
20060278704 Saunders et al. Dec 2006 A1
20060281439 Benco et al. Dec 2006 A1
20060282382 Balasubramanian et al. Dec 2006 A1
20070006286 Singhal Jan 2007 A1
20070094085 Redmond Apr 2007 A1
20070107044 Yuen et al. May 2007 A1
20070124801 Thomas et al. May 2007 A1
20070129955 Dalmia et al. Jun 2007 A1
20070136193 Starr Jun 2007 A1
20070136211 Brown et al. Jun 2007 A1
20070143230 Narainsamy Jun 2007 A1
20070164099 Neistadt Jul 2007 A1
20070170247 Friedman Jul 2007 A1
20070174448 Ahuja et al. Jul 2007 A1
20070179885 Bird et al. Aug 2007 A1
20070208671 Brown et al. Sep 2007 A1
20070214151 Thomas et al. Sep 2007 A1
20070234409 Eisen Oct 2007 A1
20070239606 Eisen Oct 2007 A1
20070244830 Hilderman Oct 2007 A1
20070245414 Chan et al. Oct 2007 A1
20070288377 Shaked Dec 2007 A1
20070291995 Rivera Dec 2007 A1
20080005037 Hammad Jan 2008 A1
20080015988 Brown et al. Jan 2008 A1
20080029607 Mullen Feb 2008 A1
20080034428 Bejar et al. Feb 2008 A1
20080035738 Mullen Feb 2008 A1
20080039209 Chen et al. Feb 2008 A1
20080040276 Hammad et al. Feb 2008 A1
20080046723 Weber Feb 2008 A1
20080046968 Cline et al. Feb 2008 A1
20080052226 Agarwal et al. Feb 2008 A1
20080054068 Mullen Mar 2008 A1
20080054079 Mullen Mar 2008 A1
20080054081 Mullen Mar 2008 A1
20080065553 Faith et al. Mar 2008 A1
20080065554 Hogan et al. Mar 2008 A1
20080065555 Mullen Mar 2008 A1
20080077526 Arumugam Mar 2008 A1
20080087722 Collins Apr 2008 A1
20080099552 Grillion May 2008 A1
20080103972 Lane May 2008 A1
20080103982 Hammad et al. May 2008 A1
20080104684 Lunde et al. May 2008 A1
20080120507 Shakkarwar May 2008 A1
20080133420 Barber Jun 2008 A1
20080154760 Calabrese et al. Jun 2008 A1
20080162295 Bedier Jul 2008 A1
20080183593 Dierks Jul 2008 A1
20080189186 Choi et al. Aug 2008 A1
20080201264 Brown et al. Aug 2008 A1
20080201265 Hewton Aug 2008 A1
20080208761 Autry et al. Aug 2008 A1
20080228646 Myers et al. Sep 2008 A1
20080243702 Hart et al. Oct 2008 A1
20080244744 Thomas et al. Oct 2008 A1
20080245855 Fein et al. Oct 2008 A1
20080245861 Fein et al. Oct 2008 A1
20080255992 Lin Oct 2008 A1
20080257959 Oved Oct 2008 A1
20080270246 Chen Oct 2008 A1
20080283591 Oder, II et al. Nov 2008 A1
20080288384 Collins et al. Nov 2008 A1
20080288405 John Nov 2008 A1
20080298588 Shakkarwar Dec 2008 A1
20080302869 Mullen Dec 2008 A1
20080302876 Mullen Dec 2008 A1
20080319869 Carlson et al. Dec 2008 A1
20080319896 Carlson et al. Dec 2008 A1
20080319904 Carlson et al. Dec 2008 A1
20090006262 Brown et al. Jan 2009 A1
20090010488 Matsuoka et al. Jan 2009 A1
20090037213 Eisen Feb 2009 A1
20090037333 Flitcroft et al. Feb 2009 A1
20090043702 Bennett Feb 2009 A1
20090048971 Hathaway et al. Feb 2009 A1
20090048975 Felger Feb 2009 A1
20090049529 Felger Feb 2009 A1
20090055315 Felger Feb 2009 A1
20090083184 Eisen Mar 2009 A1
20090099961 Ogilvy Apr 2009 A1
20090106112 Dalmia et al. Apr 2009 A1
20090106160 Skowronek Apr 2009 A1
20090134217 Flitcroft et al. May 2009 A1
20090157555 Biffle et al. Jun 2009 A1
20090159673 Mullen et al. Jun 2009 A1
20090159700 Mullen et al. Jun 2009 A1
20090159707 Mullen et al. Jun 2009 A1
20090173782 Muscato Jul 2009 A1
20090200371 Kean et al. Aug 2009 A1
20090204524 McGeorge Aug 2009 A1
20090248583 Chhabra Oct 2009 A1
20090271306 Pierson Oct 2009 A1
20090276347 Kargman Nov 2009 A1
20090294527 Brabson et al. Dec 2009 A1
20090307139 Mardikar et al. Dec 2009 A1
20090308921 Mullen Dec 2009 A1
20090327131 Beenau et al. Dec 2009 A1
20100008535 Abulafia et al. Jan 2010 A1
20100036749 Barber Feb 2010 A1
20100088237 Wankmueller Apr 2010 A1
20100094755 Kloster Apr 2010 A1
20100106644 Annan et al. Apr 2010 A1
20100120408 Beenau et al. May 2010 A1
20100133334 Vadhri Jun 2010 A1
20100138347 Chen Jun 2010 A1
20100145860 Pelegero Jun 2010 A1
20100161433 White Jun 2010 A1
20100185545 Royyuru et al. Jul 2010 A1
20100211505 Saunders et al. Aug 2010 A1
20100223186 Hogan et al. Sep 2010 A1
20100228668 Hogan Sep 2010 A1
20100235284 Moore Sep 2010 A1
20100258620 Torreyson et al. Oct 2010 A1
20100291904 Musfeldt et al. Nov 2010 A1
20100306076 Taveau et al. Dec 2010 A1
20100325041 Berardi et al. Dec 2010 A1
20110010292 Giordano et al. Jan 2011 A1
20110016047 Wu et al. Jan 2011 A1
20110016320 Bergsten et al. Jan 2011 A1
20110029902 Bailey Feb 2011 A1
20110040640 Erikson Feb 2011 A1
20110083018 Kesanupalli et al. Apr 2011 A1
20110087596 Dorsey Apr 2011 A1
20110093397 Carlson et al. Apr 2011 A1
20110125597 Oder, II et al. May 2011 A1
20110153437 Archer et al. Jun 2011 A1
20110154466 Harper et al. Jun 2011 A1
20110161233 Tieken Jun 2011 A1
20110191244 Dai Aug 2011 A1
20110238511 Park et al. Sep 2011 A1
20110238573 Varadarajan Sep 2011 A1
20110246317 Coppinger Oct 2011 A1
20110272471 Mullen Nov 2011 A1
20110272478 Mullen Nov 2011 A1
20110276380 Mullen et al. Nov 2011 A1
20110276381 Mullen et al. Nov 2011 A1
20110276424 Mullen Nov 2011 A1
20110276425 Mullen Nov 2011 A1
20110295745 White et al. Dec 2011 A1
20110302081 Saunders et al. Dec 2011 A1
20120028609 Hruska Feb 2012 A1
20120035998 Chien et al. Feb 2012 A1
20120041881 Basu et al. Feb 2012 A1
20120047237 Arvidsson et al. Feb 2012 A1
20120066078 Kingston et al. Mar 2012 A1
20120072350 Goldthwaite et al. Mar 2012 A1
20120078735 Bauer et al. Mar 2012 A1
20120078798 Downing et al. Mar 2012 A1
20120078799 Jackson et al. Mar 2012 A1
20120095852 Bauer et al. Apr 2012 A1
20120095865 Doherty et al. Apr 2012 A1
20120116902 Cardina et al. May 2012 A1
20120123940 Killian et al. May 2012 A1
20120129514 Beenau et al. May 2012 A1
20120143767 Abadir Jun 2012 A1
20120143772 Abadir Jun 2012 A1
20120158580 Eram et al. Jun 2012 A1
20120158593 Garfinkle et al. Jun 2012 A1
20120173431 Ritchie et al. Jul 2012 A1
20120185386 Salama et al. Jul 2012 A1
20120197807 Schlesser et al. Aug 2012 A1
20120203664 Torossian et al. Aug 2012 A1
20120203666 Torossian et al. Aug 2012 A1
20120215688 Musser et al. Aug 2012 A1
20120215696 Salonen Aug 2012 A1
20120231844 Coppinger Sep 2012 A1
20120233004 Bercaw Sep 2012 A1
20120246070 Vadhri Sep 2012 A1
20120246071 Jain et al. Sep 2012 A1
20120265631 Cronic et al. Oct 2012 A1
20120271770 Harris et al. Oct 2012 A1
20120297446 Webb et al. Nov 2012 A1
20120300932 Cambridge et al. Nov 2012 A1
20120303503 Cambridge et al. Nov 2012 A1
20120303961 Kean et al. Nov 2012 A1
20120304273 Bailey et al. Nov 2012 A1
20120310725 Chien et al. Dec 2012 A1
20120310831 Harris et al. Dec 2012 A1
20120316992 Oborne Dec 2012 A1
20120317035 Royyuru et al. Dec 2012 A1
20120317036 Bower et al. Dec 2012 A1
20130017784 Fisher Jan 2013 A1
20130019098 Gupta et al. Jan 2013 A1
20130054337 Brendell et al. Feb 2013 A1
20130054466 Muscato Feb 2013 A1
20130054474 Yeager Feb 2013 A1
20130081122 Svigals et al. Mar 2013 A1
20130091028 Oder, II et al. Apr 2013 A1
20130110658 Lyman et al. May 2013 A1
20130111599 Gargiulo May 2013 A1
20130117185 Collison et al. May 2013 A1
20130124290 Fisher May 2013 A1
20130124291 Fisher May 2013 A1
20130124364 Mittal May 2013 A1
20130138525 Bercaw May 2013 A1
20130144888 Faith et al. Jun 2013 A1
20130145148 Shablygin et al. Jun 2013 A1
20130145172 Shablygin et al. Jun 2013 A1
20130159178 Colon et al. Jun 2013 A1
20130166402 Parento et al. Jun 2013 A1
20130166456 Zhang et al. Jun 2013 A1
20130173736 Krzeminski et al. Jul 2013 A1
20130185202 Goldthwaite et al. Jul 2013 A1
20130191286 Cronic et al. Jul 2013 A1
20130191289 Cronic et al. Jul 2013 A1
20130198071 Jurss Aug 2013 A1
20130200146 Moghadam Aug 2013 A1
20130204787 Dubois Aug 2013 A1
20130204793 Kerridge et al. Aug 2013 A1
20130212007 Mattsson et al. Aug 2013 A1
20130212017 Bangia Aug 2013 A1
20130212019 Mattsson et al. Aug 2013 A1
20130212024 Mattsson et al. Aug 2013 A1
20130212666 Mattsson et al. Aug 2013 A1
20130218698 Moon et al. Aug 2013 A1
20130226813 Voltz Aug 2013 A1
20130246202 Tobin Sep 2013 A1
20130246203 Laracey Sep 2013 A1
20130246258 Dessert Sep 2013 A1
20130246259 Dessert Sep 2013 A1
20130246267 Tobin Sep 2013 A1
20130254028 Said Sep 2013 A1
20130254052 Royyuru et al. Sep 2013 A1
20130254102 Royyuru Sep 2013 A1
20130254117 von Mueller et al. Sep 2013 A1
20130262296 Thomas et al. Oct 2013 A1
20130262302 Lettow et al. Oct 2013 A1
20130262315 Hruska Oct 2013 A1
20130262316 Hruska Oct 2013 A1
20130262317 Collinge et al. Oct 2013 A1
20130268437 Desai Oct 2013 A1
20130275300 Killian et al. Oct 2013 A1
20130275307 Khan Oct 2013 A1
20130275308 Paraskeva et al. Oct 2013 A1
20130282502 Jooste Oct 2013 A1
20130282575 Mullen et al. Oct 2013 A1
20130282588 Hruska Oct 2013 A1
20130297504 Nwokolo et al. Nov 2013 A1
20130297508 Belamant Nov 2013 A1
20130304649 Cronic et al. Nov 2013 A1
20130308778 Fosmark et al. Nov 2013 A1
20130311382 Fosmark et al. Nov 2013 A1
20130317982 Mengerink et al. Nov 2013 A1
20130332344 Weber Dec 2013 A1
20130339253 Sincai Dec 2013 A1
20130346314 Mogollon et al. Dec 2013 A1
20140007213 Sanin et al. Jan 2014 A1
20140013106 Redpath Jan 2014 A1
20140013114 Redpath Jan 2014 A1
20140025581 Caiman Jan 2014 A1
20140025585 Caiman Jan 2014 A1
20140025958 Caiman Jan 2014 A1
20140032417 Mattsson Jan 2014 A1
20140032418 Weber Jan 2014 A1
20140040139 Brudnicki et al. Feb 2014 A1
20140040144 Plomske et al. Feb 2014 A1
20140040145 Ozvat et al. Feb 2014 A1
20140040628 Fort et al. Feb 2014 A1
20140041018 Bomar et al. Feb 2014 A1
20140046853 Spies et al. Feb 2014 A1
20140052532 Tsai et al. Feb 2014 A1
20140052620 Rogers et al. Feb 2014 A1
20140052637 Jooste et al. Feb 2014 A1
20160071093 Lee Mar 2016 A1
Foreign Referenced Citations (30)
Number Date Country
861461 Oct 2008 EP
2156397 Feb 2010 EP
3813CHENP2011 Sep 2012 IN
1020010044769 Jun 2001 KR
1020020007303 Jan 2002 KR
1020040067372 Jul 2004 KR
1020060018792 Mar 2006 KR
1020060079290 Jul 2006 KR
1020070007044 Jan 2007 KR
1020080083077 Sep 2008 KR
0048108 Aug 2000 WO
0048360 Aug 2000 WO
0135304 May 2001 WO
2004042536 May 2004 WO
2005111957 Nov 2005 WO
2006113834 Oct 2006 WO
2008012930 Jan 2008 WO
2008115620 Sep 2008 WO
2009002980 Dec 2008 WO
2009003030 Dec 2008 WO
2009032523 Mar 2009 WO
2010078522 Jul 2010 WO
2012068078 May 2012 WO
2012098556 Jul 2012 WO
2012142370 Oct 2012 WO
2012167941 Dec 2012 WO
2013048538 Apr 2013 WO
2013056104 Apr 2013 WO
2013119914 Aug 2013 WO
2013179271 Dec 2013 WO
Non-Patent Literature Citations (38)
Entry
U.S. Appl. No. 15/490,421 , “Advisory Action”, dated Jan. 29, 2021, 4 pages.
U.S. Appl. No. 15/490,421 , “Final Office Action”, dated Oct. 13, 2020, 15 pages.
CA2,692,276 , “Notice of Allowance”, dated Nov. 25, 2020, 1 page.
CA3,036,173 , “Office Action”, dated Nov. 23, 2020, 2 pages.
U.S. Appl. No. 15/490,421 , “Non-Final Office Action”, dated Jul. 29, 2019, 9 pages.
Canadian Application No. 2,692,276 , “Office Action”, dated Jul. 29, 2019, 3 pages.
U.S. Appl. No. 12/143,394, filed Jun. 20, 2008, 64 pages.
U.S. Appl. No. 12/143,509, filed Jun. 20, 2008, 66 pages.
U.S. Appl. No. 13/355,270, Final Office Action dated Mar. 27, 2013, 8 pages.
U.S. Appl. No. 13/355,270, Non-Final Office Action dated Oct. 18, 2012, 6 pages.
U.S. Appl. No. 13/355,270, Notice of Allowance dated Jul. 12, 2013, 8 pages.
U.S. Appl. No. 13/358,475, Final Office Action dated Apr. 29, 2013, 6 pages.
U.S. Appl. No. 13/358,475, Non-Final Office Action dated Dec. 12, 2012, 7 pages.
U.S. Appl. No. 13/358,475, Notice of Allowance dated Aug. 9, 2013, 9 pages.
U.S. Appl. No. 14/260,169, Final Office Action dated Apr. 21, 2015, 11 pages.
U.S. Appl. No. 14/260,169, Final Office Action dated Mar. 7, 2016, 6 pages.
U.S. Appl. No. 14/260,169, Non-Final Office Action dated Sep. 4, 2015, 5 pages.
U.S. Appl. No. 14/260,169, Non-Final Office Action dated Nov. 3, 2014, 8 pages.
U.S. Appl. No. 14/273,331, Final Office Action dated Apr. 29, 2015, 7 pages.
U.S. Appl. No. 14/273,331, Non-Final Office Action dated Sep. 18, 2015, 7 pages.
Australian Application No. 2008268411, First Examination Report dated May 11, 2012, 3 pages.
Australian Application No. 2008268411, Notice of Grant dated Oct. 3, 2013, 1 page.
Australian Application No. 2008268411, Second Examination Report dated Dec. 12, 2012, 2 pages.
Australian Application No. 2008268419, First Examination Report dated May 4, 2012, 3 pages.
Australian Application No. 2008268419, Notice of Grant dated Sep. 19, 2013, 1 page.
Australian Application No. 2008268419, Second Examination Report dated Mar. 12, 2013, 4 pages.
Australian Application No. 2009311303, Second Examination Report dated Feb. 10, 2015, 4 pages.
Canadian Application No. 2,692,275, Office Action dated Jan. 27, 2015, 4 pages.
Canadian Application No. 2,692,276, Office Action dated Dec. 2, 2014, 3 pages.
Canadian Application No. 2,692,276, Office Action dated Jan. 8, 2016, 3 pages.
Canadian Application No. 2,692,276, Office Action dated Nov. 2, 2017, 4 pages.
European Application No. 08771833.4, Extended European Search Report dated May 11, 2011, 4 pages.
U.S. Appl. No. 15/490,421 , Non-Final Office Action, dated Jun. 26, 2020, 13 pages.
U.S. Appl. No. 15/490,421 , “Non-Final Office Action”, dated Jan. 10, 2022, 35 pages.
“Order Management Integration Guide”, PayPal, Aug. 2005, 74 pages.
“Technical Overview of PayPal as an Additional Payment Option”, PayPal, Oct. 2006, 27 pages.
U.S. Appl. No. 15/490,421 , “Final Office Action”, dated May 5, 2022, 44 pages.
CA3,113,082 , “Office Action”, dated Apr. 1, 2022, 3 pages.
Related Publications (1)
Number Date Country
20190188664 A1 Jun 2019 US
Provisional Applications (2)
Number Date Country
61034904 Mar 2008 US
60946113 Jun 2007 US
Divisions (1)
Number Date Country
Parent 12143394 Jun 2008 US
Child 13358472 US
Continuations (1)
Number Date Country
Parent 13358472 Jan 2012 US
Child 16285087 US