Traditional payment cards are plastic or other physical material created with data-bearing elements such as magnetic stripes or embedded circuitry. They typically bear also a presentation of the relevant card number (the Primary Account Number, or PAN), expiration date (“expiry”), and a secondary card security code. Together, these components are herein called “full card data” and allow transactions to be initiated reliably via traditional payment networks.
Also today, full card data may be delivered through short-range electro-magnetic field (EMF), using near-field communication (NFC) technology. The information that is delivered this way ultimately is the same as the information delivered using the magnetic stripe or embedded chip in a more traditional payment card.
Further, there are systems designed to deliver a replica of a card—on a mobile phone screen, a computer screen, or even printed on paper—including the PAN, expiry, and, if allowed by the card association, a secondary security code.
These existing replica systems suffer from security and usability issues that limit the ease of use and, usually, engender strict and rather harsh limits on the amount of funds that can be loaded onto and spent with the replica.
Properly handling digital presentation of full card data requires that the method(s) of request, storage and display must be secure. Further, the actual use of the full card data should be monitored in such a way that it can be established with high certainty that the full card data was revealed in a particular context, preferably even to the point of being able to establish which individual caused the payment card information to be revealed and presented.
Certain details are set forth below to provide a sufficient understanding of embodiments of the invention. However, it will be clear to one skilled in the art that embodiments of the invention may be practiced without these particular details. Moreover, the particular embodiments of the present invention described herein are provided by way of example and should not be used to limit the scope of the invention to these particular embodiments. In other instances, well-known mobile device components, hardware, software, and processes have not been described or shown in detail in order to avoid unnecessarily obscuring the invention.
The digital card presentation described here may reduce or even eliminate many of the security concerns associated with virtual presentation of full card data, while simultaneously enhancing the usability and flexibility of the digital card.
In an example embodiment, a software application (the “mobile application”) may run on a processor and/or processing unit included in a mobile phone, contact an associated application running on a server (the “server application”) that includes a processing unit, and request card information for display. The request and delivery of the full card data may be handled in a secure manner, for example, with encryption of the full card data while in transit and with mechanisms to ensure that the full card data is revealed—e.g., presented for visual inspection, or made available for automated, machine-to-machine transfer—only when required and only for a limited period of time.
A user may select an option in the mobile application to present on-screen a representation (the “replica”) of a payment card, which may include presenting the PAN, expiration date, and/or security code. The replica may at first be shown with portions of the sensitive information obfuscated, in accordance with good security practices and/or in accordance with card association requirements. For example, of a 16-digit PAN, only the first six digits of the PAN (constituting typically the BIN, or bank identification number) and the last four digits of the PAN will be displayed in readable form; the remaining, interior, digits may be replaced with, for example, asterisks.
While full card data may be provided by the replica when authentication of identifying information has been accomplished, it may be desirable to assemble full card data at the time of or just prior to the presentation of the replica. This may be accomplished by separating the full card data into “fragmented card data”, which must be reassembled to constitute full card data.
It should be noted that other identifying information may be requested of the user in place of or in addition to a PIN code. As used herein, identifying information is used to mean identifying information that the user provides to demonstrate the user's identity. An example of alternative identifying information that could be provided is the user may be required to use a fingerprint sensor 109 as identification. More than one type of identifying information may be requested. For example, a user may be requested to use a PIN code plus the fingerprint sensor 109. Other combinations may be used.
When the identifying information is successfully entered, the server application may or may not be notified. In the example embodiment, the server application may be notified by the mobile application, the notification may include the location of the user's mobile device (as determined, for example, by GPS). Further, once the identifying information has been entered correctly, in an example embodiment shown in
Characteristics of such a system may include a) the full card data may be in its vulnerable, clear form for a restricted period of time; b) a user requirement, such as constant pressing on the temporary-display control, may make capturing a screen shot much more difficult.
Another embodiment of such a system may present the full card data not as human-readable characters, or not solely as human-readable characters, but would instead, or in addition to, present some or all of the full card data as a barcode or other encoded display, readable by a scanning device.
Other presentation channels may also be used including, but not limited to, near field communication (NFC), audio, infrared, and Bluetooth/WiFi. In each case, some subset of the full card data may be made available prior to the user entering identifying information, with full card data being made available after the entry of this identifying information.
The context of the user or another associated party may be used to influence the presentation of the replica. For example, the system may require that a user be within a specific geographic region in order to display the full card data, regardless of whether the user has correctly provided identifying information. The user's geolocation may be used to influence whether the query for full card data or fragmented card data may even be made; if that query is made, whether the full card data may be displayed; if the full card data is displayed, how that full card data is displayed.
Further variations are possible: the context of the user (for example, the time of day or geolocation) may be used to determine whether the identifying information may even be entered or not. Context may also be used to determine which identifying information is required. For example, one PIN code may be required when the user is at home, accessing the replica via mobile phone, and a different PIN code may be required when the user is away from home accessing the replica by mobile phone. The characteristics of the device being used to access the replica may be used to determine (solely, or in combination with context) which identifying information will be accepted—and how that may be accepted. As an example, at home a PIN code may be required when accessing the replica by mobile phone, while away from home a fingerprint read may be required for access by mobile phone, with only a PIN required to access the replica by laptop computer.
“Context” may include factors such as geolocation, location (as in being located at an intersection of two streets), time of day, proximity to a beacon, proximity to another device (e.g.—in or near an automobile, or close to an NFC chip), proximity to the user. This context may be obtained through the use of sensors on the mobile device, such as GPS sensors for geolocation or a proximity sensor to detect whether a mobile phone is being held up to the user's head or face.
An additional example embodiment includes the mobile application utilizing a proximity sensor on a mobile phone to determine whether the phone is being held up to the user's face. In this example, shown in
User authentication may be accomplished through the addition of delivery of a one-time code, via SMS or other push notification such as email. Delivery of this code may be triggered by specific user request, or by an action that is part of the sequence of displaying or preparing to display the replica. For example, the user entering his or her identifying information may trigger delivery of a one-time code, which would be required in addition to the identifying information in order to release the display of the replica.
A further variant of this incorporates a designated third party who must be consulted in some fashion for release of the replica. For example, the third party may have to agree to allow the replica to be displayed. Or, the third party may be required to create and enter a code, and then separately deliver the code to the user. The user then has to enter this code as part of the sequence to allow display of the replica.
It may be desirable for the use of a replica to be combined or correlated with other actions, such as presentation of incentives or personalized notes. In an example embodiment as shown in
A further variant on this example sees the replica enhanced with a personalized note 707—for example, in the form of a text comment from a friend who has given the user funds, or has even given the user the ‘card’ underlying the replica. The personalized message may instead be an image, a video, an audio recording, or any combination of these. The message is presented in the flow of utilizing the replica—before the replica is fully revealed, while it is revealed, or after it is no longer revealed. The message may also change states, depending on the context of the user or depending on the existence of or the outcome of the requested transaction. Further, if the replica is a replica of a card that has rules associated with it, such as a card that may be locked and unlocked, the incentive or personalized message may be presented in response to the lock or unlock activity.
From the foregoing it will be appreciated that, although specific embodiments of the invention have been described herein for purposes of illustration, various modifications may be made without deviating from the spirit and scope of the invention. Accordingly, the invention is not limited except as by the appended claims.
This application claims priority to U.S. provisional application No. 61/912,762, filed Dec. 6, 2013, which application is incorporated herein by reference, in its entirety, for any purpose. The entire disclosure of the prior application, from which a copy of the oath or declaration is supplied, is considered to be part of the disclosure of the instant application.
Number | Date | Country | |
---|---|---|---|
61912762 | Dec 2013 | US |