The invention relates to a method of redeeming cash value vouchers in particular, but not exclusively, vouchers distributed via portable electronic devices, such as mobile telephones.
There is a long history of consumer oriented businesses using cash value vouchers as a promotional tool to attract new customers and retain existing customers. The most widely established form of voucher is a printed voucher which can be redeemed at the point of sale in a shop. Typically, these will have a bar code printed on them, which can then be scanned in the same manner as conventional bar code and the use of bar codes helps to eliminate fraud and reduce the transaction costs for the retailer.
Whilst such paper based vouchers have been a successful promotional tool for many years, they suffer from a high up-front cost in producing the vouchers and as they are a paper based transaction also suffer from high handling costs. Due to these constraints, voucher schemes tend to have to be quite large to recoup the fixed costs. Consumers increasingly dislike carrying paper vouchers with them and as a consequence, redemption rates of paper coupons can be very low unless they are of high value. Paper vouchers of high face-value carry a significant financial risk as advances in copying technology has made it easier to reproduce vouchers fraudulently.
There have been a number of proposals to address these problems by using mobile telephones or the internet as the distribution means for an electronic voucher. In principle, the distribution costs can be kept much lower than with a paper based system, in particular for small scale voucher distributions and since the voucher is redeemed electronically, it reduces the risk of fraud or over-redemption.
However, to be able to function effectively such an e voucher scheme has to be able to work with existing point of sale equipment, otherwise few retailers would be prepared to accept the vouchers. Existing systems involve sending a bar code image to the mobile phone, which can then be scanned in the same way as an ordinary product bar code. This system suffers from the problem that many simpler mobile phones do not support the graphics required and also in practice the bar code scanner often do not read the bar code on the mobile phone display successfully. There is also no industry standard for graphical display and so the make and model of the handset must be identified before sending a bar code to a mobile phone. This is time-consuming and expensive and in practice, many customers are unwilling to engage in such a convoluted process. An additional problem with such bar code solutions is the risk of multiple redemptions as a bar code itself does not provide any means of validating if the voucher has been used before.
A further solution has been proposed in GB2397684 (Smart Voucher) in which a 19 digit payment card number is sent to a mobile phone together with the value of the voucher to be redeemed. The redemption can be carried out by keying in the data via a dedicated terminal. This approach suffers from a number of problems as it is underpinned by the notion of an “account” and a “balance”. This proposes fairly high infrastructure costs to allow credit to be applied to the “account” by a participating retailer and existing legislation requires operators to implement a KYC (“Know Your Customer”) process to prevent such “accounts” and “balances” to be used for money-laundering purposes. KYC processes are onerous, expensive and time-consuming to implement and are unpopular with retailers and customers alike. The prevailing geo-political climate indicates such processes and scrutiny will intensify going forward. Additionally, the provision of the voucher value together with the voucher represents a potential security hole.
EP1262930A2 relates to Voucher Redemption in Mobile Networks. It requires the mobile to directly interface with the retailer's transaction system in order to redeem the voucher. The voucher is then authenticated by means of a secure method, using a “secure key”. This creates a problem with reliably linking the mobile with the retail system in order to redeem the voucher and requires additional hardware. It would also be possible to redeem the same voucher twice.
AU 2003236476 relates to a voucher purchase and redemption system. It again requires the mobile to directly interface with the retailer's transaction system in order to redeem the voucher.
The present invention therefore seeks to provide a method of distributing and redeeming cash value vouchers via portable electronic vouchers which obviates the issues of acceptability to many retailers inherent in the known systems.
According to a first aspect of the invention there is provided a method for redeeming cash value vouchers using an ISO/IEC 7812-1 and/or ANSI X4.13 compliant POS terminal comprising the steps of providing a cash value voucher comprising an alphanumeric number and having a cash value, which cash value is not related to the number, entering said number at an ISO/IEC 7812-1 and/or ANSI X4.13 compliant POS terminal, the POS terminal forming a concatenated string comprising said number, POS terminal identifier and an issuer identification number and sending the string to an acquirer, which acquirer after validating the string sends the string to the issuer, wherein the issuer authenticates the voucher number and amends the string such that the string now comprises the cash value, POS terminal identifier and an issuer identification number, which amended string authorises payment for the value of the cash value, the amended string being transmitted via the acquirer to the POS terminal to authorise the redemption of the voucher for the cash value.
According to a second aspect, the top up terminal validates the voucher by the following steps:
This sequence of redemption avoids unnecessary processing time by determining the simplest conditions first with each subsequent step having a greater range of responses. This makes the voucher processing very fast and so reduces time for the retailer to process a voucher. The combination of variable also make fraudulent redemption statistically unlikely
Preferably, the string is entered by swiping a card through the terminal. Preferably, the redemption logic comprises the further step of: Is the Voucher Number valid at this time? Y/N
Preferably, the redemption logic comprises the further step of: Which redemption device is requesting redemption where the redemption device serial number or other means of identification is associated in the host system with a specific physical location. Preferably, the redemption logic comprises the further step of: Is the Voucher Number valid at the Device ID Y/N. Preferably, the method comprises the further step of returning the cash value voucher to the mobile phone.
The method according to the invention closely replicates how tokens are handled today and effectively dematerialises the token and redemption process.
The solution according to the invention obviates the inherent problems in the known solutions by using existing point of sale equipment to validate and redeem the voucher. The use of existing equipment and standard processes developed by card payment schemes not only reduces the cost of adopting the voucher scheme for the retailer but as the existing equipment is familiar and trusted, there is consequently a much lower cost in terms of retailer training and also a greater trust and therefore acceptance than for a solution requiring new equipment.
Exemplary embodiments of the invention will now be described in greater detail with reference to the examples.
The EFT (electronic funds transfer) network is one of the most widely adopted point of sale equipment and is now found in even most small retail stores and businesses. The EFT network operates in compliance with international standards, specifically ISO/IEC 7812-1:2000 and ANSI X4.13 and these standards apply to both standalone payment terminals and also integrated electronic point of sale equipment, in which the payment terminal is integrated with a cash register. According to these standards any payment card will be given a sixteen digit number, the first six digits of which identifier the issuer and product type with the next 9 digits forming the customer or card identifier and the final digit being a check digit.
When a customer or retailer wishes to validate a transaction request, the card is read either via the magnetic strip or via the chip. The POS terminal generates a concatenated string including an identifier corresponding to the card number and also a string corresponding to the sum for which validation has been requested. The string also includes further parameters including time and date of request, the transaction type and an identifier for the particular terminal. The POS then calls an acquirer, which checks that the data is in the correct format and the acquirer then passes the request to the card issuer. The card issuer then either authorises or refuses the requested charge back to the acquirer, which then transmits the resultant authorisation or refusal to the POS terminal.
In an example relating to a promotion on wine, participating retailers are provided with a swipe card having the same physical size and properties as a standards compliant credit card. The card is provided with a 16 digit number comprising four digits 6337 as the Issuer's identification number or IIN followed by 12 zeros.
The promoter sends a standard SMS message to the mobile telephone of a potential customer consisting of a six digit code, which code represents a cash value electronic voucher worth, say, £5.99. As modern chip and pin POS terminals support alphanumeric characters, the number may consist of digits and/or letters, although for simplicity digits will most be used.
When the customers wishes to redeem the voucher, the retailer swipes the swipe card through their standard EFTPOS terminal and when prompted for the value of the authorisation request keys in the voucher code and hits return. The EFTPOS terminal then forms the concatenated string required by the acquirer's validation check in the conventional manner and in this case the acquirer regards the voucher code to be a monetary sum.
The acquirer then seeks authorisation from the issuer. The issuer recognises from the card number that the request relates to an electronic voucher. The voucher number is then authenticated. If the voucher number is valid, then the issuer authorises a payment corresponding to the voucher value, in this case £5.99 and then cancels the vouchers. If the voucher number is invalid, then the issuer returns a standard refusal message. In the case of an authorised payment, the acquirer then returns the voucher authorisation to POS for the sum of £5.99 together with a redemption reference code. This is then printed by the POS terminal to provide a paper trail for the retailer and issuer in the same manner as for a credit card and the retailer will be reimbursed through the same mechanisms as for credit card payments.
Although in the example a six character code is used, it would be possible to use code lengths of different lengths up to a maximum of ten digits. It would also be possible to enter the sixteen digit number manually.
In a second example, also relating to a wine promotion, the promotion is not restricted to participating retailers. In this example, the promoter sends a standard SMS message to the mobile telephone of a potential customer consisting of a sixteen digit code, which code represents a cash value electronic voucher worth, say, £5.99. The code in this case comprises the same four digits relating to the issuer, say 6337, followed by 01 to denote a different product followed by a further ten digits.
To redeem the voucher, the retailer or customer simply keys in the 16 digit number into the EFTPOS terminal when prompted for the card number. When prompted for the transaction value, a zero sum is entered. The EFTPOS terminal then forms the concatenated string required by the acquirer's validation check in the conventional manner.
The acquirer then seeks authorisation from the issuer. The issuer recognises from the card number that the request relates to an electronic voucher. The “card” or voucher number is then authenticated. If the “card” or voucher number is valid, then the issuer authorises a payment corresponding to the voucher value, in this case £5.99 and then cancels the vouchers. If the voucher number is invalid, then the issuer returns a standard refusal message. In the case of an authorised payment, the acquirer then returns the voucher authorisation to POS for the sum of £5.99 together with a redemption reference code. As with the previous example this is then printed by the POS terminal to provide a paper trail for the retailer and issuer in the same manner as for a credit card and the retailer will be re-imbursed through the same mechanisms as for credit card payments.
In both examples the electronic voucher emulates a standard payment card authorisation request from the point of view of the retailer and acquirer and thus takes advantage of the existing infrastructure in place in shops. In contrast to known systems the authorised redemption sum is generally not the same as the figure assumed to be the sum for which authorisation is requested by the acquirer.
It is also possible for some EFTPOS terminals to emulate some of the steps alluded to above as a software program invoked by a single keystroke or function request obviating the need for either a plastic card or manual entry of the voucher number. It would also be possible to distribute the vouchers via e-mail, television, radio, post or the Internet.
All the parameters for a specific campaign are set at the campaign level in the host system. In an exemplary embodiment, these would include:
Optional parameters are:
In use, a consumer will be provided with an electronic voucher comprising an alphanumeric string and a cash value for the voucher. The voucher can be distributed via SMS to a mobile phone, e-mail or more traditional methods such as paper. The voucher number may be prefixed by an (IN) Issuers Identification Number issued by national standards bodies such as APACS in the UK. The voucher number presented to the consumer now resembles a credit or charge card number in that it is represented as sixteen numeric digits which may be split into four groups of four for easier reading. By way of example, a voucher number 12345678 from Issuer 633729 might be represented by the number 6337 2910 1234 5678 where additional digitals (1 & 0) in this case used to denote the transaction type of other information To redeem the voucher, the retailer may process the number as if it where a credit card by typing the full 16-digit numeric string is typed in at the electronic top up terminal followed by the value of the voucher as stated on the SMS on the consumers phone or other media. In this manner, a voucher redemptions mirrors exactly an EFT transaction and so can be accepted by any retailer who processes EFT transactions and whose terminal can be configured to route transactions based on IIN's. Alternatively, depending on the terminal design a swipe card could be used or a small software program could be installed and preconfigured to add the IIN to the Voucher No. to streamline the process. The top up terminal then transmits a redemption message to a service provider's server. The redemption message contains the following elements: Voucher number; redemption device type (in this example a top up terminal) and the terminal ID and a mobile telephone number.
The voucher is then validated using the following sequential logic:
In the case that the device used to validate the voucher may be programmed to collect the mobile phone number of the consumer redeeming the voucher, then the redemption message may include the mobile phone number and the following steps:
Then for both EFTPOS and top up terminals
An N value at any stage of the sequential validation logic will generate an Invalid Redemption message, which is transmitted to the device requesting redemption detailing why the redemption has failed. Step 1 relates to the validity of the request message and Step 4 provides the feature of checking whether an attempt has been made to previously redeem the voucher and if so, whether the whole voucher was redeemed or merely part of the voucher. It would also permit multiple use of a voucher. For example, if the voucher related to a cinema ticket, it would be possible for a single voucher to enable say 4 trips to the cinema rather than having to issue four separate vouchers for the same value to the same mobile telephone.
Depending on the scheme design, it is possible to include further steps, which can be switched on or off depending on the requirements of the individual scheme. These additional steps include:
Step 5 permits a time limited scheme for example. Step 6 permits schemes that are limited to a particular retailer or retail group, for example.
In the event that all Y values are generated, then a valid redemption message is generated. The redemption message may comprise a concatenated alphanumeric string comprising a further alphanumeric string and if not all the voucher value has been exhausted, a cash value, which may be zero. If not all of the voucher value has been exhausted, a non zero value is returned to the redemption device, which value will be lower than the original cash value.
The cash value returned as part of the valid redemption message is then stored against the device ID. The system then only needs to hold the balance against a retailer account rather than a personal account with the known systems. The retailer account comprises simply the balance of net difference of issued and redeemed vouchers, reflecting any payments or credits at any given point in time. The balance of this account could then be settled on a monthly basis using the standard industry mechanisms.
Once the redemption message is returned to the device, if there is a balance on the voucher value, then this is returned to the consumer. This can be in the same manner that the original voucher was distributed such as a slip of paper from the top up terminal, an SMS to the mobile phone number, by re-swiping the swipe card or via an e-mail. This approach permits a much quicker and cheaper roll out of individual schemes.
The method according to this aspect of the invention permits the sale and redemption of variable value vouchers which replicates all aspects of traditional gift voucher schemes without the need to maintain personal accounts.
Number | Date | Country | Kind |
---|---|---|---|
0524053.6 | Nov 2005 | GB | national |
0603354.2 | Feb 2006 | GB | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/GB2006/004402 | 11/24/2006 | WO | 00 | 6/30/2008 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2007/060451 | 5/31/2007 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
4591190 | Clark | May 1986 | A |
5265008 | Benton et al. | Nov 1993 | A |
5642419 | Rosen | Jun 1997 | A |
5727153 | Powell | Mar 1998 | A |
5832458 | Jones | Nov 1998 | A |
5903880 | Biffar | May 1999 | A |
6134533 | Shell | Oct 2000 | A |
6330544 | Walker et al. | Dec 2001 | B1 |
6370514 | Messner | Apr 2002 | B1 |
6516302 | Deaton et al. | Feb 2003 | B1 |
6609104 | Deaton et al. | Aug 2003 | B1 |
6934533 | Joyce et al. | Aug 2005 | B2 |
7149706 | Duchow | Dec 2006 | B2 |
7152045 | Hoffman | Dec 2006 | B2 |
7209733 | Ortiz et al. | Apr 2007 | B2 |
7308419 | Myers | Dec 2007 | B1 |
7370012 | Karns et al. | May 2008 | B2 |
7493269 | Fostick et al. | Feb 2009 | B2 |
7788129 | Antonucci et al. | Aug 2010 | B2 |
7837125 | Biskupski | Nov 2010 | B2 |
7984851 | Macguire | Jul 2011 | B2 |
8290876 | Powell | Oct 2012 | B1 |
8554609 | Corpus | Oct 2013 | B1 |
8566167 | Munjal | Oct 2013 | B2 |
20020038237 | Duchow | Mar 2002 | A1 |
20020042753 | Ortiz et al. | Apr 2002 | A1 |
20020183046 | Joyce et al. | Dec 2002 | A1 |
20030018523 | Rappaport et al. | Jan 2003 | A1 |
20030055756 | Allan | Mar 2003 | A1 |
20030070080 | Rosen | Apr 2003 | A1 |
20030074259 | Slyman et al. | Apr 2003 | A1 |
20030083934 | Fostick et al. | May 2003 | A1 |
20030141359 | Dymovsky et al. | Jul 2003 | A1 |
20030236712 | Antonucci et al. | Dec 2003 | A1 |
20040039919 | Takayama et al. | Feb 2004 | A1 |
20040058728 | Fayter et al. | Mar 2004 | A1 |
20040088258 | McCoy et al. | May 2004 | A1 |
20040181463 | Goldthwaite et al. | Sep 2004 | A1 |
20040193499 | Ortiz et al. | Sep 2004 | A1 |
20040254836 | Emoke Barabas et al. | Dec 2004 | A1 |
20040267663 | Karns et al. | Dec 2004 | A1 |
20050149391 | O'Shea et al. | Jul 2005 | A1 |
20050228756 | Bealke et al. | Oct 2005 | A1 |
20050247777 | Pitroda | Nov 2005 | A1 |
20060026070 | Sun | Feb 2006 | A1 |
20060047570 | Lenderking et al. | Mar 2006 | A1 |
20060060445 | Molbak | Mar 2006 | A1 |
20060069654 | Beach et al. | Mar 2006 | A1 |
20060129456 | Walker et al. | Jun 2006 | A1 |
20060184399 | Goldstein | Aug 2006 | A1 |
20060265284 | Moodie et al. | Nov 2006 | A1 |
20070078710 | Bender | Apr 2007 | A1 |
20070078761 | Kagan et al. | Apr 2007 | A1 |
20070088610 | Chen | Apr 2007 | A1 |
20070156517 | Kaplan et al. | Jul 2007 | A1 |
20070215696 | Macnish | Sep 2007 | A1 |
20080010114 | Head | Jan 2008 | A1 |
20080065478 | Kohlmeier et al. | Mar 2008 | A1 |
20080065490 | Novick et al. | Mar 2008 | A1 |
20080097844 | Hsu et al. | Apr 2008 | A1 |
20080140520 | Hyder et al. | Jun 2008 | A1 |
20080166998 | Sun et al. | Jul 2008 | A1 |
20080167991 | Carlson et al. | Jul 2008 | A1 |
20080195536 | Karns et al. | Aug 2008 | A1 |
20080201226 | Carlson et al. | Aug 2008 | A1 |
20080249922 | Kirch et al. | Oct 2008 | A1 |
20080281680 | Laor | Nov 2008 | A1 |
20080300970 | Scheibe | Dec 2008 | A1 |
20080319846 | Leming et al. | Dec 2008 | A1 |
20090018908 | Dersovitz | Jan 2009 | A1 |
20090030744 | Yamada | Jan 2009 | A1 |
20090070218 | Farmanfarmaian | Mar 2009 | A1 |
20090076912 | Rajan et al. | Mar 2009 | A1 |
20090125429 | Takayama | May 2009 | A1 |
20090132380 | Tymm | May 2009 | A1 |
20090150234 | Darst et al. | Jun 2009 | A1 |
20090164366 | Blythe | Jun 2009 | A1 |
20090283589 | Moore et al. | Nov 2009 | A1 |
20090293112 | Moore et al. | Nov 2009 | A1 |
20090313105 | Magnusson | Dec 2009 | A1 |
20100088166 | Tollinger | Apr 2010 | A1 |
20100211491 | Kagan et al. | Aug 2010 | A1 |
20100274659 | Antonucci et al. | Oct 2010 | A1 |
20100274678 | Rolf et al. | Oct 2010 | A1 |
20100312626 | Cervenka | Dec 2010 | A1 |
20110060691 | Grossman et al. | Mar 2011 | A1 |
20110213652 | Gillen et al. | Sep 2011 | A1 |
20110302085 | Bain | Dec 2011 | A1 |
20120089468 | Guziel | Apr 2012 | A1 |
20120101831 | Pitroda et al. | Apr 2012 | A1 |
20120239474 | Healy et al. | Sep 2012 | A1 |
20130006861 | McCoy et al. | Jan 2013 | A1 |
20130238497 | Ramachandran et al. | Sep 2013 | A1 |
20130268441 | Hibbard et al. | Oct 2013 | A1 |
20140067691 | Pitroda et al. | Mar 2014 | A1 |
20140081734 | Gangi | Mar 2014 | A1 |
Number | Date | Country |
---|---|---|
1564667 | Aug 2005 | EP |
Entry |
---|
American National Standard Specification for Credit CardANSIX4.13-1971 approved Apr. 28, 1971 by ANS institute. |
The last coupon: Journal of Accountancy, Aug. 1980, 150, 000002, Proquest Central, p. 24. |
An analysis of experimental buying, Fred W Morgan, Academy of Marketing Science, Journal Winter/ Spring 1978, 6, 1/2, Proquest Central p. 12. |
Role of product related conversations, Arndt Johan, Journal of Marketing research, Aug. 1967, 4, Proquest Central, p. 291. |
Number | Date | Country | |
---|---|---|---|
20090132380 A1 | May 2009 | US |