Claims
- 1. A method for conducting a payment card transaction comprising, at an intermediary having an identity distinct from said cardholder and said merchant, comprising:
(a) receiving and storing in said intermediary:
(i) an authentication password of said cardholder; and (ii) contact information for an issuing bank of said payment card; (b) receiving an access password from a computer of said cardholder to unlock said payment information; (c) providing at least a portion of said other payment information for use by a computer of said merchant; and (d) automatically providing said stored authentication password for use by said issuing bank in authenticating said cardholder by making use of said location information within said intermediary; thereby allowing said issuing bank to validate said transaction for said merchant and to fund said transaction.
- 2. The method of claim 1 where said intermediary is a software program in a memory of at least one of said computers.
- 3. The method of claim 2 where:
(i) said intermediary is a wallet; and (ii) said contact information is a network address.
- 4. The method of claim 1 where said access password is retrieved from a cookie storing said access password from a previous transaction.
- 5. The method of claim 1 implemented as part of a backwards-compatible transaction processing system configured to either:
(x) implement said method of claim 1; or (y) obtain said authentication password directly from said cardholder without assistance of said intermediary.
- 6. The method of claim 1 where said (y) is contingent upon determining that cardholder is not associated with an intermediary capable of operating with the method of claim 1.
- 7. The method of claim 1 where said (b) is performed after said cardholder computer has transmitted payment information to said merchant computer.
- 8. The method of claim 1 where said intermediary contains a plurality of authentication passwords for a plurality of payment cards.
- 9. The method of claim 1 implemented in a manner that eliminates at least one dispensable message among the communication-related steps of said method.
- 10. A method for conducting a payment card transaction comprising:
(a) receiving a request from a merchant computer to authorize a transaction involving a cardholder computer; (b) requesting an authentication password from said cardholder; (c) automatically receiving said authentication password via an intermediary having an identity distinct from said cardholder and said merchant, said intermediary:
(i) having stored therein said cardholder's authentication password; (ii) having stored therein contact information for said issuing bank; and (iii) having been accessed by said cardholder providing an access password; (d) authenticating said cardholder; and (e) validating said transaction for said merchant.
- 11. The method of claim 10 where said intermediary is a software program in a memory of at least one of said computers.
- 12. The method of claim 11 where:
(i) said intermediary is a wallet; and (ii) said contact information is a network address.
- 13. The method of claim 10 where said access password is retrieved from a cookie storing said access password from a previous transaction.
- 14. The method of claim 10 implemented as part of a backwards-compatible transaction processing system configured to be operable, in the alternative, to obtain said authentication password directly from said cardholder without assistance of said intermediary.
- 15. The method of claim 10 where said alternative is contingent upon determining that cardholder is not associated with an intermediary capable of operating with the method of claim 7.
- 16. The method of claim 10 where said (b) is performed after said cardholder computer has transmitted payment information to said merchant computer.
- 17. The method of claim 10 where said intermediary contains a plurality of authentication passwords for a plurality of payment cards.
- 18. The method of claim 10 where said (d) and (e) are performed, at least in part, within a processing module:
(x) interposable within an existing transaction processing system between said merchant and said cardholder; and (y) which intercepts, and sends to off-line processing, a communication involving said merchant which said existing transaction system is not configured to process in the absence of said module.
- 19. The method of claim 10 where said validating includes checking a categorical credit card constraint pertaining to said cardholder.
- 20. The method of claim 10 where:
(x) said (d) includes receiving a message proxy reduced in size from what would otherwise comprise a larger message; and (y) obtaining information needed for said authentication using an alternate communication mechanism, distinct from an existing communication link with said cardholder, as directed by said message proxy.
- 21. An apparatus for conducting a payment card transaction comprising, at an intermediary having an identity distinct from said cardholder and said merchant, comprising:
(a) means for receiving and storing in said intermediary:
(i) an authentication password of said cardholder; and (ii) contact information for an issuing bank of said payment card; (b) means for receiving an access password from a computer of said cardholder to unlock said payment information; (c) means for providing at least a portion of said other payment information for use by a computer of said merchant; and (d) means for automatically providing said stored authentication password for use by said issuing bank in authenticating said cardholder by making use of said location information within said intermediary; thereby allowing said issuing bank to validate said transaction for said merchant and to fund said transaction.
- 22. A computer-readable medium containing logic instructions for conducting a payment card transaction comprising, at an intermediary having an identity distinct from said cardholder and said merchant, comprising login instructions that when executed:
(a) receive and store in said intermediary:
(i) an authentication password of said cardholder; and (ii) contact information for an issuing bank of said payment card; (b) receive an access password from a computer of said cardholder to unlock said payment information; (c) provide at least a portion of said other payment information for use by a computer of said merchant; and (d) automatically provide said stored authentication password for use by said issuing bank in authenticating said cardholder by making use of said location information within said intermediary; thereby allowing said issuing bank to validate said transaction for said merchant and to fund said transaction.
- 23. A method for communicating with a message sender over a communications network, in relation to a transaction involving a third party to which said message pertains, comprising:
(a) establishing a communication link with a third party to which a first message pertains:
(i) said communication link being usable to facilitate a communication from a sender of said first message in relation to said third party; (b) receiving a second message comprising an abbreviated representation of said first message:
(i) which was sent from said sender as a proxy for said first message; (ii) said receiving of said second message occurring via said third party via said communication link with said third party; (c) using information in said second message:
(i) to locate and access said first message; (ii) over a communication path to said third party that is distinct from said communication link with said third party; (d) engaging in a communication with said third party pertinent to said first message; and (e) as a result of said communication, taking an action in relation to said first message.
- 24. The method of claim 23 where:
(i) said transaction is a purchase; (ii) said third party is a purchaser; (iii) said sender of said message is a merchant; (iv) said first message includes a request to authenticate said purchaser; (v) said communication in (d) includes a request for authentication information; and (vi) said action in (e) includes a validation of said purchaser.
- 25. The method of claim 24 where said validation includes checking a categorical credit card constraint pertaining to said cardholder.
- 26. The method of claim 23 where said second message is an identifier of a transaction to which said first message pertains.
- 27. The method of claim 23 where said (c) includes receiving said second message directly from said message sender.
- 28. The method of claim 23 where:
(i) said second message includes a location of said first message; (ii) said (c) includes obtaining said first message from said location using said communication path in (d).
- 29. An apparatus for communicating with a message sender over a communications network, in relation to a transaction involving a third party to which said message pertains, comprising:
(a) means for establishing a communication link with a third party to which a first message pertains:
(i) said communication link being usable to facilitate a communication from a sender of said first message in relation to said third party; (b) means for receiving a second message comprising an abbreviated representation of said first message:
(i) which was sent from said sender as a proxy for said first message; (ii) said receiving of said second message occurring via said third party via said communication link with said third party; (c) means for using information in said second message:
(i) to locate and access said first message; (ii) over a communication path to said third party that is distinct from said communication link with said third party; (d) means for engaging in a communication with said third party pertinent to said first message; and (e) means for taking an action in relation to said first message, as a result of said communication.
- 30. A computer-readable medium for communicating with a message sender over a communications network, in relation to a transaction involving a third party to which said message pertains, comprising logic instructions that when executed:
(a) establish a communication link with a third party to which a first message pertains:
(i) said communication link being usable to facilitate a communication from a sender of said first message in relation to said third party; (b) receive a second message comprising an abbreviated representation of said first message:
(i) which was sent from said sender as a proxy for said first message; (ii) said receiving of said second message occurring via said third party via said communication link with said third party; (c) use information in said second message:
(i) to locate and access said first message; (ii) over a communication path to said third party that is distinct from said communication link with said third party; (d) engage in a communication with said third party pertinent to said first message; and (e) take an action in relation to said first message, as a result of said communication.
- 31. A method for communicating with a message sender over a communications network, in relation to a transaction involving a third party to which said message pertains, comprising:
(a) obtaining a first message to be sent to a recipient over a communications network; (b) establishing a communication link with a third party to which said first message pertains:
(i) said communication link being usable to facilitate a communication, regarding said third party, to said recipient; (c) obtaining a second message comprising a proxy for said first message; (d) transmitting said second message to said recipient:
(i) said third party and said recipient being in communication with each other; (ii) said transmitting occurring via said third party via said communication link therewith; (e) thereby enabling said recipient to use information in said second message:
(i) to locate and access said first message; (ii) over a communication path to said third party that is distinct from said communication link with said third party; (iii) engage in a communication with said third party pertinent to said first message; and (iv) as a result of said communication, take an action in relation to said first message.
- 32. The method of claim 31 performed, at least in part, within a processing module:
(x) interposable within an existing transaction processing system between said sender and said third party; and (y) which intercepts, and sends to off-line processing, a communication involving said sender which said existing transaction system is not configured to process in the absence of said module.
- 33. The method of claim 31 implemented in a manner that eliminates at least one dispensable message among the communication-related steps of said method.
- 34. In a method for authenticating of a cardholder in an online purchase transaction, nominally including (1) a merchant querying a directory server a request to verify whether said cardholder's card participates in a three party authentication protocol, (2) said directory server querying an access control server to determine whether said cardholder individually participates in said protocol, and (3) access control server authenticating said cardholder after affirmative responses to queries in (1) and (2), the improvement comprising eliminating at least one of said steps (1) and (2) in favor of an implication that such eliminated step was successful based on the successful outcome of a subsequent step.
- 35. The method of claim 34 implemented as part of an at least three party authentication method involving a software wallet.
- 36. The method of claim 35 implemented as part of a four party authentication method involving a general authenticator.
- 37. The method of claim 34 where at least one of said steps (1)-(3) is implemented using a skeleton message.
- 38. The method of claim 34 implemented, at least in part, using a merchant appliance.
- 39. A self-contained apparatus for offering updated functionality to an existing system for conducting a first transaction between a first party and a second party, while maintaining backwards compatibility, comprising:
(a) an I/O interface for connecting with said existing system; (b) a processing subsystem:
(i) interposable within said existing system via said I/O interface without necessarily requiring any modification to said existing system; and (ii) containing a processor and logic instructions therefor which when executed:
(A) monitors a plurality of communications between said parties; (B) intercepts a communication which said system is not configured to process in the absence of said apparatus: (C) establishes a communication path with a third party, by using information within said communication; (D) conducts a second transaction with said third party over said established communication path, and (E) returns a result thereof to at least one of said parties to said transaction.
- 40. The apparatus of claim 39 further configured to pass through a communication that is processable by said existing system without the aid of said apparatus.
- 41. The apparatus of claim 39 where:
(i) said first transaction is a payment transaction; (ii) said first party is a cardholder and said second party is a merchant; (iii) said second transaction includes authentication of said cardholder; and (iv) said information within said communication pertains to an issuer of said payment card.
- 42. The apparatus of claim 39 where at least one of said parties is eligible to participate in an authentication scheme involving said third party, and said second transaction is contingent upon confirming said participation.
- 43. The method of claim 42 where said authentication scheme is offered by a credit card issuer.
- 44. A self-contained apparatus for offering updated functionality to an existing system for conducting a first transaction between a first party and a second party, while maintaining backwards compatibility, comprising:
(a) means for interfacing with said existing system without necessarily requiring any modification to said existing system; and (b) means for monitoring a plurality of communications between said parties; (c) means for intercepting a communication which said system is not configured to process in the absence of said apparatus: (d) means for establishing a communication path with a third party, by using information within said communication; (e) means for conducting a second transaction with said third party over said established communication path, and (f) means for returning a result thereof to at least one of said parties to said transaction.
- 45. A computer-readable medium for implementing a computer-operated module for offering updated functionality to an existing system for conducting a first transaction between a first party and a second party, while maintaining backwards compatibility, comprising computer-executable logic instructions that when executed:
(a) monitor a plurality of communications between said parties; (b) intercept a communication which said system is not configured to process in the absence of said apparatus: (c) establish a communication path with a third party, by using information within said communication; (d) conduct a second transaction with said third party over said established communication path, and (e) return a result thereof to at least one of said parties to said transaction.
- 46. A method for offering updated functionality to an existing system for conducting a first transaction between a first party and a second party, while maintaining backwards compatibility, comprising:
(a) interposing a hardware-based communications routing apparatus to said existing system without modifying any element said existing system; (b) monitoring a plurality of communications between said parties; (c) intercepting a communication which said system is not configured to process in the absence of said apparatus: (d) establishing a communication path with a third party, by using information within said communication; (e) conducting a second transaction with said third party over said established communication path, and (f) returning a result thereof to at least one of said parties to said transaction.
- 47. The method of claim 46 further configured to pass through a communication that is processable by said existing system without the aid of said apparatus.
- 48. The method of claim 46 where:
(i) said first transaction is a payment transaction; (ii) said first party is a cardholder and said second party is a merchant; (iii) said second transaction includes authentication of said cardholder; and (iv) said information within said communication pertains to an issuer of said payment card.
- 49. The method of claim 48 where said second transaction includes checking a categorical credit card constraint pertaining to said cardholder.
- 50. The method of claim 46 where at least one of said parties is eligible to participate in an authentication scheme involving said third party, and said second transaction is contingent upon confirming said participation.
- 51. The method of claim 50 where said authentication scheme is offered by a credit card issuer.
- 52. The method of claim 46 where
(x) said intercepted communication includes a message proxy reduced in size from what would otherwise comprise a larger message; and (y) said second transaction includes obtaining said result using an alternate communication mechanism, distinct from said established communication path, as directed by said message proxy.
- 53. The method of claim 46 implemented in a manner that eliminates at least one dispensable message among the communication-related steps of said method.
- 54. A method for restricting payment card usage, comprising:
(a) establishing a payment card for a cardholder; (b) soliciting from said user one or more quantitative constraints on usage of said payment card;
(i) said constraints being expressed in a manner reflecting categorical distinctions between permissible and impermissible uses to be evaluated at the time of sale; (c) receiving said one or more quantitative constraints for said cardholder; (d) storing said one or more quantitative constraints in a memory accessible to an entity wishing to conduct a transaction with said cardholder; and (e) issuing, for said cardholder, a payment card associated with said constraints.
- 55. The method of claim 54, further comprising
(f) checking said memory upon said cardholder's attempt to use said payment card; and (g) informing said entity of the outcome of said checking.
- 56. The method of claim 55 where said (f) includes:
(i) obtaining payment information for a merchant; and (ii) using said received information to check said constraints.
- 57. The method of claim 54 where said quantitative constraints include purchase limits over a predetermined interval distinct from the payment card billing cycle.
- 58. The method of claim 54 where said quantitative constraints include constraints on an associated cardholder's ability to purchase within specified categories.
- 59. The method of claim 54 where said quantitative constraints include constraints on an associated cardholder's ability to purchase from certain merchants.
- 60. The method of claim 54 where said memory is located on said payment card.
- 61. The method of claim 54 where said memory is located on a computer server configured for transaction processing.
- 62. The method of claim 54 further comprising allowing said cardholder to dynamically modify said constraints.
- 63. A method for restricting payment card usage, comprising:
(a) obtaining payment card information for a cardholder:
(i) said card being associated with one or more quantitative usage constraints; (ii) said constraints being expressed in a manner reflecting categorical distinctions between permissible and impermissible uses to be evaluated at the time of sale; (b) checking said one or more quantitative constraints upon said cardholder's attempt to use said payment card; (c) processing a transaction using said payment card upon determination that no relevant constraint is violated.
- 64. The method of claim 63 where said (b) includes:
(i) obtaining payment information for a merchant; and (ii) using said received information to check said constraints.
- 65. The method of claim 64 where at least one of said (a) and (b) includes obtaining said payment information from an intermediary:
(x) having contact information for an issuer of said payment card; and (y) said contact information enabling said intermediary to transmit said payment information via a communication path that does not include said cardholder.
- 66. The method of claim 64 where said payment information includes a card authentication password.
- 67. The method of claim 63 where at least one of said steps includes:
(x) receiving a message proxy reduced in size from what would otherwise comprise a larger message; and (y) obtaining information needed for said step using a communication mechanism as directed by said message proxy.
- 68. An apparatus for restricting payment card usage, comprising:
(a) means for obtaining a payment card information for a cardholder:
(i) said card being associated with one or more quantitative usage constraints; (ii) said constraints being expressed in a manner reflecting categorical distinctions between permissible and impermissible uses to be evaluated at the time of sale; (b) means for checking said one or more quantitative constraints upon said cardholder's attempt to use said payment card; (c) means for processing a transaction using said payment card upon determination that no relevant constraint is violated.
- 69. The apparatus of claim 68 implemented, at least in part, within a processing module:
(x) interposable within an existing transaction processing system between a merchant and said cardholder; and (y) which intercepts, and sends to off-line processing, a communication involving said merchant which said existing transaction system is not configured to process in the absence of said module.
- 70. The apparatus of claim 68 further comprising means for eliminates at least one dispensable message among the communications involved in said transaction.
- 71. A method for implementing a cardholder authentication scheme, usable in connection with an online purchase transaction, comprising:
(a) initializing a computer-readable wallet with a cardholder's payment information suitable for use in an on-line transaction involving a three party cardholder authentication scheme:
(i) including at least said cardholder, a merchant, and an issuing bank; (ii) said cardholder having an authentication password for authentication at said issuing bank prior to said issuing bank authorizing said transaction to said merchant; (b) eliminating the need for said cardholder to transmit said payment information directly to a merchant by invoking said wallet to assist said cardholder in a purchase transaction; (c) at the wallet, transmitting a request for an access password from the cardholder; (d) receiving said access password from said cardholder; (e) verifying said access password, and allowing said cardholder to access said payment information (f) enabling transmission of said payment information to said merchant, thereby enabling said merchant to relay relevant information to an issuing bank to authorize the purchase.
- 72. The method of claim 71 where said payment information includes said authentication password.
- 73. The method of claim 71 where said (f) includes automatically filling in a purchase page of said merchant with said payment information.
- 74. The method of claim 73 further comprising receiving a validation of said payment information from said cardholder.
- 75. The method of claim 73 further enabling said cardholder to transmit said payment information to said merchant.
- 76. The method of claim 71 where said wallet and said a purchase page of said merchant are hyperlinked to facilitate transmission of said payment information
- 77. In a transaction processing method involving a three party cardholder authentication scheme (i) including at least said cardholder, a merchant, and an issuing bank, with (ii) said cardholder having an authentication password for authentication at said issuing bank prior to said issuing bank authorizing said transaction to said merchant, the improvement comprising offering said cardholder an option to either: (i) participate in a conventional 3PAM authentication scheme; or (ii) participate in a 3PAM authentication scheme incorporating a computer-readable wallet for presentation of payment information.
- 78. The method of claim 77 further comprising, upon said cardholder's selection of said (i), soliciting said authentication password from said cardholder.
- 79. The method of claim 77 further comprising, upon said cardholder's selection of said (ii), soliciting from said cardholder a wallet access password to obtain therefrom said authentication password.
- 80. The method of claim 79 where said authentication password and said access password are the same.
RELATED APPLICATIONS
[0001] This application claims the benefit of U.S. Provisional Application No. 60/316,677, filed Aug. 31, 2001, and U.S. Provisional Application No. 60/340,675, filed Oct. 30, 2001.
Provisional Applications (2)
|
Number |
Date |
Country |
|
60316677 |
Aug 2001 |
US |
|
60340675 |
Oct 2001 |
US |