1. Technical Field
The invention relates generally to electronic transaction technology. More particularly, this invention relates to a system and method for secure online transactions.
2. Description of the Prior Art
The explosive growth of the Internet is changing the ways in which we communicate, conduct business, and pursue entertainment. A few years ago, electronic commerce (E-commerce) was just an interesting concept. By 1999, however, it had become the hottest thing around. Today, not only are consumers buying an enormous volume of goods or services over the Internet, but the business-to-business E-commerce has taken off as well.
As online transactions grow, a higher rate of charge-backs also grows due to fraudulent transactions. According to one report, online fraud is ten times higher than in the real world. Merchants bear the cost of fraud 10 to 15 per cent of the time if a credit card is present, while E-commerce retailers bear the cost about 25 per cent of the time.
The security of online transactions has become a major concern for the user and the merchant, as well as for the credit card issuers. If fraudulent transactions are minimized, the confidence involved parties have in online transactions can be greatly increased, and online transactions can make a great jump in e-commerce world.
In responding to that need, several approaches have been developed. For example, MasterCard and VISA have cooperatively developed the Secure Electronic Transactions (SET) Protocol. SET combines ideas from the previous proposals by MasterCard and VISA. The SET Secure Electronic Transaction™ protocol is an open industry standard developed for the secure transmission of payment information over the Internet and other electronic networks. SSL Secure Socket Layer (SSL) (developed by Netscape Communications Company) is a standard that encrypts data between a Web browser and a Web server. SSL does not specify what data are sent or encrypted. In an SSL session, all data sent are encrypted.
SET uses a system of locks and keys along with certified account IDs for both consumers and merchants. Then, through a unique process of encrypting or scrambling the information exchanged between the shopper and the online store, SET ensures a payment process that is convenient, private and, most of all, secure.
SET has numerous advantages. For example, it establishes industry standards to keep the user's order and payment information confidential, increases integrity for all transmitted data through encryption, and provides authentication that a cardholder is a legitimate user of a branded payment card account. However, to deploy SET, digital certificates are required for all participating parties.
VISA has unveiled another system that lets a user attach a password to his credit card number called 3D Secure. This ensures that if a thief gets hold of the user's card number the card cannot be used over the Internet unless the thief has the password that only the user knows. To take advantage of 3D Secure, the user must go to the site of issuer of his VISA card and register a password for the card. This enrollment process takes the user's password and attaches it to his card number. When he visits an online merchant and makes a purchase by entering the VISA credit card number, he is prompted for his password for the card before going through the regular transaction.
MasterCard also developed Secure Payment Application™ (SPA), a solution for securing credit and debit payments between the user, online merchants and members, to address the issue of cardholder authentication. SPA is an issuer-based security scheme that takes advantage of MasterCard's Universal Cardholder Authentication Field (UCAF) infrastructure. UCAF is a universal, multipurpose data transport mechanism implemented by merchants for collecting authentication information generated by issuers and cardholders. Once collected, this information is communicated to the issuer in the payment authorization request and provides explicit evidence that it is the legitimate cardholder who originated the transaction. UCAF supports a variety of issuer security and authentication approaches including SPA, smart cards and more.
SPA adds a significant security component by including a unique cardholder authentication value for each transaction that can be verified by the issuer during payment authorization. Merchants are responsible for collecting and passing this cardholder authentication value, and including it along with other payment information, at the time of authorization.
To ensure proper cardholder authentication, the, prior art approaches require that users go through an added authentication step to complete their purchase. Currently this step adds confusion and is cumbersome for the user to understand. Therefore, user adoption remains the biggest problem for these schemes.
What is desired is a secure solution to make the added authentication step intuitive and easy to understand by the user.
What is further desired is to make the secure solution have a user interface that resembles the offline credit card transactions, so that it may be widely accepted by the online world.
What is further desired is a solution that integrates with the credit card issuer when a personal identification number is required for the user to perform online transactions by the credit card issuer.
The presently preferred embodiment of the invention provides an approach for performing secure online transactions which has a user interface that is intuitive and easy to understand. It integrates an online wallet service with credit card issuers that provide online credit card authentication services.
One preferred embodiment comprises a method for performing secure online transactions. The user first registers to the merchant by providing his personal information and credit card information. The user then logs on to start the transaction. When the user checks out, the use is prompted with a keypad interface for PIN entry or an interface that resembles an offline transaction receipt.
Another equally preferred embodiment comprises an apparatus that stores personal information and credit card information. The apparatus comprises a level-two authentication password that protects the user's credit card information. The apparatus comprises an authentication technique that is integrated by the credit card issuer when a personal identification number is required for the user to perform online transactions, where the level-two authentication password is equivalent to the personal identification number.
Another preferred embodiment comprises an apparatus that performs secure online transactions. This embodiment is integrated by the credit card issuer, but comprises different level-two authentication password and personal identification number.
a is a display that prompts the user for password entry after the user select a credit card from the wallet; and
b is a display showing after the wallet authenticates the user's password.
The presently preferred embodiment of the invention comprises a secure online transaction technique that provides secure authentication of a user's credit card information. The invention comprises a technique that makes the additional authentication step intuitive and easy to understand. Users are already familiar and comfortable with the extra step of entering a personal identification number (PIN) or signing a receipt in the offline world, this invention provides a similar user experience, but in the online world. In particular, this task is fulfilled by displaying a keypad interface for PIN entry, or an interface that resembles an offline transaction receipt. Because the interface animates the offline experience, the user may easily recognize the interface and accept the extra authentication step.
To authenticate the user 101, the merchant 102 often requires the user to provide his personal information and credit card information. Both of the personal information and credit card information are stored to an online wallet 105 by the merchant 102 while the user 101 chooses a private authentication password. A level-one authentication password (L1P) 104 is often required when the user 101 needs to accept personal information from the wallet 105 or when he starts shopping at the merchant's online site. To ensure the security of the user's credit card information, a second level authentication 104 is required to access the user's credit card information. Additionally, the credit card issuer 103 may require an additional authentication step for online purchase to prevent fraudulent use of credit card online.
The authentication information often includes a user identifier and an associated password. In the discussion below, L2P refers to the password of the second authentication step of the online wallet service, and PIN refers to the password required by the credit card issuer to authenticate online transactions. If a universal wallet service is used by both the credit card issuer and the merchant, the user may enroll his credit card to the wallet at either the merchant's site or the credit card issuer's site.
In one preferred embodiment of the invention, the user's L2P is equivalent to PIN. A typical card enrollment in the online wallet at the merchant site comprises the steps of:
A typical card enrollment for online transactions at the credit card issuer's site comprises the steps of:
The card enrollment process results in automatic creation of an online wallet containing the card. If the user already has an online wallet, the card gets added to the existing wallet. All users ultimately have an L2P and an online wallet after card enrollment at any issuer.
In this embodiment, it does not matter whether the merchant implements the credit card authentication service from the issuer. Nor does it matter which card the user decides to use. It is all completely transparent to the user.
This embodiment provides a presently preferred approach because it leads to a simple user experience and is compatible with the online architecture. However, it may be difficult to get credit card issuers to agree to the approach because issuers are currently responsible for transaction liability.
In another preferred embodiment of the invention, the user's L2P is not equivalent to PIN. A typical card enrollment in the online wallet comprises the steps of:
The card enrollment for online transactions at the credit card issuer site typically comprises steps of:
If the answer to step 314 above is no, then the method continues with the steps of:
In this embodiment, the option to make users enter both an L2P for wallet access and a PIN for issuer authentication is typically an unacceptable option. Therefore, it is necessary to provide access to the cards in user's wallet without L2P authentication. It is possible to show only the nicknames and hide the numbers at this stage, but this could still present a security issue. Further, the user still must enter a PIN for credit cards that need additional authentication from the issuer and an L2P for other cards. This may be somewhat confusing to the user. A mitigating factor is that most users have only one card in their wallet and may never see the difference. The user also must enter an L2P for credit cards that need additional authentication from the issuer when using the card at a merchant site that has not integrated with credit card issuer to perform secure credit card authentication. This situation can be eliminated if it is ensured that online wallet integration at a merchant site automatically ensures secure credit card authentication integration and vice versa.
When the user has multiple credit cards enrolled in the online wallet, the user can have different PINs from different issuers that are different from his L2P.
This could result in proliferation of passwords and potentially confusing user experience.
A payment markup language (PML) is created to describe payment transactions and allow them to be inserted in extensible HTML (XHTML) pages as well as in web service messages. The PML specification comprises two sub-specifications: a core specification and a frame specification.
The PML core specification describes simple online transactions. For example, a charge of $20 from someone@aol.com to AMAZON.COM can be represented by the following when represented in PML core specification:
The PML frame contains the rest of the PML specification that allows the PML core message to be embedded in a web service message. The PML frame is inline with the SOAP specification. The following example shows the structure of a web service message that contains transaction represented in PML core specification:
The method to perform online transactions using the payment markup language specification comprises the following steps:
The certificate can be installed by the user using standard browser methods. Alternatively, the certificate/private key can be stored in a smart card device. When the user clicks on the “sign” button, the PML core message is sent for signing to the smart card.
The user's certificate is issued by the user's bank. This effectively means that the bank is really the authentication provider.
One issue to above method is that the message and signature may be stolen by a hacker and he can send the message many times along with the user's signature to the payment gateway. This user's bank account will reach to zero balance or his credit card exceeds the allowed credit limit, which makes the bank account or credit card unusable. This issue can be easily solved by adding a unique transaction identifier and a date and time that the transaction takes place to produce non-repudiation. Now the copies of the message are recognized as the same transaction, the payment gateway may simply ignore these copies sent by the hacker because it has already processed the associated transactions.
Although the invention is described herein with reference to the preferred embodiment, one skilled in the art will readily appreciate that other applications may be substituted for those set forth herein without departing from the spirit and scope of the present invention.
Accordingly, the invention should only be limited by the claims included below.
Number | Name | Date | Kind |
---|---|---|---|
5642419 | Rosen | Jun 1997 | A |
5815657 | Williams et al. | Sep 1998 | A |
5826241 | Stein et al. | Oct 1998 | A |
5848161 | Luneau et al. | Dec 1998 | A |
5878141 | Daly et al. | Mar 1999 | A |
5920847 | Kolling et al. | Jul 1999 | A |
5960411 | Hartman et al. | Sep 1999 | A |
5983208 | Haller et al. | Nov 1999 | A |
5987132 | Rowney | Nov 1999 | A |
5987140 | Rowney et al. | Nov 1999 | A |
6016484 | Williams et al. | Jan 2000 | A |
6018724 | Arent | Jan 2000 | A |
6029150 | Kravitz | Feb 2000 | A |
6070150 | Remington et al. | May 2000 | A |
6085168 | Mori et al. | Jul 2000 | A |
6115471 | Oki et al. | Sep 2000 | A |
6163772 | Kramer et al. | Dec 2000 | A |
6167378 | Webber, Jr. | Dec 2000 | A |
6175922 | Wang | Jan 2001 | B1 |
6178409 | Weber et al. | Jan 2001 | B1 |
6202051 | Woolston | Mar 2001 | B1 |
6233568 | Kara | May 2001 | B1 |
6236972 | Shkedy | May 2001 | B1 |
6282522 | Davis et al. | Aug 2001 | B1 |
6282656 | Wang | Aug 2001 | B1 |
6324525 | Kramer et al. | Nov 2001 | B1 |
20020029195 | Russell et al. | Mar 2002 | A1 |
20020038287 | Villaret et al. | Mar 2002 | A1 |
20020077993 | Immonen et al. | Jun 2002 | A1 |
20020120568 | Leblang et al. | Aug 2002 | A1 |
20020164031 | Piikivi | Nov 2002 | A1 |
20030182558 | Lazzaro et al. | Sep 2003 | A1 |
20040103063 | Takayama et al. | May 2004 | A1 |
20040172552 | Boyles et al. | Sep 2004 | A1 |
20040260647 | Blinn et al. | Dec 2004 | A1 |
20050187883 | Bishop et al. | Aug 2005 | A1 |
Number | Date | Country |
---|---|---|
1 077 419 | Feb 2001 | EP |
1 077 436 | Feb 2001 | EP |
1 107 198 | Jun 2001 | EP |
1 132 839 | Sep 2001 | EP |
1 132 873 | Sep 2001 | EP |
1 132 875 | Sep 2001 | EP |
1 150 262 | Oct 2001 | EP |
WO 0049586 | Aug 2000 | WO |
Number | Date | Country | |
---|---|---|---|
20030208682 A1 | Nov 2003 | US |