Embodiments disclosed herein generally relate to techniques for conducting secure online purchase transactions, and more particularly to techniques for providing 3-D Secure transactions on-behalf-of (OBO) merchants.
Payment cards such as credit or debit cards are ubiquitous, and for decades such cards have included a magnetic stripe on which the relevant account number is stored. Traditionally, to consummate a purchase transaction with such a payment card, the card is swiped through a magnetic stripe reader in a retail store that is part of the point-of-sale (POS) terminal. The reader reads the account number from the magnetic stripe, and that account number is then used to route a transaction authorization request that is initiated by the POS terminal.
Payment card-based transactions are now typically performed across multiple channels of commerce. For example, payment card-based transactions may be performed in-person at a retail outlet, via a computer connected to the internet (an online transaction), via a mobile phone and/or via a company-based call center (e.g., a 1-800 number for a catalog company). These various types of transactions are conducted in different ways, and thus each type of transaction is associated with a different level of fraud risk. In addition, the payment card transactions generally require that the consumer have his or her payment card available to either present to a cashier in a retail environment, or to enter the requested information via a web browser for an internet transaction, and/or to provide requested information over the telephone. Those knowledgeable in the field recognize that the risk of financial fraud is greater for a remote transaction because there is less ability for the merchant to verify the identity and authenticity of the cardholder. The nature of remote transactions therefore increases risk for the merchant and for the payment card network provider, which often results in more cardholder disputes and associated chargebacks than occur after in-person transactions.
With the advent of e-commerce and m-commerce (mobile commerce), consumers are using portable devices, such as smart phones, tablet computers, and/or personal digital assistants (PDAs), to make purchases via merchant websites over the internet. Consequently, various techniques have evolved that allow for payment for goods and/or services ordered online using payment card accounts.
Attempts to provide an additional security layer for online credit and debit card transactions have been proposed, and several different protocols have been adopted by payment card networks. For example, MasterCard International Incorporated provides the MasterCard SecureCode service which includes cardholder authentication solutions that utilize a universal standard called universal cardholder authentication field (UCAF). The SecureCode service is used by member financial institutions (FI's), merchants and MasterCard in collecting and transporting accountholder authentication data generated by issuer and accountholder security solutions. Thus, the UCAF is intended to be security scheme independent and offers standardized fields and messages for use by merchants and MasterCard members. Once collected by a merchant and their acquirer FI, this information is communicated to the issuer FI in the payment authorization request and provides explicit evidence that the transaction was originated by the accountholder or cardholder. The UCAF supports a variety of issuer security and authentication approaches, including the secure payment application (SPA), issuer servers, smart cards and more. This universal payment mechanism simplifies compatibility and interoperability issues, and keeps costs relatively low when new technologies or upgrades are implemented. Other payment networks utilize similar services, which are generally based on the 3-D Secure protocol, and each of these services generally adds an additional online cardholder authentication process to the standard financial authorization process.
Referring again to
The 3-D Secure authentication process thus provides a greater level of authentication during transactions which reduces “unauthorized transaction” chargebacks for merchants. However, as illustrated above with regard to
In order to avoid or minimize consumer dissatisfaction, modified and/or pseudo implementations of the security protocol have been developed. For example, the MasterCard Advance Registration Program (MARP) was developed to permit qualifying merchants (who authenticate shoppers and have robust anti-fraud solutions already in place and a low number of chargebacks) to send a merchant-specific and/or card scheme assigned static accountholder authentication value (static AAV) instead of a UCAF with the payment card authorization message. In such cases, the card issuer validates the static AAV instead of the usual UCAF. To be eligible for MARP, the merchant must enable its customers to register on the merchant's website by selecting a username and password (or similar credentials), and provide cardholders with the option to register a MasterCard card account number for use in future e-commerce transactions. The merchant will also be expected to satisfy minimum security requirements intended to help ensure the protection of all participants: the merchant, its acquirer, the issuer, and the cardholder. The merchant is required to offer customers a safe, secure shopping experience by using best practice risk management tools, and must demonstrate a commitment to conducting business in a manner that does not result in excessive chargebacks. However, even when enrolled to use MARP, the merchant and/or acquirer must modify their card authorization processes to inject the static AAV (pseudo-UCAF) which necessitates time, effort and expenditure.
The disadvantages highlighted above have hampered the uptake of the various 3-D Secure protocols and the various types of modified or pseudo 3-D security protocols. Therefore, the inventors recognized that it would be desirable to provide a less complicated, secure online authentication process that reduces fraud and risk, and that is less technically complex and easier for merchants to implement and maintain.
Features and advantages of some embodiments of the present invention, and the manner in which the same are accomplished, will become more readily apparent upon consideration of the following detailed description of the invention taken in conjunction with the accompanying drawings, which illustrate exemplary embodiments and which are not necessarily drawn to scale, wherein:
Reference will now be made in detail to various embodiments of the invention. Examples of these embodiments are illustrated in the accompanying drawings, and it should be understood that the drawings and descriptions thereof are not intended to limit the invention to any particular embodiment(s). On the contrary, the descriptions provided herein are intended to cover alternatives, modifications, and equivalents thereof. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the various embodiments, but some or all of these embodiments may be practiced without some or all of the specific details. In other instances, well-known process operations have not been described in detail in order not to unnecessarily obscure novel aspects.
Embodiments relate to payment card account authentication processes, and more particularly, to online or remote payment card authentication processes. For example, a remote authentication process may include a process where a consumer is making a purchase or other transaction with a remote website or merchant server (e.g., over the Internet) using a browser on a mobile device (such as a mobile telephone, smartphone, tablet computer, and/or laptop computer and the like). A remote authentication process may also include a process where a consumer is making a purchase or other transaction with a remote website or server using a browser on a personal computer or any other type of Internet-connected device (such as a television, household appliance, office device, or the like). Thus, embodiments of the authentication process described herein pertain to card not present (CNP) transactions wherein a novel on-behalf-of (OBO) merchant service process operates to carry out a universal cardholder authentication field (UCAF) or a MasterCard advance registration program (MARP) (i.e., a 3-D Secure-type process) injection into a cardholder's purchase transaction authorization request en-route to the issuer financial institution (FI), which operation would otherwise be carried out by the merchant and/or by the acquirer FI. Thus, the result of such a 3-D Secure OBO merchant process is indistinguishable from that of a conventional 3-D Secure process to issuer FIs and to cardholders.
A number of terms will be used herein. The use of such terms are not intended to be limiting, but rather are used for convenience and ease of exposition. For example, as used herein, the term “cardholder” may be used interchangeably with the term “consumer” and are used herein to refer to a consumer, individual, business or other entity that has been issued (or authorized to use) a financial account such as a credit or debit account. The financial account may be accessed by use of a “payment card” or “payment device” such as a traditional plastic or embossed magnetic stripe card, a chip card (such as an EMV card) or a radio-frequency identification (RFID) card (such as a PayPass™ card) or other type of contactless payment card. Pursuant to some embodiments, as used herein, the term “payment card” or “payment device” may also include a mobile device (such as a mobile telephone, a smartphone, a tablet computer, and/or a personal digital assistant) operating a payment application that includes stored payment account information.
Referring again to
A cardholder uses his or her consumer device 202 to browse the offerings on the merchant's website, selects merchandise and/or services and then initiates a purchase transaction by providing payment card account information at the merchant's website checkout webpage (not shown) hosted by the merchant server 204. The payment account information typically includes a primary account number or “PAN”, an expiration date, a cardholder verification value or “CVC2” value, cardholder address information, and the like. (In the case of a repeat customer, the merchant website may already have much if not all of the consumer's payment account data saved in a secure storage element and thus the merchant's checkout webpage may be configured to automatically populate most, if not all, of the required payment account data.) The merchant website server 204 then transmits 205 a verify enrollment request (“VEReq”) message to a Directory Service server computer 206 (for example, a service directory computer operated by a payment card system provider, such as MasterCard International Incorporated). The Directory Service computer 206 provides centralized decision-making capabilities to merchants and uses the account number in the VEReq message to direct that VEReq to an appropriate issuer Access Control Server (ACS) 208. Upon receipt of the VEReq, the ACS 208 verifies whether the cardholder's payment card account is enrolled in a 3-D Secure service (for example, the merchant ID may indicate enrollment in the 3-D Secure OBO merchants service) and if so the ACS 208 transmits 209 a positive verify enrollment response (“VERes”) message to the Directory Service server computer 206, which message includes the address of the ACS 208. The Directory Service server computer 206 then forwards 211 the positive VERes with the ACS address to the merchant server computer 204. The merchant server then generates a payer authentication request (“PAReq”) message to authenticate the consumer (payer) for that particular online purchase and transmits 213 the PAReq message directly to the ACS 208 (by using the ACS address) for cardholder authentication.
If the ACS 208 successfully authenticates the cardholder, the ACS then generates a positive payer authentication response (“PARes”) message which includes a UCAF. The positive PARes message is transmitted 215 to the merchant server 204. In addition, the ACS transmits 217 the PARes message to the 3-D Secure OBO merchant service computer 210 in case that particular merchant is enrolled in the 3-D Secure OBO merchants authentication service. In some embodiments, the positive PARes message includes fields containing the cardholder's PAN, an acquirer identifier, a merchant identifier, the date and/or time of the transaction, the transaction amount, a transaction currency code, and the UCAF. In addition, in some implementations a transaction identifier (“XID”) is included in the PARes message.
In some embodiments, the 3-D Secure OBO merchant service computer 210 is operated by a service provider (which may be a third party provider), whereas in other implementations the 3-D Secure OBO merchant service computer 210 is operated by a payment card account processing company (such as MasterCard International Incorporated). Upon receiving the PARes message from the ACS, in some embodiments the 3-D Secure OBO merchant service computer stores 219 the PARes message (which includes the UCAF and the other transaction data) in a database 212, which may be a separate secure storage device. (In some embodiments, the 3-D Secure OBO merchant service computer may store the PARes message in a secure element or secure portion of an internal memory.)
When the merchant server 204 receives 215 the positive PARes message, it generates and then transmits 221 a purchase transaction authorization request to an acquirer FI computer 214. (In some embodiments, the merchant server 204 simply ignores the UCAF that is present in the PARes message when generating the purchase transaction authorization request.) The acquirer FI computer then forwards 223 the purchase transaction authorization request to a payment network 216 (which includes one or more computers and/or computer systems). The payment network 216 receives the purchase transaction authorization request, and utilizing the merchant ID and/or the acquirer ID, recognizes that the purchase transaction authorization request may be eligible for 3-D Secure OBO merchants authentication service processing. In such cases, the payment system network 216 transmits 225 the purchase transaction authorization request to the 3-D Secure OBO merchant service computer 210. The 3-D Secure OBO merchant service computer then compares data in the purchase transaction authorization request (which includes the PARes data) with the information stored in the secure database 212 (PARes data) to determine if 3-D Secure OBO merchants processing occurred.
If there is a match, then in some embodiments, the 3-D Secure OBO merchant service computer next compares the time and date of the online or remote purchase transaction (which was stored with the PARes data in the database 212) with the time and date of receipt of the purchase transaction authorization request. If the result falls within a predetermined period of time (or time range) then the 3-D Secure OBO merchant service computer conducts further processing. In some embodiments, the predetermined time period between the time and date data of the stored PARes message data and the received purchase transaction authorization request message must be equal to or less than the time period that an issuer FI would use when deciding if the authorization request message was timely received. In some embodiments, this time period may be on the order of 1 second to 120 seconds (two minutes) because speedy web service calls are not guaranteed. For example, there may be one or more slow connections or broken connections, and/or a contingency may arise that delays a web service call.
Therefore, in some embodiments, if a match occurs between the PARes information stored in the database 212 and the data contained in the purchase transaction authorization request (and if the time period explained above falls within the predetermined time period) then the 3-D Secure OBO merchant service computer 210 injects the UCAF (which was stored when the PARes data was stored in database 212) into the purchase transaction authorization request to create an updated purchase transaction authorization request. The 3-D Secure OBO merchant service computer 210 then transmits 227 the updated purchase transaction authorization request to the payment network 216. The payment network 216 then forwards 229 that updated purchase transaction authorization request to the issuer FI computer 218 for authorization processing as a 3-D Secure transaction. In this case, the issuer FI 218 recognizes that the cardholder has been authenticated using a 3-D Secure authorization protocol, and proceeds to process the updated purchase transaction authorization request accordingly. The issuer FI therefore determines whether or not the consumer's payment card account is in good standing and/or whether the cardholder can or cannot afford to pay for the purchase transaction (for example, if the cardholder has an adequate credit line available to cover the purchase price for the transaction). If all is in order, the issuer FI transmits 231 a positive purchase transaction authorization or “transaction approved” response to the payment network 216 which is then routed or transmitted 233 through to the acquirer FI 214. In some implementations, the acquirer FI transmits 235 the transaction approved message to the merchant server 204, which transmits 237 a message to the consumer device 202. In some cases, the transaction approved message may appear, for example, on a display screen of the consumer's device and may be worded: “Thank you for your purchase.” Thus, the described 3-D Secure OBO merchants authentication process is agnostic with regard to issuer FIs. In addition, the 3-D Secure OBO merchants service benefits merchants and/or acquirer FIs because, after a cardholder is authenticated and the purchase transaction is authorized, liability for that purchase transaction shifts to the issuer FI regarding any fraud charges and any related chargebacks that may occur.
The computer processor 302 may constitute one or more conventional processors. Processor 302 operates to execute processor-executable steps, contained in program instructions described herein, so as to control the merchant OBO service computer 300 to provide desired functionality.
Communication component 304 may be used to facilitate communication with, for example, other devices such as other computers (such as for receiving data from an access control server (ACS) computer over the internet). The communication component 304 may also, for example, have capabilities for engaging in data communications over conventional computer-to-computer data networks, and such data communications may be in digital form and/or in analog form.
Input device 306 may comprise one or more of any type of peripheral device typically used to input data into a computer. For example, the input device 306 may include a keyboard and a mouse and/or a touchpad or touchscreen that may be used, for example, by a systems engineer or other personnel authorized to, for example, perform 3-D Secure OBO merchant service computer maintenance, upgrades or other tasks. The output device 308 may comprise, for example, a display and/or a printer or any other peripheral output device.
Storage device 310 may comprise any appropriate information storage device, including combinations of magnetic storage devices (e.g., magnetic tape and/or hard disk drives), optical storage devices such as CDs and/or DVDs, and/or semiconductor memory devices such as Random Access Memory (RAM) devices and Read Only Memory (ROM) devices, solid state drive (SSD) devices, and/or flash memory devices. Any one or more of the listed storage devices may be referred to as a “memory”, “storage”, a “storage medium”, or a “computer readable medium”. In addition, the storage devices are configurable and/or capable of storing instructions, code and/or data, including instructions configured to cause the processor 302 to execute one or more of the processes described herein. Thus, the storage device 310 stores one or more programs for controlling the processor 302, and the programs comprise program instructions that contain processor-executable process steps of the 3-D Secure OBO merchant service computer 300, including, in some cases, process steps that constitute processes provided in accordance with principles of the processes presented herein.
The programs may include a merchant enrollment application 312 that manages processes by which a merchant registers or enrolls for the 3-D Secure OBO merchants authentication service with the 3-D Secure OBO merchant service computer 300. In some embodiments, the merchant OBO service enrollment process allows a merchant to register by providing a merchant identifier (merchant ID), merchant name and address, and/or other required merchant data, for example, by utilizing a suitable web page hosted by the 3-D Secure OBO merchant service computer 300. An acquirer FI registration application 314 may also be stored in the storage device 310, which permits merchant acquirer FIs to register or enroll one or more of their merchant clients by accessing a merchant OBO service web page and providing required information, such an acquirer FI ID, other required acquirer data, and/or one or more merchant IDs.
The storage device 310 also stores a 3-D Secure OBO merchants application 316 for controlling the 3-D Secure OBO merchant service computer 300 to provide merchant OBO processing that includes, in accordance with the disclosure herein, generating an updated purchase transaction authorization request message by injecting a UCAF into a purchase transaction authorization request message received from a payment network. The 3-D Secure OBO merchants application is also configured to control the processor of the 3-D Secure OBO merchant service computer to transmit such an updated purchase transaction authorization request message to, for example, a payment network. In addition, the storage device 310 may include a PARes database 318, and one or more additional databases 320 that are maintained by the 3-D Secure OBO merchant service computer 300 on the storage device 310. Among these databases may be, for example, a merchant ID database and an acquirer FI ID database.
The application programs of the 3-D Secure OBO merchant service computer 300, as described above, may be combined in some embodiments, as convenient, into one, two or more application programs. Moreover, the storage device 310 may store other programs or applications, such as one or more operating systems, device drivers, database management software, web hosting software, and the like.
However, if in step 408 a match occurs between the purchase transaction authorization request message data and stored PAReq message data, then the 3-D Secure OBO merchants service computer determines 412 whether or not the time and date of receipt of the purchase transaction authorization request message is within a predetermined time period of the stored time and date of the PAReq data. If the purchase transaction authorization request message was not received within the predetermined time period, then the 3-D Secure OBO merchant service computer transmits 414 a “Match but outside predetermined time period” message to the payment network, and the process ends. In some embodiments, when the payment network receives this message then the original transaction authorization request is simply forwarded by the payment network to the Issuer FI as a CNP transaction that has not undergone 3-D Secure processing.
But if in step 412, it is determined that the purchase transaction authorization request message data was received within the predetermined time period (as compared to the date and time of the stored PAReq message data), then the 3-D Secure OBO merchant service computer generates 416 an updated purchase transaction authorization message by injecting the UCAF (found in the stored PARes data) and transmits 418 the updated purchase transaction authorization message to the payment network, and then the process ends. In this case, the payment network forwards the updated purchase transaction authorization request to the issuer FI for authorization processing and the issuer FI recognizes that the cardholder has been authenticated using a 3-D authorization protocol. Thus, the issuer FI then proceeds to process the updated purchase transaction authorization request. If the purchase transaction is ultimately authorized by the issuer FI, liability for that purchase transaction shifts to the issuer FI regarding any fraud charges and any related chargebacks that may occur, which is beneficial for the merchant and for the acquirer FI.
Referring again to
The computer processor 502 may constitute one or more conventional processors. Processor 502 operates to execute processor-executable steps, contained in program instructions described herein, so as to control the payment network computer 500 to provide desired functionality.
Communication component 504 may be used to facilitate communication with, for example, other devices such as other computers (such as for communicating with acquirer FI computers, issuer FI computers, and the merchant OBO service computer over the internet). The communication component 504 may also, for example, have capabilities for engaging in data communications over conventional computer-to-computer data networks, and such data communications may be in digital form and/or in analog form.
Input device 506 may comprise one or more of any type of peripheral device typically used to input data into a computer. For example, the input device 506 may include a keyboard and a mouse and/or a touchpad or touchscreen that may be used, for example, by a systems engineer or other personnel authorized to, for example, perform payment network computer maintenance, upgrades or other tasks. The output device 508 may comprise, for example, a display and/or a printer or any other peripheral output device.
Storage device 510 may comprise any appropriate information storage device, including combinations of magnetic storage devices (e.g., magnetic tape and/or hard disk drives), optical storage devices such as CDs and/or DVDs, and/or semiconductor memory devices such as Random Access Memory (RAM) devices and Read Only Memory (ROM) devices, solid state drive (SSD) devices, and/or flash memory devices. Any one or more of the listed storage devices may be referred to as a “memory”, “storage”, a “storage medium”, or a “computer readable medium”. In addition, the storage devices are configurable and/or capable of storing instructions, code and/or data, including instructions configured to cause the processor 502 to execute one or more of the processes described herein. Thus, the storage device 510 stores one or more programs for controlling the processor 502, and the programs comprise program instructions that contain processor-executable process steps of the payment network computer 500, including, in some cases, process steps that constitute processes provided in accordance with principles of the processes presented herein.
The programs may include a 3-D Secure OBO merchants service enrollment application 512 that manages processes by which merchants and/or acquirer FIs register or enroll for the 3-D Secure OBO merchants service. In some embodiments, merchants and/or acquirer FIs enroll by providing merchant ID's, acquirer FI ID's, and/or other merchant and acquirer FI information, for example, by utilizing a suitable web page hosted by the payment network computer 500. The information gathered from a merchant may include the merchant's name and address, a merchant ID, and other required data, whereas the information obtained from an acquirer FI may include an acquirer ID and/or one or more merchant IDs and other required data.
The storage device 510 also stores a 3-D Secure OBO merchant service purchase transaction screening application 514 that includes computer executable instructions for causing the processor to screen received purchase transaction authorization requests for an indication that a particular purchase transaction may have underwent 3-D Secure OBO merchants service processing. In some embodiments, a merchant ID and/or an acquirer FI ID contained within a received purchase transaction authorization request is compared to stored merchant IDs and/or to stored acquirer FI IDs. If there is a match, then the payment network computer 500 handles that particular purchase transaction authorization as explained herein, by comparing the data of the purchase transaction authorization request to stored PARes data and then proceeding accordingly with 3-D Secure OBO merchant service processing if there is a match, generating an updated purchase transaction authorization request when appropriate, and using the updated purchase transaction authorization request for further processing.
Referring again to
The application programs of the payment network computer 500, as described above, may be combined in some embodiments, as convenient, into one, two or more application programs. Moreover, the storage device 510 may store other programs or applications, such as one or more operating systems, device drivers, database management software, web hosting software, and the like.
However, if the merchant identification data and/or acquirer identification data of the transaction authorization request matches 604 stored enrollment data, then the payment network computer conducts 614 3-D Secure OBO merchant service processing, which may include injecting a stored UCAF into the original payment authorization request message to form an updated authorization request message. If an updated authorization request is generated 616, then the payment network computer transmits 618 the updated authorization request to the issuer FI identified by the data in the purchase transaction authorization request for authorization processing. If a positive authorization response is received 608 from the issuer FI, then a positive authorization response message is transmitted 610 to the acquirer FI and the process ends. But if a positive authorization response is not received (or a negative response is received) from the issuer FI, then the payment network computer transmits 612 an authorization denied message to the acquirer FI and the process ends.
Referring again to step 616, if an updated purchase transaction authorization request is not received, then the payment network computer transmits 606 the original (not updated) purchase transaction authorization request message to an issuer FI identified by data in the authorization request for authorization processing, which is business as usual processing. As explained above, if a positive authorization response is received 608 from the issuer FI, then a positive authorization response message is transmitted 610 to the acquirer FI and the process ends. But if a positive authorization response is not received (or a negative response is received) from the issuer FI, then the payment network computer transmits 612 an authorization denied message to the acquirer FI and the process ends.
Referring again to
A cardholder uses his or her consumer device 702 to browse the offerings on the merchant's website, selects merchandise and/or services and then initiates a purchase transaction by providing payment card account information at the merchant's website checkout webpage (not shown) hosted by the merchant server 704. The payment account information typically includes a primary account number or “PAN”, an expiration date, a cardholder verification value or “CVC2” value, cardholder address information, and the like. The merchant website server 704 then transmits 705 a verify enrollment request (“VEReq”) message to a payment card processor system 706 which may include one or more computers, which may include a directory service server computer (not shown). The payment card account processor system 706 uses the account number in the VEReq message to transmit 707 that VEReq to an appropriate issuer Access Control Server (ACS) 708. Upon receipt of the VEReq, the ACS 708 verifies whether the cardholder's payment card account is enrolled in a 3-D Secure service (for example, the merchant ID may indicate enrollment in the 3-D Secure OBO merchants service) and if so the ACS 708 transmits 709 a positive verify enrollment response (“VERes”) message to the payment card processor system computer 706, which message includes the address of the ACS 708. The payment card processor system computer 706 then transmits 711 the positive VERes with the ACS address to the merchant server computer 704.
Continuing with the same example, the VERes message may indicate to the merchant server computer 704 that the cardholder's payment card is enrolled for the 3-D Secure OBO merchants service. The merchant server computer 704 then generates a payer authentication request message (“PAReq”) to authenticate the consumer (payer) for that particular online purchase, and transmits 713 the PAReq message directly to the ACS 208 (by using the ACS address) for cardholder authentication. If the ACS successfully authenticates the cardholder, the ACS next generates a positive payer authentication response (“PARes”) message which includes a UCAF. The positive PARes message is then transmitted 715 to the merchant server computer 704 and is also transmitted 717 to the payment card processor system 706. In some embodiments, the payment card processor system 706 includes a 3-D Secure OBO merchant service computer (not shown) for handling the PARes messages.
As explained herein, the positive PARes message includes fields containing the cardholder's PAN, an acquirer identifier, a merchant identifier, the date and/or time of the purchase transaction, the purchase transaction amount, a purchase transaction currency code, and the UCAF. In some embodiments, a transaction identifier (“XID”) is also included in the PARes message. In some implementations, the payment card processor system computer 706 stores the positive PARes messages (which includes the UCAF and the other transaction data) in a database (not shown), which may be a separate secure storage device. After receiving the positive PARes message, the merchant server 704 generates a purchase transaction authorization request (and in some implementations, the merchant server 704 simply ignores the UCAF when generating the purchase transaction authorization request.) The merchant server then transmits 719 the purchase transaction authorization request to an acquirer FI computer 710, which forwards 721 the purchase transaction authorization request to the payment card processor system computer 706 (which includes one or more computers and/or computer systems).
Once the payment card processor system computer 706 receives the purchase transaction authorization request, it utilizes the merchant ID and/or the acquirer ID to determine whether or not the merchant and/or the acquirer FI is enrolled for the 3-D Secure OBO merchants service. If a determination is made that the merchant and/or acquirer is enrolled, the payment card processor system computer 706 uses the data in the purchase transaction authorization request to check if, for this particular purchase transaction, 3-D Secure OBO merchants service processing occurred. In particular, data in the purchase transaction authorization request (which includes the PARes data) is compared to the information stored in the database (PARes data). The stored PARes data includes the time and date of the online or remote purchase transaction, and in some embodiments the payment card processor system computer 706 compares this PARes data to the time and date of receipt of the purchase transaction authorization request. If the result falls within a predetermined period of time then the payment card processor system computer 706 conducts further processing. In some embodiments, the time gap between the time and date data of the stored PARes must be equal to or less than the time gap or range that an issuer FI would use when deciding if the authorization request message was timely received. As explained earlier, this time period may be on the order of 1 second to 120 seconds.
In some embodiments, if a match occurs between the stored PARes information and the data contained in the purchase transaction authorization request (and if the time gap is equal to or within the predetermined time period) then the payment card processor system computer 706 injects the UCAF (which was stored when the PARes data was stored) into the purchase transaction authorization request to create an updated purchase transaction authorization request. The payment card processor system computer 706 then transmits 723 the updated purchase transaction authorization request to the issuer FI computer 712A (which was determined to be the correct issuer FI for that payment card account) for purchase transaction authorization processing. In this case, the issuer FI 712A recognizes that the cardholder has been authenticated using a 3-D Secure protocol, and proceeds to process the updated purchase transaction authorization request. The issuer FI 712A therefore determines whether or not the consumer's payment card account is in good standing and/or whether the cardholder can or cannot afford to pay for the purchase transaction (for example, if the cardholder has an adequate credit line available to cover the purchase price for the transaction). If all is in order, the issuer FI transmits 725 a positive purchase transaction authorization or “transaction approved” response to the payment card processor system computer 706 which is then routed or transmitted 727 through to the acquirer FI 710. In some implementations, the acquirer FI transmits 729 the transaction approved message to the merchant server 704, which in turn transmits 731 a message to the consumer device 702. In some cases, the transaction approved message may appear, for example, on a display screen of the consumer's device and may recite: “Thank you for your purchase.” Thus, the described 3-D Secure OBO merchants authentication process is agnostic with regard to issuer FIs. In addition, the 3-D Secure OBO merchants service benefits merchants and/or acquirer FIs because, after a cardholder is authenticated and the purchase transaction is authorized, liability for that purchase transaction shifts to the issuer FI regarding any fraud charges and any related chargebacks that may occur.
The computer processor 802 may constitute one or more conventional processors. Processor 802 operates to execute processor-executable steps, contained in program instructions described herein, so as to control the payment card processor system computer 800 to provide desired functionality.
Communication component 804 may be used to facilitate communication with, for example, other devices such as other computers (such as for communicating with acquirer FI computers, issuer FI computers, and the merchant OBO service computer over the internet). The communication component 804 may also, for example, have capabilities for engaging in data communications over conventional computer-to-computer data networks, and such data communications may be in digital form and/or in analog form.
Input device 806 may comprise one or more of any type of peripheral device typically used to input data into a computer. For example, the input device 806 may include a keyboard and a mouse and/or a touchpad or touchscreen that may be used, for example, by a systems engineer or other personnel authorized to, for example, perform payment network computer maintenance, upgrades or other tasks. The output device 808 may comprise, for example, a display and/or a printer or any other peripheral output device.
Storage device 810 may comprise any appropriate information storage device, including combinations of magnetic storage devices (e.g., magnetic tape and/or hard disk drives), optical storage devices such as CDs and/or DVDs, and/or semiconductor memory devices such as Random Access Memory (RAM) devices and Read Only Memory (ROM) devices, solid state drive (SSD) devices, and/or flash memory devices. Any one or more of the listed storage devices may be referred to as a “memory”, “storage”, a “storage medium”, or a “computer readable medium”. In addition, the storage devices are configurable and/or capable of storing instructions, code and/or data, including instructions configured to cause the processor 802 to execute one or more of the processes described herein. Thus, the storage device 810 stores one or more programs for controlling the processor 802, and the programs comprise program instructions that contain processor-executable process steps of the payment card processor system computer 800, including, in some cases, process steps that constitute processes provided in accordance with principles of the processes presented herein.
The programs may include a merchant enrollment application 812 that manages processes by which merchants register or enroll for the 3-D Secure OBO merchants authentication service, and an acquirer FI enrollment application 814 by which acquirer FIs may enroll their clients for the 3-D Secure OBO merchants authentication service, as explained herein. The merchants and/or acquirer FIs can enroll by utilizing, for example, a suitable web page hosted by the payment card processor system computer 800 to provide the required information. For example, the information gathered from a merchant may include the merchant's name and address and a merchant identifier, whereas the information obtained from an acquirer FI may include an acquirer identifier and identifiers concerning one or more clients (merchants).
The storage device 810 also stores a 3-D Secure OBO merchants screening application 816 that causes the processor 802 to screen received purchase transaction authorization requests for an indication that a particular purchase transaction may have underwent merchant OBO service processing. In some embodiments, a merchant ID and/or an acquirer FI ID of a received purchase transaction authorization request is compared to merchant and/or acquirer FI identifiers. If there is a match, then the payment card processor system computer 800 may then utilize, for example, a 3-D Secure OBO merchant service computer for further processing.
Referring again to
In addition, the storage device 810 may include a merchant ID database 822, an acquirer FI ID database 824, and one or more additional databases 826 that may include, for example, a PARes database (not shown). Such databases are maintained by the payment card processor system computer 800 on the storage device 810.
The application programs of the payment card processor system computer 800, as described above, may be combined in some embodiments, as convenient, into one, two or more application programs. Moreover, the storage device 810 may store other programs or applications, such as one or more operating systems, device drivers, database management software, web hosting software, and the like.
Next, the payment card processor system computer receives 914 a purchase transaction authorization request message, and compares the data contained in that request message to the stored PARes data. If there is a match in step 916 between the purchase transaction authorization request message data and stored PARes data, then the payment card processor system computer determines 918 whether or not the purchase transaction authorization request message data was received within a predetermined time period as compared to the date and time stored with the PARes data. If it is determined that the purchase transaction authorization request message data was received within a predetermined time period as compared to the data and time of the PARes message data, then the payment card processor system computer generates 920 an updated purchase transaction authorization message by injecting the UCAF (found in the stored PARes data) and transmits the updated purchase transaction authorization message to an issuer FI for authorization processing.
As explained above, the issuer FI recognizes that the cardholder has been authenticated using a 3-D authorization protocol, and then proceeds to process the updated purchase transaction authorization request accordingly. If the payment card processor system computer receives 922 a positive authorization response from the issuer FI, then the payment card processor system computer transmits 924 the positive authorization response to the acquirer FI. In this case, liability for that purchase transaction shifts to the issuer FI regarding any fraud charges and any related chargebacks that may occur, which is beneficial for the merchant and for the acquirer FI. But if a positive authorization response is not received, then the payment card processor system computer transmits 926 an “authorization denied” message to the acquirer FI, and the process ends.
However, if in step 916 the transaction authorization request does not match the stored PARes data, or if in step 918 the payment card processor system computer determines that the received purchase transaction authorization request time and date is not within a predetermined range of the stored PARes time and date, then the payment card processor system computer transmits 928 the original (not updated) purchase transaction authorization request to the appropriate issuer FI. In this case, the issuer FI recognizes that a 3-D Secure process was not carried out, and liability does not shift to the issuer FI for any fraud that may occur regarding the purchase transaction. If the payment card processor system computer receives 922 a positive authorization response from the issuer FI, then the payment card processor system computer transmits 924 the positive authorization response to the acquirer FI and the process ends. But if a negative response is received, then the payment card processor system computer transmits 926 an “authorization denied” message to the acquirer FI, and the process ends.
The 3-D Secure OBO merchants service provides enrolled merchants and/or acquirer FI's with a less complicated, secure online authentication process that reduces fraud and risk, and that is less technically complex and easier for merchants to implement and maintain. The 3-D Secure OBO merchants service is a cost efficient, reliable and secure system for processing purchase transactions that shifts the liability for any fraud and/or chargebacks with regard to an authorized purchase transaction to the issuer FI. The systems, apparatus and methods presented herein thus permit merchants and/or acquirer FIs to avoid the expense of purchasing, installing, implementing, and/or maintaining (or paying third parties to implement and manage), a merchant plug-in (MPI) application or other software that is necessary for implementing conventional 3-D Secure authentication protocols. In addition, consumers no longer have to enroll and establish a private code (such as a “SecureCode”), and are no longer presented with an authentication dialog in a separate authentication window each time the consumer wishes to purchase goods or services online (which is required by some conventional 3-D Secure processes). Thus, the consumer shopping experience is enhanced through use of the 3-D Secure OBO merchants authentication service without sacrificing the security of the transaction.
With regard to the flowcharts provided herein, it should be understood that the illustrated methods are not limited to the order shown. Rather, embodiments of the methods may be performed in any order that is practicable. For that matter, unless stated otherwise, any method disclosed herein may be performed in any order that is practicable. Notably, some embodiments may employ one or more portions of the methods illustrated herein without one or more other portions of the methods.
As used herein and in the appended claims, the term “payment card account” includes a credit card account or a deposit account that the account holder may access using a debit card. The term “payment card account number” or “financial account number” includes a number that identifies a payment card account or a number carried by a payment card, or a number that is used to identify an account in a payment system that handles debit card and/or credit card transactions or to route a transaction in a payment system that handles debit card and/or credit card transactions. The term “payment card” includes a credit card or a debit card (including a pre-paid debit card). The term “payment card account” also includes an account to which a payment card account number is assigned. Thus a payment card account may include an account to which payment transactions may be routed by a payment system that handles debit card and/or credit card transactions, even if the account in question is not eligible to be charged for purchase transactions or other transactions. A payment card account may also include an account from which payment transactions may be routed by a payment system that handles debit card and/or credit card transactions, even if the account in question is not customarily used, or is not eligible, to be charged for purchase transactions.
Although the present invention has been described in connection with specific exemplary embodiments, it should be understood that various changes, substitutions, and alterations apparent to those skilled in the art can be made to the disclosed embodiments without departing from the spirit and scope of the invention as set forth in the appended claims.