In payment systems it is a significant concern that primary account numbers (PANs) be protected from access by wrongdoers. One important initiative to prevent unauthorized access to PANs involves “tokenization.” Tokens have been defined as “surrogate values that replace [PANS]” in part of a payment system.
According to one use case set forth in the Payment Token Interoperability Standard (issued by MasterCard International Incorporated (the assignee hereof), Visa and American Express in November 2013), a mobile device with NFC (Near Field Communication) capabilities is provisioned with a token. At the point of sale, the mobile device may pass the token and related information via NFC to the merchant's POS (point of sale) terminal. An authorization request is originated from the POS terminal and routed via an acquiring financial institution to a token service provider. The authorization request includes the token and other information, including an indication that the transaction was initiated via an NFC read at the point of sale.
The token service provider maintains a secure database (or “vault”) that maps tokens to associated PANs. The token service provider notes that the token in the authorization request is intended for use only in NFC transactions at the point of sale, so that this use of the token is authorized. Accordingly, the token service provider replaces the token with the corresponding PAN that the token represents and then routes the authorization request (including the PAN and other information) to the issuer of the payment card account identified by the PAN.
In this use case, the token itself is of relatively little value to a wrongdoer. If the token were—for instance—embodied into a counterfeit magnetic stripe payment card, such a card would fail to be usable in a transaction, because the token would be rejected if presented in a mag stripe “swipe” transaction, or indeed in any other type of transaction that is not initiated via NFC at point of sale. It also is quite unlikely that the wrongdoer would have the technological resources needed to load the token (if it were stolen) into a payment-enabled NFC-capable mobile device.
In addition to the above described use case involving presentation of a payment token via NFC communication at the point of sale, other use cases are contemplated by the Payment Token Interoperability Standard. For example, a payment token may be stored with an e-commerce merchant in a “card-on-file” arrangement, and may be submitted by the merchant via the merchant's acquiring financial institution in response to an online purchase transaction initiated with the merchant by the payment card account holder.
In another example use case, a payment token may be presented at point of sale by having a QR (Quick Response) code displayed by a mobile device and scanned by the point of sale terminal.
Other payment token use cases are also contemplated by the Payment Token Interoperability Standard.
As recognized in the Payment Token Interoperability Standard and in other contexts, so-called lifecycle events are likely to occur from time to time with respect to the token-provisioned mobile device, or in connection with other deployments of payment tokens. Examples of lifecycle events may range from updating of an expiration date for the token to the user's changing of his/her underlying payment card account or even loss or theft of the mobile device itself.
According to a conventional proposal for at least some lifecycle events, a secure element (SE) in the mobile device may be updated with relevant data via APDU (application protocol data unit) commands. However, such an update may involve considerable effort and inconvenience on the part of both the account issuer and the user of the mobile device, e.g., to arrange for establishment of a proper communication channel from an issuer-controlled device to the mobile device.
Features and advantages of some embodiments of the present disclosure, and the manner in which the same are accomplished, will become more readily apparent upon consideration of the following detailed description of the disclosure taken in conjunction with the accompanying drawings, which illustrate preferred and exemplary embodiments and which are not necessarily drawn to scale, wherein:
In general, and for the purpose of introducing concepts of the present disclosure, a token service provider maintains a secure database (also referred to as a “token vault”) to enable mapping of tokens to PANs. The database stores entries for tokens issued by the token service provider. In many cases, these tokens may have been provisioned to mobile devices used for initiating payment transactions. When a lifecycle event occurs (or is about to occur) for a token, at least in some cases the token service provider and/or account issuer may respond by updating the database entry for the token rather than engaging in an update process with the mobile device. This approach may minimize costs and inconvenience for the payment card account issuer in dealing with lifecycle events.
Individual users/cardholders are indicated by reference numeral 102 in
In issuing tokens, the token service provider 104 may perform such functions as operating and maintaining a token vault 110, generating and issuing tokens (in accordance, e.g., with aspects of the present disclosure), assuring security and proper controls, token provisioning (e.g., provisioning NFC-capable mobile devices with token values; personalizing payment cards with token values), and registering token requestors.
In addition to representing the token service provider, block 104 should also be understood to represent one or more computer systems operated by the token service provider.
Block 112 in
Block 114 in
Block 116 in
Also shown in
It will be readily appreciated that a practical embodiment of the system 100 may include numerous merchants, token requestors, acquirers and issuers, rather than one of each as depicted in
In some cases, the issuer 112, as a trusted entity, may effectively have quasi-direct access to the token vault 110. In other conceptual terms, the token vault 110 and block 104 may both be viewed as part of a computer system maintained by the token service provider and responsive to requests from the issuer 112. It will be recognized that block 112 may represent a computer system operated by or on behalf of the issuer.
The token service provider computer 104 may be conventional in its hardware aspects but may be controlled by software to cause it to function as described herein. For example, the token service provider computer 104 may be constituted by conventional server computer hardware. In some embodiments, functionality disclosed herein may be distributed among two or more computers having hardware architecture similar to that described below.
The token service provider computer 104 may include a computer processor 300 operatively coupled to a communication device 301, a storage device 304, an input device 306 and an output device 308.
The computer processor 300 may be constituted by one or more conventional processors. Processor 300 operates to execute processor-executable steps, contained in program instructions described below, so as to control the token service provider computer 104 to provide desired functionality.
Communication device 301 may be used to facilitate communication with, for example, other devices (such as other components of the system 100 shown in
Input device 306 may comprise one or more of any type of peripheral device typically used to input data into a computer. For example, the input device 306 may include a keyboard and a mouse. Output device 308 may comprise, for example, a display and/or a printer.
Storage device 304 may comprise any appropriate information storage device, including combinations of magnetic storage devices (e.g., hard disk drives), optical storage devices such as CDs and/or DVDs, and/or semiconductor memory devices such as Random Access Memory (RAM) devices and Read Only Memory (ROM) devices, as well as so-called flash memory. Any one or more of such information storage devices may be considered to be a computer-readable storage medium or a computer usable medium or a memory.
Storage device 304 stores one or more programs for controlling processor 300. The programs comprise program instructions (which may be referred to as computer readable program code means) that contain processor-executable process steps of the token service provider computer 104, executed by the processor 300 to cause the token service provider computer 104 to function as described herein.
The programs may include one or more conventional operating systems (not shown) that control the processor 300 so as to manage and coordinate activities and sharing of resources in the token service provider computer 104, and to serve as a host for application programs (described below) that run on the token service provider computer 104.
The programs stored in the storage device 304 may also include an update request handling program 310 that may control the processor 300 to enable the token service provider computer 104 to receive and respond to the database update requests (from the issuer 112) as shown at 204 in
Further details concerning functionality provided by the programs 310, 312 and 314 will be described below in the description of the processes illustrated in
Continuing to refer to
The storage device 304 may also store one or more databases 316 required for operation of the token service provider computer 104. Such databases may include the above-mentioned token vault 110.
At 402 in
Once the token vault 110 is established, the token service provider computer 104 may provide the functionality required to maintain the token vault 110, including all required security measures, keeping the data current and accessible, responding to requests and inquiries from authorized entities, etc.
At 404, the token service provider computer 104 may issue tokens and/or provision the same to, e.g., payment-enabled mobile devices. In this regard, the token service provider computer 104 may in some cases act on behalf of the issuer for the underlying payment card accounts. In other cases, the token service provider computer 104 may only provide the tokens to the issuer(s), and the issuers may undertake the logistical tasks involved in provisioning the tokens to the cardholder's device (which may be a payment-enabled mobile device, a payment card, etc.)
At decision block 406, it is determined whether a lifecycle event has occurred for a particular token for which there is an entry in the token vault 110. Various use cases, corresponding to various different kinds of lifecycle events, are described below with reference to
If a positive determination is made at 406 (i.e., if it is determined that a lifecycle event has occurred or is soon to occur for a token), then block 408 may follow decision block 406. At block 408, the entry in the token vault 110 for the token in question may be updated in a manner that is responsive to the lifecycle event for the token. In at least some cases, the nature of the update to the entry for the token may make it unnecessary to engage in an update to the secure element in the mobile device to which the token in question had been provisioned.
A number of use case examples providing details of the process of
In some cases, the token service provider computer 104 may regularly scan all the token expiration dates in the token vault 110 to find expiration dates that are approaching. In addition or alternatively, the issuer for the corresponding PANs may have the role of detecting this lifecycle event for tokens issued at its request. The issuer may perform this function by access to the token vault 110 and/or by reference to a separate database maintained by the issuer and showing expiration dates for tokens mapped to PANs for payment card accounts that it has issued.
In some cases block 504 may follow a positive determination at decision block 502. At block 504, the token service provider computer 104 may request the issuer to provide a new (updated) expiration date for the token in question. In other cases block 504 may not be required because, e.g.—(a) the issuer itself detected the approaching expiration date and proactively supplied a new expiration date to the token service provider computer 104; or (b) based on a standing arrangement with the issuer, the token service provider computer 104 is authorized to automatically increment the expiration date by a predetermined amount of time (say one or two years) when the expiration date is approaching.
In any case, whether based on a response from the issuer or on the initiative of the token service provider computer 104 itself, a new expiration date for the token may be selected, as indicated at 506 in
Then, at block 508, the token service provider computer 104 carries out an update operation to the database entry for the token in question to replace the existing token expiration date in the database entry with the new token expiration date selected at 506.
In some cases, block 510 may follow 508. For example, if the token entry update operation of block 508 occurred at the request of the issuer, then the token service provider computer 104 may provide an acknowledgment/response message to the issuer as per block 510 to confirm that the requested update has occurred.
At 602 in
Decision block 606 may follow block 604. At decision block 606, the token service provider computer 104 may determine whether, in effect, the expiration date for the token has been updated (in a process such as that illustrated in
At 610, the token service provider computer 104 maps the token to the PAN listed in the entry in the token vault 110 for the token. At 612, and in accordance with use cases as contained in the Payment Token Interoperability Standard, the token service provider computer 104 may transmit the authorization request for routing to the issuer of the payment card account represented by the PAN to which the token was mapped. As called for by the Payment Token Interoperability Standard, the authorization request as transmitted by the token service provider computer 104 may include the PAN and its expiration date, as looked up from the token vault 110, and also the token, as received by the token service provider computer 104. In an aspect that goes beyond the Payment Token Interoperability Standard, the authorization request as transmitted at 612 may include the updated token expiration date from the token vault 110 in place of the obsolete token expiration date contained in the authorization request when it was received by the token service provider computer 104. Assuming that the system does not perform any other check of the token expiration date until after the process of
It is thus assumed for present purposes that any token cryptogram or the like provided at point of sale by the mobile device does not reflect the token expiration date as stored in the mobile device.
Referring again to the process of
Turning now to
Block 706 may follow block 704. At block 706, the token service provider computer 104 may select or generate a new token number in a conventional manner.
Block 708 may follow block 706. At block 708, the token service provider computer 104 may establish or update a database entry for the token number selected or generated at 706, such that the new token number is mapped to the same PAN to which the replaced token number was previously mapped. In addition, the database entry for the new token number may be caused to contain other data necessary to effectuate mapping of the new token to the PAN.
Block 710 may follow block 708. At block 710, the token service provider computer 104 (or in some cases the payment account issuer) may provision the new token to the user's payment-enabled mobile device. In the course of the provisioning of the new token to the mobile device, other data may also be provisioned to the mobile device, including, for example, a token expiration date for the new token, an updated cryptographic key or keys, etc.
Although not shown in the drawing, the process of
Referring now to
If a positive determination is made at 802, then block 804 may follow block 802. At block 804, the token service provider computer 104 may look up the database entry for one or more tokens that are mapped to the PAN or PAN expiration date that is to be changed.
Block 806 may follow block 804. At block 806, the token service provider computer 104 may update the PAN and/or the PAN expiration date, as the case may be, in the database entry or entries that it looked up at 704. As a result the token(s) in question is (are) now remapped to the new PAN (if the PAN has been changed).
It will be appreciated that the above-described use cases relating to handling of payment token life cycle events can be readily adapted and applied to deployment of payment tokens by various means, including, but not limited to, provisioning of payment tokens to payment enabled mobile devices, card-on-file arrangements, and other manners of deploying payment tokens that are already known to those who are skilled in the art or that may hereafter be proposed.
As used herein and in the appended claims, the term “computer” should be understood to encompass a single computer or two or more computers in communication with each other.
As used herein and in the appended claims, the term “processor” should be understood to encompass a single processor or two or more processors in communication with each other.
As used herein and in the appended claims, the term “memory” should be understood to encompass a single memory or storage device or two or more memories or storage devices.
As used herein and in the appended claims, a “server” includes a computer device or system that responds to numerous requests for service from other devices.
The flow charts and descriptions thereof herein should not be understood to prescribe a fixed order of performing the method steps described therein. Rather the method steps may be performed in any order that is practicable.
As used herein and in the appended claims, the term “payment card system account” includes a credit card account, a deposit account that the account holder may access using a debit card, a prepaid card account, or any other type of account from which payment transactions may be consummated. The terms “payment card system account” and “payment card account” are used interchangeably herein. The term “payment card account number” includes a number that identifies a payment card system account or a number carried by a payment card, or a number that is used to route a transaction in a payment system that handles debit card and/or credit card transactions. The term “payment card” includes a credit card, debit card, prepaid card, or other type of payment instrument, whether an actual physical card or virtual.
As used herein and in the appended claims, the term “payment card system” refers to a system for handling purchase transactions and related transactions. An example of such a system is the one operated by MasterCard International Incorporated, the assignee of the present disclosure. In some embodiments, the term “payment card system” may be limited to systems in which member financial institutions issue payment card accounts to individuals, businesses and/or other organizations.
Although the present disclosure has been described in connection with specific exemplary embodiments, it should be understood that various changes, substitutions, and alterations apparent to those skilled in the art can be made to the disclosed embodiments without departing from the spirit and scope of the disclosure as set forth in the appended claims.
Number | Date | Country | |
---|---|---|---|
Parent | 14283937 | May 2014 | US |
Child | 16568682 | US |