OVER THE AIR UPDATE OF PAYMENT TRANSACTION DATA STORED IN SECURE MEMORY

Abstract
A system, apparatus, and method for processing payment transactions that are conducted using a mobile device that includes a contactless element, such as an integrated circuit chip. The invention enables the updating, correction or synchronization of transaction data maintained by an Issuer with that stored on the device. This is accomplished by using a wireless (cellular) network as a data communication channel for data provided by an Issuer to the mobile device, and is particularly advantageous in circumstances in which the contactless element is not presently capable of communication with a device reader or point of sale terminal that uses a near field communications mechanism. Data transferred between the mobile device and Issuer may be encrypted and decrypted to provide additional security and protect the data from being accessed by other users or applications. If encryption keys are used for the encryption and decryption processes, they may be distributed by a key distribution server or other suitable entity to a mobile gateway which participates in the data encryption and decryption operations.
Description
BACKGROUND

Embodiments of the present invention are directed to systems, apparatuses and methods for the processing of payment transactions, and more specifically, to a system and associated apparatus and method for processing a transaction that includes synchronizing transaction data stored in a device having a contactless element with transaction data maintained by an Issuer. The present invention is further directed to systems, apparatuses, and methods for using a contactless element such as an integrated circuit chip embedded in a wireless mobile device to enable payment transactions.


Consumer payment devices are used by millions of people worldwide to facilitate various types of commercial transactions. In a typical transaction involving the purchase of a product or service at a merchant location, the payment device is presented at a point of sale terminal (“POS terminal”) located at a merchant's place of business. The POS terminal may be a card reader or similar device that is capable of accessing data stored on the payment device, where this data may include identification or authentication data, for example. Data read from the payment device is provided to the merchant's transaction processing system and then to the Acquirer, which is typically a bank or other institution that manages the merchant's account. The data provided to the Acquirer may then be provided to a payment processing network that is in communication with data processors that process the transaction data to determine if the transaction should be authorized by the network, and assist in the clearance and account settlement functions for the transaction. The authorization decision and clearance and settlement portions of the transaction may also involve communication and/or data transfer between the payment processing network and the bank or institution that issued the payment device to the consumer (the Issuer).


Although a consumer payment device may be a credit card or debit card, it may also take the form of a “smart” card or chip. A smart card is generally defined as a pocket-sized card (or other portable payment device) that is embedded with a microprocessor and one or more memory chips, or is embedded with one or more memory chips with non-programmable logic. The microprocessor type card typically can implement certain data processing functions, such as to add, delete, or otherwise manipulate information stored in a memory location on the card. In contrast, the memory chip type card (for example, a prepaid phone card) can typically only act as a file to hold data that is manipulated by a card reading device to perform a pre-defined operation, such as debiting a charge from a pre-established balance stored in the memory. Smart cards, unlike magnetic stripe cards (such as standard credit cards), can implement a variety of functions and contain a variety of types of information on the card. Therefore, in some applications they may not require access to remote databases for the purpose of user authentication or record keeping at the time of a transaction. A smart chip is a semiconductor device that is capable of performing most, if not all, of the functions of a smart card, but may be embedded in another device.


Smart cards or chips come in two general varieties; the contact type and the contactless type. A contact type smart card or chip is one that includes a physical element (e.g., a magnetic stripe) that enables access to the data and functional capabilities of the card, typically via some form of terminal or card reader. A contactless smart card or chip is a device that incorporates a means of communicating with the card reader or point of sale terminal without the need for direct physical contact. Thus, such devices may effectively be “swiped” (i.e., waved or otherwise presented in a manner that results in enabling communication between the contactless element and a reader or terminal) by passing them close to a card reader or terminal. Contactless cards or chips typically communicate with a card reader or terminal using RF (radio-frequency) technology, wherein proximity to the reader or terminal enables data transfer between the card or chip and the reader or terminal. Contactless cards have found uses in banking and other applications, where they have the advantage of not requiring removal from a user's wallet or pocket in order to participate in a transaction. A contactless card or chip may be embedded in, or otherwise incorporated into, a mobile device such as a mobile phone or personal digital assistant (PDA). Further, because of the growing interest in such cards, standards have been developed that govern the operation and interfaces for contactless smart cards, such as the ISO 14443 standard.


In a typical payment transaction, data is sent from a point of sale terminal to the Issuer to authenticate a consumer and obtain authorization for the transaction. As part of the authentication or authorization processes, the data may be accessed or processed by other elements of the transaction processing system (e.g., the merchant's Acquirer or a payment processor that is part of a payment processing network). Note that in some cases, authorization for the transaction may be obtained without connecting to the Issuer; this may be permitted by Issuer configured risk management parameters that have been set on the consumer's payment application or payment device. If the proposed transaction is authorized, then the consumer may provide other information to the merchant as part of completing the transaction. The Issuer or data processor may also send data back to the consumer. Such data may include an update to records of the transactions for which the payment device has been used, or to a current balance of an account associated with the device.


In the case of a transaction that uses a contactless element, a reader or point of sale terminal is typically only in communication with the contactless element for a short period of time (e.g., the amount of time needed for the element to be recognized by the reader and to provide data needed to initiate or conduct a portion of the transaction). This means that an Issuer or other party wishing to provide transaction related data to a consumer's payment device may be unable to effectively communicate with the consumer using the reader or point of sale terminal. This can create problems for a consumer who wishes to use the payment device for a later transaction, as the balance of a prepaid card or balance of a credit card or debit card account may be incorrect and affect the consumer's ability to obtain authorization for the later transaction. It may also cause a consumer wishing to access their account information to mistakenly think that they have either more or less funds available to them than they actually do.


What is desired is a system, apparatus and method for enabling transaction data stored on a payment device that utilizes a contactless smart chip to be updated without the contactless smart chip needing to communicate with a reader or point of sale terminal, and which overcomes the noted disadvantages of current approaches. Embodiments of the invention address these problems and other problems individually and collectively.


BRIEF SUMMARY

Embodiments of the present invention are directed to a system, apparatus, and method for using a contactless element (such as a contactless smart chip) as part of a payment transaction. Specifically, embodiments of the present invention are directed to facilitating the update or synchronization of transaction data and transaction records stored in a memory that is part of a payment device (such as a mobile phone), where the device includes a contactless element. The inventive system, apparatus and method can be implemented using a contactless smart chip and a wireless data transfer element (e.g., a near field communications (NFC) capability, etc.) embedded within a mobile wireless device. The mobile device may be a mobile phone, PDA, MP3 player or the like. The smart chip or other type of contactless element can be integrated with the circuitry of the mobile device to permit data stored on the chip to be accessed and manipulated (e.g., read, written, erased) using the wireless communications network as a data transport or command transport channel. In this way, transaction data provided by an Issuer may be provided to the payment device in the absence of communication between the payment device and a near field communications device reader or point of sale terminal.


This permits the Issuer to update transaction data and/or synchronize data or records stored in the payment device with those maintained by the issuer when the contactless element is not in the proximity of the device reader or terminal. This capability is particularly useful in the case of a prepaid balance being stored in the payment device, since without an accurate balance, a user may be prevented from completing a transaction that they should be entitled to complete. Similarly, a credit or debit account balance stored in the payment device may be updated to properly reflect the status of the account in a situation where the data stored after interaction between the contactless element and reader or terminal was incorrect or incomplete.


In one embodiment, the present invention is directed to a mobile device for use in conducting a payment transaction, where the mobile device includes a processor, a memory, and a set of instructions stored in the memory, which when executed by the processor implement a method to conduct the payment transaction by communicating with a point of sale terminal using a near field communications mechanism of the mobile device, and receive data related to the payment transaction at the mobile device using a cellular communications network, wherein the received data related to the payment transaction is an update to data stored in the mobile device as a result of communicating with the point of sale terminal.


In another embodiment, the present invention is directed to a data processing device, where the data processing device includes a processor, a memory, and a set of instructions stored in the memory, which when executed by the processor implement a method to receive data for a payment transaction from a point of sale terminal, wherein at least some of the data is provided to the point of sale terminal by a mobile device that communicates with the point of sale terminal using a near field communications mechanism, process the received data to generate a record of the transaction, wherein the record of the transaction includes an update to data stored in the mobile device as a result of communicating with the point of sale terminal, and provide the record of the transaction to an element of a wireless communications system, thereby causing the record of the transaction to be provided to the mobile device over a wireless network.


In yet another embodiment, the present invention is directed to a method of conducting a payment transaction, where the method includes communicating with a point of sale terminal using a near field communications mechanism of a payment device as part of the payment transaction, wherein the payment device includes a contactless element and is contained in a mobile phone, and receiving data to update a record of the payment transaction contained in the mobile phone using a cellular phone communications network.


In yet another embodiment, the present Invention is directed to an apparatus for facilitating payment transactions between a plurality of consumers and a plurality of merchants, where the apparatus includes a processor, a memory, and a set of instructions stored in the memory, which when executed by the processor implement a method to generate a first pair of encryption keys, the first pair of encryption keys including a first encryption key and a second encryption key, generate a second pair of encryption keys, the second pair of encryption keys including a first encryption key and a second encryption key, distribute the first pair of encryption keys to a first mobile gateway, the first mobile gateway configured to process a first set of payment transactions, and distribute the second pair of encryption keys to a second mobile gateway, the second mobile gateway configured to process a second set of payment transactions, wherein the first set of transactions is different from the second set of transactions.


Other objects and advantages of the present invention will be apparent to one of ordinary skill in the art upon review of the detailed description of the present invention and the included figures.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a block diagram illustrating a transaction processing system that may be used with some embodiments of the present invention;



FIG. 2 is a functional block diagram illustrating the primary components of a system for updating or synchronizing transaction data for a transaction that uses a contactless element contained within a mobile device, in accordance with an embodiment of the present invention;



FIG. 3 is a functional block diagram illustrating the primary components of a mobile device, such as a mobile phone that may be used as part of the inventive system and method;



FIG. 4 is a flow chart illustrating an embodiment of the inventive method or process for updating or synchronizing transaction data for a transaction that uses a contactless element contained within a mobile device;



FIGS. 5(a), 5(b), and 5(c) are flow charts illustrating a process for distributing and using encryption keys to provide secure transfer of payment transaction or other data between an Issuer and a mobile device, in accordance with an embodiment of the present invention; and



FIG. 6 is a block diagram of an exemplary computing apparatus that may be used to implement an embodiment of the inventive method or process for updating or synchronizing transaction data for a transaction that uses a contactless element contained within a mobile device.





DETAILED DESCRIPTION

Embodiments of the present invention are directed to a system, apparatus, and method for processing payment transactions that are conducted using a mobile device that includes a contactless element, such as an integrated circuit chip. The invention enables the updating, correction or synchronization of transaction data maintained by an Issuer with that stored on the device. This is accomplished by using a wireless (cellular) network as a data communication channel for data provided by an Issuer to the mobile device, and is particularly advantageous in circumstances in which the contactless element is not presently capable of communication with a device reader or point of sale terminal that uses a near field communications mechanism. In some embodiments, data transferred between the mobile device and Issuer (i.e., either from the device to the Issuer or from the Issuer to the device) may be encrypted and decrypted (e.g., using “keys” such, as public key infrastructure (PKI) keys or symmetric keys) to provide additional security and protect the data from being accessed by other users or applications. If encryption keys are used for the encryption and decryption processes, they may be distributed by a key distribution server or other suitable entity to a mobile gateway which participates in the data encryption and decryption operations.


The present invention is typically implemented in the context of a payment transaction; therefore prior to describing one or more embodiments of the invention in greater detail, a brief discussion of the entities involved in processing and authorizing a payment transaction, and their roles in the authorization process will be presented.



FIG. 1 is a block diagram illustrating a transaction processing system that may be used with some embodiments of the present invention. Typically, an electronic payment transaction is authorized if the consumer conducting the transaction is properly authenticated (i.e., their identity and their valid use of a payment account is verified) and has sufficient funds or credit to conduct the transaction. Conversely, if there are insufficient funds or credit in the consumer's account, or if the consumer's payment device is on a negative list (e.g., it is indicated as possibly having been stolen), then an electronic payment transaction may not be authorized. In the following description, an “Acquirer” is typically a business entity (e.g., a commercial bank) that has a business relationship with a particular merchant. An “Issuer” is typically a business entity (e.g., a bank) which issues a payment device such as a credit or debit card to a consumer. Some entities may perform both issuer and Acquirer functions.



FIG. 1 illustrates the primary functional elements that are typically involved in processing a payment transaction and in the authorization process for such a transaction. As shown in FIG. 1, in a typical payment transaction, a consumer wishing to purchase a good or service from a merchant uses a portable consumer payment device 20 to provide payment transaction data that may be used as part of an authorization process. Portable consumer payment device 20 may be a debit card, credit card, smart card, mobile device containing a contactless chip, or other suitable form of device.


The portable consumer payment device is presented to a device reader or point of sale (POS) terminal 22 which is able to access data stored on or within the payment device. The account data (as well as any required consumer data) is communicated to the merchant 24 and ultimately to the merchant's transaction/data processing system 26. As part of the authorization process performed by the merchant, merchant transaction processing system 26 may access merchant database 28, which typically stores data regarding the customer/consumer (as the result of a registration process with the merchant, for example), the consumer's payment device, and the consumer's transaction history with the merchant. Merchant transaction processing system 26 typically communicates with Acquirer 30 (which manages the merchant's accounts) as part of the overall authorization process. Merchant transaction processing system 26 and/or Acquirer 30 provide data to Payment Processing Network 34, which among other functions, participates in the clearance and settlement processes that are part of the overall transaction processing. Communication and data transfer between Merchant transaction processing system 26 and Payment Processing Network 34 is typically by means of an intermediary, such as Acquirer 30. As part of the transaction authorization process, Payment Processing Network 34 may access account database 36, which typically contains information regarding the consumer's account payment history, chargeback or transaction dispute history, credit worthiness, etc. Payment Processing Network 34 communicates with Issuer 38 as part of the authorization process, where Issuer 38 is the entity that issued the payment device to the consumer and manages the consumer's account. Customer or consumer account data is typically stored in customer/consumer database 40 which may be accessed by Issuer 38 as part of the authentication, authorization or account management processes. Note that instead of, or in addition to being stored in account database 36, consumer account data may be included in, or otherwise part of customer/consumer database 40.


In standard operation, an authorization request message is created during a consumer purchase of a good or service at a point of sale (POS) using a portable consumer payment device (such as a credit or debit card). In some embodiments, the portable consumer payment device may be a wireless phone that incorporates a contactless card or chip. The contactless card or chip may communicate with the point of sale terminal using a near field communications (NFC) capability. The authorization request message is typically sent from the device reader/POS terminal 22 through the merchant's data processing system 26 to the merchant's Acquirer 30, to a payment processing network 34, and then to an Issuer 38. An “authorization request message” can include a request for authorization to conduct an electronic payment transaction. It may include one or more of an account holder's payment account number, currency code, sale amount, merchant transaction stamp, acceptor city, acceptor state/country, etc. An authorization request message may be protected using a secure encryption method (e.g., 128-bit SSL or equivalent) in order to prevent data from being compromised.


After the Issuer receives the authorization request message, the Issuer determines if the transaction should be authorized and sends an authorization response message back to the payment processing network to indicate whether or not the current transaction is authorized. The payment processing system then forwards the authorization response message to the Acquirer. The Acquirer then sends the response message to the Merchant. The Merchant is thus made aware of whether the Issuer has authorized the transaction, and hence whether the transaction can be completed.


At a later time, a clearance and settlement process may be conducted by elements of the payment/transaction processing system depicted in FIG. 1. A clearance process involves exchanging financial details between an Acquirer and an Issuer to facilitate posting a transaction to a consumer's account and reconciling the consumer's settlement position. Clearance and settlement can occur simultaneously or as separate processes.


Payment Processing Network 34 may include data processing subsystems, networks, and other means of implementing operations used to support and deliver authorization services, exception file services, and clearing and settlement services for payment transactions. An exemplary Payment Processing Network may include VisaNet Payment Processing Networks such as VisaNet are able to process credit card transactions, debit card transactions, and other types of commercial transactions. VisaNet, in particular, includes a VIP system (Visa Integrated Payments system) which processes authorization requests and a Base II system which performs transaction clearing and settlement services.


Payment Processing Network 34 may include a server computer. A server computer is typically a powerful computer or duster of computers. For example, the server computer can be a large mainframe, a minicomputer cluster, or a group of servers functioning as a unit. In one example, the server computer may be a database server coupled to a web server. Payment Processing Network 34 may use any suitable combination of wired or wireless networks, including the Internet, to permit communication and data transfer between network elements. Among other functions, Payment Processing Network 34 may be responsible for ensuring that a user is authorized to conduct the transaction (via an authentication process), confirm the identity of a party to a transaction (e.g., via receipt of a personal identification number), confirm a sufficient balance or credit line to permit a purchase, or reconcile the amount of a purchase with the user's account (via entering a record of the transaction amount, date, etc.).


Consumer payment device 20 may take one of many suitable forms. As mentioned, the portable consumer device can be a mobile device that incorporates a contactless element such as a chip for storing payment data (e.g., a BIN number, account number, etc.) and a near field communications (NFC) data transfer element such as an antenna, a light emitting diode, a laser, etc. The portable consumer device may also include a keychain device (such as the Speedpass™ commercially available from Exxon-Mobil Corp.), etc. The device containing the contactless card or chip, or other data storage element may be a cellular (mobile) phone, personal digital assistant (PDA), pager, transponder, or the like. The portable consumer device may also incorporate the ability to perform debit functions (e.g., a debit card), credit functions (e.g., a credit card), or stored value functions (e.g., a stored value or prepaid card).


In embodiments of the invention that include a contactless element (which may include a contactless chip and near field communications data transfer element) embedded within a wireless mobile phone or similar device, the contactless element can communicate with a Merchant's device reader or point of sale terminal using a short range communication method, such as a near field communications (NFC) capability. Examples of such NFC technologies or similar short range communications technologies include ISO standard 14443, RFID, Bluetooth™ and Infra-red communications methods.



FIG. 2 is a functional block diagram Illustrating the primary components of a system 100 for updating or synchronizing transaction data for a transaction that uses a contactless element contained within a mobile device, in accordance with an embodiment of the present invention. As shown in FIG. 1, system 100 includes a mobile device 102 having wireless communications capabilities 122. Mobile device 102 may be a wireless mobile telephone, PDA, laptop computer, pager, etc. In a typical embodiment, mobile device 102 is a cell phone, although as noted, implementation of the present invention is not limited to this embodiment. In the case of a cell phone as the mobile device 102, the device includes mobile device (cell phone) circuitry 104 that enables certain of the telephony functions. Among other functions, mobile device circuitry 104 enables mobile device 102 to communicate wirelessly with cellular system (i.e., a wireless carrier) 120 via cellular network 122.


Mobile device 102 further includes a contactless element 106, typically implemented in the form of a semiconductor chip. Contactless element 106 may include a secure data storage element 110, although secure data storage element 110 may also be implemented as a separate element from contactless element 106. Contactless element 106 includes a near field communications (NFC) data transfer (e.g., data transmission) element 105, such as an antenna or transducer. Contactless element 106 is typically embedded within and integrated with the elements of mobile device 102, and data or control instructions transmitted via cellular network 122 may be exchanged with or applied to contactless element 106 by means of contactless element interface 108. Contactless element interface 108 functions to permit the exchange of data and/or control instructions between mobile device circuitry 104 (and hence the cellular network) and contactless element 106. Thus, contactless element 106 may include data storage capability in the form of a memory or secure data storage 110 that may be accessed via interface 108 to permit the implementation of data read, write, and erase functions, for example.


Secure data storage 110 may be used by mobile device 102 to store operating parameters or other data utilized in the operation of the device. Secure data storage 110 may also be used to store other data for which enhanced security is desired, for example, transaction data, personal account data, identification data, authentication data, access control data for an application or device function, etc. As mentioned, secure data storage 110 may be implemented in the form of a chip that is separate and apart from contactless element 106, or alternatively, may be a section of memory in a chip that forms part of contactless element 106. Note also that the secure data storage and/or contactless element contained within the mobile device may be a removable element or may be integrated within the mobile device. Examples of removable elements include SIM cards, flash memory cards, and other suitable devices.


Mobile device 102 may also include one or more applications 109, where applications 109 are implemented in the form of one or more of software, firmware, or hardware. Applications 109 are used to implement various functions desired by a user, where such functions may include, but are not limited to, eCommerce transaction operations, transaction payment operations, etc. Typically, applications 109 represent processes or operations that are dedicated to a specific function that provides added value to the user and which are not part of the standard operation of the device (I.e., not part of enabling the standard telephony functions, for example). As shown in the figure, applications 109 may exchange data with secure data storage 110 (via contactless element interface 108) and may also be capable of exchanging data with mobile device circuitry 104. A typical application 109 for the purposes of the present invention is a payment application that enables a user to make a payment for a transaction, where the transaction is wholly or partially conducted using the mobile device. In such an example, secure data storage 110 may contain authentication data, user identification data, transaction record data, account balance data, etc. Applications 109 are typically stored as a set of executable instructions in memory 107, which may also Include data storage 113. A processor accesses memory 107 to load and unload the instructions and data as needed to execute the instructions and perform the functions of the applications.


Contactless element 106 is capable of transferring and receiving data using data transfer element 105 which implements a near field communications capability 112, typically in accordance with a standardized protocol or data transfer mechanism (Identified as ISO 14443/NFC in the figure). Near field communications capability 112 is a short-range communications capability; examples include the ISO 14443 standard, RFID, Bluetooth™, infra-red, or other data transfer capability that can be used to exchange data between the mobile device 102 and a device reader or point of sale terminal 130, which is typically located at a Merchant's place of business. Thus, mobile device 102 is capable of communicating and transferring data and/or control instructions via both cellular network 122 and near field communications capability 112.


System 100 further includes Acquirer 132 which is in communication with Merchant or Merchant's device reader or point of sale terminal 130. Acquirer 132 is in communication with Payment Processing Network 134 and as was described, may exchange data with Payment Processing Network 134 as part of the transaction authorization process. Payment Processing Network 134 is also in communication with Issuer 136. As was described, Issuer 136 may exchange data with Payment Processing Network 134 as part of a transaction authorization or transaction reconciliation process.


System 100 may also include Mobile Gateway 138, which is capable of coupling the cellular (wireless) network or system to a second network (typically a wireline network such as the Internet) and enabling the transfer of data between the networks. Mobile Gateway 138 may perform data processing operations as needed to permit the efficient transfer of data between the two types of networks, including, but not limited to, data reformatting or other processing to take into account differences in network protocols. Mobile Gateway 138 may also perform data processing operations to enable more efficient data transfer between the networks and devices coupled to each type of network, such as for purposes of improving the ability of a user to utilize the received data on a mobile device. As shown in the figure, in some embodiments, Mobile Gateway 138 is coupled to Payment Processing Network 134, which is coupled to Acquirer 130. Note that other embodiments are possible, such as where Mobile Gateway 138 is coupled to Issuer 136, as well as where Acquirer 130 is coupled to Issuer 136. Similarly, Issuer 136 may include the capability of functioning as Mobile Gateway 138.


System 100 may also include Encryption Key Distribution Server 140 which is capable of communication and data transfer with Mobile Gateway 138 and Issuer 136. As will be described, Encryption Key Distribution Server 140 may be used to distribute encryption keys to Mobile Gateway 138 and Issuer 136 for the purpose of enabling the encryption and decryption of transaction data that is transferred between the Issuer and the mobile device.


In some embodiments, payment processing network 134 may be configured to enable the transport of encrypted data; if so, then Encryption Key Distribution Server 140 may be capable of communication with payment processing network 134 for the purpose of distributing an encryption key to an element of that network (as suggested by the non-solid line connecting Key Server 140 to network 134). If payment processing network 134 is not configured to enable transport of encrypted data, then the data encryption/decryption processes may be performed in Mobile Gateway 138 in accordance with the encryption key(s) distributed by Encryption Key Distribution Server 140. Note that Issuer 136 may communicate with Encryption Key Distribution Server 140 to inform server 140 which of several mobile gateways it authorizes for purposes of communicating with mobile device 102, and hence to which mobile gateway a particular set of encryption keys should be distributed. Thus, Issuer 136 may select which of multiple available mobile gateways it chooses to authorize for purposes of communicating and exchanging transaction data with a particular mobile device.


Inventive system 100 provides an efficient way for a user to conduct a payment transaction using a contactless element. By integrating the contactless element with the mobile device's telephony communications capabilities, the cellular network may be used as a data transfer channel between an Issuer or Payment Processing Network element and the user's mobile device. In some embodiments, this arrangement may be used to facilitate the provision of data to the device for the purpose of synchronizing the transaction or account data stored in the mobile device with the data records maintained by the Issuer. Such data may include authentication and account management data, such as transaction records or account balances. For example, a secure data store (e.g., secure data storage 110 or a similar secure memory region that is part of the mobile device or the contactless element) may contain transaction records and a running total of the balance available for a user's account. In the case of the contactless element being used with a prepaid card or account, the balance would reflect the remaining amount of money available to a user. In the case of the contactless element being used with a credit or debit account, the balance would reflect a remaining credit limit or amount available from the debit account.


Embodiments of the present invention provide a mechanism for reconciling the data for the transaction records and/or account balances stored in the secure memory (or other data storage element) of the mobile device with that maintained by an Issuer. This ability is desirable (and may be necessary) when a contactless element is used for a transaction. This is because a contactless element is typically used as part of initiating a transaction, and to provide authentication, account identification, and account balance data to a Merchant. The contactless element is then typically removed from communication with the device reader or point of sale terminal. As a result, the contactless element is not available for later communication with the Issuer using the device reader or terminal to update, synchronize, or reconcile transaction records. However, as recognized by the inventors, such updating, synchronizing, or reconciling is desirable and can be accomplished by using the cellular network as a data transport mechanism between the Issuer (via Mobile Gateway 138, for example) and the mobile device.


In embodiments of the present invention, mobile device 102 may be any device capable of communication and data transfer with a cellular network and a near field communication system. As noted, one example is a mobile wireless phone. FIG. 3 is a functional block diagram illustrating the primary components of a portable consumer device (e.g., element 102 of FIG. 2), such as a mobile phone that may be used as part of the inventive system and method. As illustrated in FIG. 3, mobile device 302 may include circuitry that is used to enable certain telephony and other device functions. The functional elements responsible for enabling those functions may include a processor 304 for executing instructions that implement the functions and operations of the device. Processor 304 may access data storage 312 (or another suitable memory region or element) to retrieve instructions or data used in executing the instructions. Data input/output elements 308 may be used to enable a user to input data (via a microphone or keyboard, for example) or receive output data (via a speaker, for example). Display 306 may also be used to output data to a user. Communications element 310 may be used to enable data transfer between device 302 and a wireless network (via antenna 318, for example) to assist in enabling telephony and data transfer functions. As described with reference to FIG. 2, device 302 may also include contactless element interface 314 to enable data transfer between contactless element 316 and other elements of the device, where contactless element 316 may include a secure memory and a near field communications data transfer element.


Data storage 312 may be a memory that stores data, and may be in any suitable form including a magnetic stripe, a memory chip, etc. The memory may be used to store data such as user identification or authentication information, user account Information, transaction data, etc. Stored financial information may include Information such as bank account information, bank identification number (BIN), credit or debit card account number information, account balance information, expiration date, consumer information such as name, date of birth, etc. Note that such data may instead, or also be stored in a secure data storage element, such as secure data storage 110 of FIG. 2 or a similar secure memory that is part of contactless element 316. As described, data storage 312 may also contain instructions which when executed by processor 304 implement operations or processes that are part of the operation of the device.



FIG. 4 is a flowchart illustrating an embodiment of the inventive method or process for updating or synchronizing transaction data for a transaction that uses a contactless element contained within a mobile device. The process steps or stages illustrated in the figure may be implemented as an independent routine or process, or as part of a larger routine or process. Note that each process step or stage depicted may be implemented as an apparatus that includes a processor executing a set of instructions, a method, or a system, among other embodiments.


As shown in the figure, a payment device is used to provide payment for a transaction. Depending on the transaction, the payment device may be used to conduct (or otherwise participate in) a transaction as a result of communication between the payment device and a Merchant device reader or point of sale terminal (stage 402, and as depicted, for example, by element 130 of FIG. 2). The payment device may be a mobile wireless phone or similar device that includes a contactless element, for example (as depicted, for example, by element 102 of FIG. 2 or element 302 of FIG. 3). As discussed, the contactless element is capable of communication and data transfer using a near field communications capability. The transaction may be conducted by passing the payment device near the device reader or point of sale terminal to permit the payment device and reader or terminal to establish communications and exchange data.


At stage 404 data stored in the payment device is provided to the device reader or point of sale terminal. The data may include user identification data, account data, or other data required by a Merchant to authenticate a user and permit the user to initiate or participate in a transaction. Following any needed processing of the provided data by the Merchant, Acquirer (element 132 of FIG. 2), Issuer (element 136 of FIG. 2), or other element(s) of the payment processing system, transaction data may be transferred to the payment device and stored in the memory of the payment device (as depicted in stage 406). In some embodiments, the data is transferred to the device using the near field communications capability of the contactless element and may be stored in the secure data space or other data storage element of the device (as depicted, for example, by element 110 or 113 of FIG. 2, or element 312 or 316 of FIG. 3). The transferred data may include, for example, a record of the transaction, an update to an account balance based on the characteristics of the transaction, an update to the balance of a prepaid card, etc. Note that this step is optional and may not occur for every transaction as the payment device may not be in communication with the device reader/POS terminal for a sufficient period of time to permit the data or the entire set of data to be transferred. In such a situation, the near field communications capability is used to engage in a transaction, but may not be available to transfer transaction related data from the Merchant, Acquirer or Issuer to the payment device.


Communication and data transfer between the payment device and the device reader or point of sale terminal is then ended (stage 408), typically because the payment device is out of range and no longer capable of communicating with the device reader or terminal using the near field communications capability. This may occur, for example, because the payment device is only momentarily positioned near enough to the device reader or terminal to permit effective communication and data transfer (e.g., it is only momentarily “swiped” or presented nearby the device reader or terminal). At a later time, after the payment device is no longer in communication with the device reader or point of sale terminal, the cellular network (as depicted by elements 120 and/or 122 of FIG. 2) is used to provide data to the payment device, where that data may then be stored in a secure data space or other memory location within the device (stage 410).


The data provided over the cellular network to the payment device may include, for example, data used to complete the records for a transaction. Such records might be used to update the data stored in the device to reflect the final amount of a transaction, provide identification data for a transaction, provide a receipt or warranty information for a transaction, update the balance of an account as a result of the completion of the transaction, etc. Note that some or all of the data provided over the cellular network may not have been available until completion of the transaction, at which time the payment device (e.g., a mobile phone or other device in which a contactless element is embedded) may not have been in communication with, or capable of communication with, the device reader or point of sale terminal by means of a near field communications mechanism.


The following is an example of a typical use case or scenario in which embodiments of the inventive system, apparatus and methods may be used. It is noted that the use case is only exemplary, as other use cases or scenarios are possible and will be evident to those of skill in the art.


In one use case or scenario, a counter or “accumulator” for a contactless element embedded in a mobile phone can be updated using the cellular network, after a contactless transaction is initiated using the near field communications capability. Such a counter or accumulator may be used to keep track of an account balance or prepaid account funds, for example. In another example, if there is a problem with a transaction, an Issuer can synchronize the data stored in the contactless device with its own transaction information using the cellular network. For example, a consumer might wish to purchase $75 worth of gas using a mobile phone that includes a prepaid card type of functionality as part of the contactless element. In such a transaction, $75 may be deducted from the prepaid card balance and that data may be stored in a memory in the phone. However, in actuality, the gas pump may stop at $50, because the gas pump stopped working, the consumer could only fill their tank up to $50, etc. In this case, the consumer's prepaid card or balance would show a $75 debit even though the transaction was only for the amount of $50. However, using the cellular network as a communications channel, the Issuer is able to update the transaction records stored in the phone so that the data in the phone's memory (e.g., the secure memory region of the contactless element or another suitable data storage region of the phone) reflects the actual transaction information. This capability can be very important in situations where the balance of an account (as reflected by the data stored in the phone) is used to determine whether a later transaction is authorized.


To provide additional security for the transaction data transferred between the mobile device and the Issuer or Payment Processing Network, embodiments of the present invention may include the capability to encrypt and decrypt the transaction data. This is desirable as encrypting the transaction data may prevent unauthorized users or applications from accessing the data, either on the phone or while the data is in transit over a communications network. As will be described, the distribution of encryption keys or access codes for use in encrypting, decrypting, or otherwise accessing transaction data may be controlled by an Issuer, payment processor, or other suitable entity that is part of a payment processing system. This enables the Issuer or payment processor, for example, to determine which mobile gateways are authorized for transferring or processing payment transaction data. It also provides an Issuer or payment processor with a mechanism for segmenting the data transfer or processing tasks performed by a mobile gateway. The segmentation may be based on a characteristic of the transaction (transaction type (such as debit, credit, prepaid, goods, service), amount (above or below a threshold) or originating location), a characteristic of the consumer (credit history, transaction history, account profile), or a characteristic of the data processing system (processing load, processing or security capabilities of a mobile gateway, etc.).



FIGS. 5(a), 5(b), and 5(c) are flow charts illustrating a process for distributing and using encryption keys to provide secure transfer of payment transaction or other data between an Issuer and a mobile device, in accordance with an embodiment of the present invention. The process steps or stages illustrated in the figures may be implemented as an independent routine or process, or as part of a larger routine or process. Note that each process step or stage depicted may be implemented as an apparatus that includes a processor executing a set of Instructions, a method, or a system, among other embodiments. The apparatus may be an encryption key distribution server (such as element 140 of FIG. 2, which may be implemented as part of another element of a payment processing system), a payment processor, or another suitable element of a data processing or payment processing system. Further, although the encryption and decryption process described with reference to FIGS. 5(a), 5(b), and 5(c) use encryption keys, other encryption methods or security techniques (such as access codes, etc.) may be used in implementing embodiments of the present invention and are understood to be included within the description of the invention contained herein.



FIG. 5(a) illustrates the stages involved in a process for an encryption key distribution server (e.g., element 140 of FIG. 2) to distribute an encryption key of a first key pair to a mobile gateway. FIG. 5(b) Illustrates the stages involved in a process for using the encryption key server to distribute an encryption key of a second key pair to an Issuer. FIG. 5(c) illustrates the stages involved in a process for using the encryption keys distributed to the mobile gateway and to the Issuer to encrypt data generated by the Issuer in the mobile gateway for transmission to the mobile device, and to decrypt that data in the mobile device. As will be described, in some embodiments, the encryption and decryption processes used to enable enhanced data security depend upon the use of a pair of “keys” which are used in accordance with an accepted encryption or data security protocol (e.g., symmetric key standards and protocols), although other suitable methods or processes (such as the public key infrastructure (PKI) standards and protocols) may also be used.


As shown in FIG. 5(a), at stage 502 an encryption key server (e.g., element 140 of FIG. 2) is used to distribute a first encryption key pair (or more precisely, a key of a first encryption key pair) to a mobile gateway that will participate in the encryption/decryption processes. Note that the keys can be generated within the encryption key server or provided to the server by another entity, such as an authorized data processor, Issuer, payment processor, or element of a data processing network. Note that the process described with reference to FIG. 5(a) is performed for each mobile gateway that will be used in the transfer of transaction data between the mobile payment device and the payment processing network.


Further, each encryption key pair distributed in accordance with the process depicted in FIG. 5(a) can be associated with a specific mobile gateway, so that a different encryption key pair may be used for data transferred via each such gateway, eCommerce server, etc., and a mobile device. This arrangement may allow an Issuer or payment processor (for example) to specify which of multiple mobile gateways is authorized to provide communications and data transfer capabilities for a specific mobile device, group of devices, Issuer, or type of transaction, for example. It also permits an Issuer or payment processor (for example) to be the entity responsible for authenticating a mobile gateway and thereby control which of multiple mobile gateways is a valid one for processing a specified type of transaction, for processing transaction data for a specified group of consumers, for processing transaction data requiring a specific security level, etc. Among other benefits, this permits an Issuer or payment processor to verify the security or status of a mobile gateway, thereby providing protection for consumers and merchants. For example, an Issuer or payment processor may desire to segment the processing of transactions based on the type of transaction or a characteristic of a transaction (e.g., debit, credit, prepaid, a range of transaction amounts, a region or time zone in which transactions are originated, etc.), or based on a characteristic of the consumer or mobile device responsible for originating the transaction (e.g., a credit rating of the consumer, the configuration of the mobile device, the type or class of payment application or payment device, etc.). The segmentation of the processing of transactions among multiple mobile gateways may enable the issuer or payment processor to better track usage patterns of a payment device contained in the mobile device, dynamically or statically configure the data processing load as needed to achieve a desired load balancing among transaction data provided by multiple mobile gateways, or provide a different level of quality control, fraud detection, or value-added service for a group of consumers, payment devices, or type of transactions.


Continuing with the description of FIG. 5(a), at stage 504, the encryption key server provides one key of the first key pair to the desired mobile gateway (element 138 of FIG. 2, for example). As mentioned, a different pair of encryption keys may be utilized for each different mobile gateway or server that is, or may be, participating in a transaction process. A record of the encryption key pair used for each such mobile gateway or server would typically be maintained by the encryption key server or an entity responsible for operating the encryption key server. As noted, one key of the first encryption key pair is stored in the mobile gateway (stage 504), while the second key of the first key pair is stored in the encryption key server (stage 506).



FIG. 5(b) illustrates the stages involved in a process for using the encryption key server to distribute an encryption key of a second key pair to an Issuer. Note that the keys can be generated within the encryption key server or provided to the server by another entity, such as an authorized data processor, Issuer, payment processor, or element of a data processing network. Note that the process described with reference to FIG. 5(b) is performed for each Issuer.


At stage 508, the encryption key server begins the process of distributing a key of a second key pair to an Issuer. One key of the second key pair is provided to the Issuer (stage 510) and the other key of the second key pair is stored in the encryption key server (stage 514). The Issuer uses the received key of the second key pair to generate a unique key (or other form of access control data) for each mobile payment device that is registered with the Issuer (stage 512). As will be described, this unique key will be distributed to the mobile payment device and used to decrypt transaction data provided to the device as part of an update of the transaction data stored in the device, or as part of a transaction or account record stored in the device. Note that the unique key provided to the mobile device may also be used to encrypt data that is generated by the device or the payment application installed in the device for secure transfer to an issuer or other entity.



FIG. 5(c) illustrates the stages involved in a process for using the encryption keys distributed to the mobile gateway and to the issuer to encrypt data generated by the issuer in the mobile gateway for transmission to the mobile device, and to decrypt that data in the mobile device. Note that the process or method described with reference to FIG. 5(c) may be performed for each transaction. At stage 522, a mobile device initiates a payment transaction by interacting with a device reader or point of sale terminal (e.g., element 130 of FIG. 2). As part of the transaction process, the Acquirer (e.g., element 132 of FIG. 2) provides transaction data to the Payment Processing Network (e.g., element 134 of FIG. 2) and ultimately to the Issuer (e.g., element 136 of FIG. 2) at stage 524, typically as a result of communication between the Payment Processing Network and the Issuer.


The issuer processes the transaction data and generates updated transaction data which is intended to be provided to the mobile device. The generated data may be for example, in the form of transaction records, updates or corrections to an account balance, etc. Thus, the process described with reference to FIG. 5(c) may be used for example, as part of the process described with reference to FIG. 4 (e.g., to exchange or update transaction related data as part of a transaction query, update or reconciliation process performed by the Issuer). The generated data is provided to the Payment Processing Network at stage 526. Note that in some embodiments, and depending upon the communications network or connections being used, the generated data may instead be provided directly to the mobile gateway.


If there is no direct connection between the issuer and mobile gateway, then the generated data provided to the Payment Processing Network is provided to the mobile gateway. The mobile gateway connects to the encryption key server and to the mobile device (stage 528). At stage 530, the encryption key server generates a session specific key from the stored key of the first key pair. The encryption key server then generates the unique key for the mobile device using the stored key of the second key pair (stage 532). The encryption key server then encrypts the generated session key using the unique key for the mobile device (stage 532). The encryption key server then distributes the encrypted session key to the mobile device via the mobile gateway (stage 534). The mobile device receives the encrypted session key, recovers the session key using its unique key, and then uses the session key to decrypt the transaction data it received from the mobile gateway (stage 536). The decrypted data is then made available to the payment application resident on the mobile device for processing, storage, display to the user, or another relevant function. The decrypted data may be stored in a secure data storage medium or other suitable element.


Note that the process of FIG. 5 has been described with reference to distributing a key of an encryption key pair to a mobile gateway for storage in the gateway—this enables the gateway to encrypt and decrypt data that passes through the gateway. In some embodiments, one key of a pair may be distributed from the encryption key server to the Issuer to enable the Issuer to perform some or all of the data encryption and decryption operations. Similarly, one key of a pair may be distributed from the encryption key server to an element of the payment processing network (element 134 of FIG. 2, as suggested by the dot/dash line in the figure). In such embodiments, the element of the payment processing network (such as a payment processor) may perform some or all of the data encryption and decryption operations. Note also that as mentioned, even if the Issuer does not perform the data encryption/decryption processes, the Issuer may be involved in the encryption key distribution process by communicating with the encryption key distribution server to validate an encryption key, determine which encryption keys are distributed to which mobile gateways, authenticate a mobile gateway, assign a security level to a mobile gateway, etc.


After distribution of the encryption/decryption keys, the keys may be used to provide a secure method of exchanging transaction data between the mobile device and the Issuer. In some embodiments, this may involve establishing a secure channel between a payment application resident in the mobile device and the mobile gateway, with the gateway acting as an intermediary between the mobile device and the payment processing network (and hence the Issuer by virtue of the Issuer's communication with the payment processing network). Typically, the exchange of transaction data may involve two paths: (1) data generated in the mobile device for transfer to the payment processing network; and (2) data generated by the Issuer for transfer to the mobile device.


As mentioned, an encryption key may be used to encrypt data generated in the mobile device for transmission, and to decrypt that data in the mobile gateway for use by an element of the payment processing network or the Issuer. In this use case, payment application data generated by the mobile device is encrypted using a key provided to the mobile device. The encryption process may occur within the secure data storage under the control of the payment application, or by another suitable process. The encrypted data may include security or access data, payment account data (account identifiers, account balances, etc.), transaction data, user identification data, etc. The encrypted data is transmitted from the mobile device over the cellular network to the cellular system and then to the mobile gateway. The mobile gateway uses a key stored in the gateway to decrypt the received data so that the data may be provided to the payment processing network and the Issuer. Note that this process of encrypting data generated in the mobile device for transfer to the payment processing network or Issuer may be used as part of the process described with reference to FIG. 4 (e.g., to transfer transaction related data as part of a transaction query, update or reconciliation process). However, this process may also be used in situations other than those described with reference to FIG. 4, such as to provide a secure data exchange between a mobile device and a payment processing network or Issuer using a wireless/cellular network, for the purpose of initiating or otherwise conducting a payment transaction.


Note that in the context of the Issuer providing transaction data via the wireless network to update or correct data stored in the mobile device after the device is no longer in communication with a device reader or point of sale terminal, the process, functions, or operations of described would typically be utilized to provide data security. The process, functions, or operations described may also be used to transfer data from the mobile device to the payment processing network in the context of initiating a transaction or performing another function over the wireless network. However, as previously described, a transaction may also be initiated using the near field communications capability of the contactless element contained in the mobile device.



FIG. 6 is a block diagram of an exemplary computing apparatus that may be used to implement an embodiment of the inventive method or process for updating or synchronizing transaction data for a transaction that uses a contactless element contained within a mobile device. The elements of the computing apparatus illustrated in FIG. 6 may be used to implement the inventive processes, methods, or operations in whole or in part, and may be part of a server or other computing apparatus (e.g., a mobile gateway, an Issuer managed server, etc.). The subsystems shown in FIG. 6 are interconnected via a system bus 600. Additional subsystems such as a printer 610, keyboard 620, fixed disk 630 (or other memory comprising computer readable media), monitor 640, which is coupled to display adapter 650, and others are shown. Peripherals and input/output (I/O) devices, which couple to I/O controller 660, can be connected to the computer system by any number of means known in the art, such as serial port 670. For example, serial port 670 or external interface 680 can be used to connect the computer apparatus to a wide area network such as the Internet, a mouse input device, or a scanner. The interconnection via system bus allows the central processor 6890 to communicate with each subsystem and to control the execution of instructions from system memory 695 or the fixed disk 630, as well as the exchange of information between subsystems. The system memory 695 and/or the fixed disk 630 may embody a computer readable medium.


In accordance with embodiments of the present invention, there have been described a system, apparatuses, and methods for enabling use of a mobile device that includes a contactless element in a payment transaction. The contactless element is embedded within a mobile device that is capable of communication and data transfer over a cellular network and using a near field communications capability. The contactless element may include a secure data storage region that is used to store transaction data, account data, etc. The cellular network is used to provide an over the air update or reconciliation of transaction data stored in the mobile device in situations in which a transaction was initiated using the contactless element and a near field communications mechanism, but the mobile device is no longer capable of such communication.


It should be understood that the present invention as described above can be implemented in the form of control logic using computer software in a modular or integrated manner. Based on the disclosure and teachings provided herein, a person of ordinary skill in the art will know and appreciate other ways and/or methods to implement the present invention using hardware and a combination of hardware and software


Any of the software components or functions described in this application, may be implemented as software code to be executed by a processor using any suitable computer language such as, for example, Java, C++ or Perl using, for example, conventional or object-oriented techniques. The software code may be stored as a series of instructions, or commands on a computer readable medium, such as a random access memory (RAM), a read only memory (ROM), a magnetic medium such as a hard-drive or a floppy disk, or an optical medium such as a CD-ROM. Any such computer readable medium may reside on or within a single computational apparatus, and may be present on or within different computational apparatuses within a system or network.


While certain exemplary embodiments have been described in detail and shown in the accompanying drawings, it is to be understood that such embodiments are merely illustrative of and not intended to be restrictive of the broad invention, and that this invention is not to be limited to the specific arrangements and constructions shown and described, since various other modifications may occur to those with ordinary skill in the art.


As used herein, the use of “a”, “an” or “the” is intended to mean “at least one”, unless specifically indicated to the contrary.

Claims
  • 1-26. (canceled)
  • 27. A method for facilitating payment transactions, comprising: generating, by a computer, a first pair of encryption keys, the first pair of encryption keys including a first encryption key and a second encryption key;distributing, by the computer, the first encryption key to a mobile gateway;generating, by the computer, a second pair of encryption keys, the second pair of encryption keys including a third encryption key and a fourth encryption key; anddistributing, by the computer, the third encryption key to an issuer computer, wherein the issuer computer generates a device key using the third encryption key and distributes the device key to a mobile device,wherein the mobile device is used to conduct a transaction with a device reader that provides transaction data for the transaction to the issuer computer,wherein the issuer computer generates updated transaction data for the transaction and provides the updated transaction data to the mobile gateway,wherein the mobile gateway encrypts the updated transaction data and provides the encrypted updated transaction data to the mobile device, andwherein the mobile device decrypts the encrypted updated transaction data using the device key and updates stored transaction data based on the updated transaction data.
  • 28. The method of claim 27, further comprising: storing, at the computer, the second encryption key;storing, at the computer, a record associating the first pair of encryption keys with the mobile gateway; anddistributing, by the computer, an encryption key to the mobile gateway in response to a connection with the mobile gateway, the encryption key based on the record associating the first pair of encryption keys with the mobile gateway.
  • 29. The method of claim 27, further comprising receiving, by the computer, a communication from the issuer computer indicating that the mobile gateway is authorized to communicate with the mobile device, wherein the distributing of the first encryption key to the mobile gateway is based on the receiving of the communication from the issuer computer.
  • 30. The method of claim 27, wherein the issuer computer selects the mobile gateway to process a type of payment transactions, wherein the type is one of an eCommerce transaction, a debit transaction, a credit transaction, or a prepaid transaction, and wherein the transaction conducted between the mobile device and the device reader is of the type.
  • 31. The method of claim 27, wherein the issuer computer selects the mobile gateway to process transactions having a common characteristic, the common characteristic being one or more of a region from which the transactions originated, a type or characteristic of a consumer originating the transactions, a type or characteristic of a device used to originate the transactions, a service provided as part of processing the transactions, or a characteristic of the mobile gateway associated with the transactions, and wherein the transaction conducted between the mobile device and the device reader has the common characteristic.
  • 32. The method of claim 27, wherein the computer is operated by an Issuer of a payment device.
  • 33. The method of claim 27, wherein the computer is operated by a payment processor.
  • 34. The method of claim 27, further comprising: generating, by the computer, a plurality of encryption key pairs, each key pair of the plurality of encryption key pairs associated with a different mobile gateway of a plurality of mobile gateways; anddistributing, by the computer, the plurality of encryption key pairs to the plurality of mobile gateways.
  • 35. The method of claim 27, wherein the mobile gateway is a first mobile gateway, and wherein the mobile device is a first mobile device, the method further comprising: generating, by the computer, a third pair of encryption keys, the third pair of encryption keys including a fifth encryption key and a sixth encryption key, the third pair of encryption keys being different from the first pair of encryption keys;distributing, by the computer, the fifth encryption key to a second mobile gateway, the second mobile gateway being different from the first mobile gateway;generating, by the computer, a fourth pair of encryption keys, the fourth pair of encryption keys including a seventh encryption key and an eighth encryption key, the fourth pair of encryption keys being different from the second pair of encryption keys; anddistributing, by the computer, the seventh encryption key to the issuer computer, wherein the issuer computer generates a second device key using the third encryption key and distributes the second device key to a second mobile device,wherein the second mobile device is used to conduct a second transaction with a second device reader that provides second transaction data for the second transaction to the issuer computer,wherein the issuer computer generates second updated transaction data for the second transaction and provides the second updated transaction data to the second mobile gateway,wherein the second mobile gateway encrypts the second updated transaction data and provides the encrypted second updated transaction data to the second mobile device, andwherein the second mobile device decrypts the encrypted second updated transaction data using the second device key and updates stored transaction data based on the second updated transaction data.
  • 36. The method of claim 35, further comprising: storing, at the computer, the sixth encryption key;storing, at the computer, a second record associating the third pair of encryption keys with the second mobile gateway; anddistributing, by the computer, a second encryption key to the second mobile gateway in response to a second connection with the second mobile gateway, the second encryption key based on the second record associating the third pair of encryption keys with the second mobile gateway.
  • 37. The method of claim 35, further comprising receiving, by the computer, a second communication from the issuer computer indicating that the second mobile gateway is authorized to communicate with the second mobile device, wherein the distributing of the fifth encryption key to the mobile gateway is based on the receiving of the second communication from the issuer computer.
  • 38. An apparatus for facilitating payment transactions between a plurality of consumers and a plurality of merchants, comprising: a processor;a memory; anda set of instructions stored in the memory, which when executed by the processor, cause the processor to:generate a first pair of encryption keys, the first pair of encryption keys including a first encryption key and a second encryption key;distribute the first encryption key to a mobile gateway;generate a second pair of encryption keys, the second pair of encryption keys including a third encryption key and a fourth encryption key; anddistribute the third encryption key to an issuer computer, wherein the issuer computer generates a device key using the third encryption key and distributes the device key to a mobile device,wherein the mobile device is used to conduct a transaction with a device reader that provides transaction data for the transaction to the issuer computer,wherein the issuer computer generates updated transaction data for the transaction and provides the updated transaction data to the mobile gateway,wherein the mobile gateway encrypts the updated transaction data and provides the encrypted updated transaction data to the mobile device, andwherein the mobile device decrypts the encrypted updated transaction data using the device key and updates stored transaction data based on the updated transaction data.
  • 39. The apparatus of claim 38, wherein the set of instructions stored in the memory, when executed by the processor, further cause the processor to: store the second encryption key;store a record associating the first pair of encryption keys with the mobile gateway; anddistribute an encryption key to the mobile gateway in response to a connection with the mobile gateway, the encryption key based on the record associating the first pair of encryption keys with the mobile gateway.
  • 40. The apparatus of claim 38, wherein the set of instructions stored in the memory, when executed by the processor, further cause the processor to: receive a communication from the issuer computer indicating that the mobile gateway is authorized to communicate with the mobile device, wherein the distributing of the first encryption key to the mobile gateway is based on the receiving of the communication from the issuer computer.
  • 41. The apparatus of claim 38, wherein the issuer computer selects the mobile gateway to process a certain type of payment transactions, wherein the type is one of an eCommerce transaction, a debit transaction, a credit transaction, or a prepaid transaction, and wherein the transaction conducted between the mobile device and the device reader is of the certain type.
  • 42. The apparatus of claim 38, wherein the issuer computer selects the mobile gateway to process transactions having a certain common characteristic, the common characteristic being one or more of a region from which the transactions originated, a type or characteristic of a consumer originating the transactions, a type or characteristic of a device used to originate the transactions, a service provided as part of processing the transactions, or a characteristic of the mobile gateway associated with the transactions, and wherein the transaction conducted between the mobile device and the device reader has the common characteristic.
  • 43. The apparatus of claim 38, wherein the set of instructions stored in the memory, when executed by the processor, further cause the processor to: generate a plurality of encryption key pairs, each key pair of the plurality of encryption key pairs associated with a different mobile gateway of a plurality of mobile gateways; anddistribute the plurality of encryption key pairs to the plurality of mobile gateways.
  • 44. The apparatus of claim 38, wherein the mobile gateway is a first mobile gateway, wherein the mobile device is a first mobile device, and wherein the set of instructions stored in the memory, when executed by the processor, further cause the processor to: generate a third pair of encryption keys, the third pair of encryption keys including a fifth encryption key and a sixth encryption key, the third pair of encryption keys being different from the first pair of encryption keys;distribute the fifth encryption key to a second mobile gateway, the second mobile gateway being different from the first mobile gateway;generate a fourth pair of encryption keys, the fourth pair of encryption keys including a seventh encryption key and an eighth encryption key, the fourth pair of encryption keys being different from the second pair of encryption keys; anddistribute the seventh encryption key to the issuer computer, wherein the issuer computer generates a second device key using the third encryption key and distributes the second device key to a second mobile device,wherein the second mobile device is used to conduct a second transaction with a second device reader that provides second transaction data for the second transaction to the issuer computer,wherein the issuer computer generates second updated transaction data for the second transaction and provides the second updated transaction data to the second mobile gateway,wherein the second mobile gateway encrypts the second updated transaction data and provides the second encrypted updated transaction data to the second mobile device, andwherein the second mobile device decrypts the second encrypted updated transaction data using the second device key and updates stored transaction data based on the second updated transaction data.
  • 45. The apparatus of claim 44, wherein the set of instructions stored in the memory, when executed by the processor, further cause the processor to: store the sixth encryption key;store a second record associating the third pair of encryption keys with the second mobile gateway; anddistribute a second encryption key to the second mobile gateway in response to a second connection with the second mobile gateway, the second encryption key based on the second record associating the third pair of encryption keys with the second mobile gateway.
  • 46. The apparatus of claim 44, wherein the set of instructions stored in the memory, when executed by the processor, further cause the processor to: receive a second communication from the issuer computer indicating that the second mobile gateway is authorized to communicate with the second mobile device, wherein the distributing of the fifth encryption key to the mobile gateway is based on the receiving of the second communication from the issuer computer.
CROSS REFERENCE TO RELATED APPLICATIONS

This application claims priority from U.S. Provisional Patent Application No. 61/099,060, entitled “Contactless Phone With Secret Data”, filed Sep. 22, 2008, the contents of which is hereby incorporated in its entirety by reference for all purposes.

Provisional Applications (1)
Number Date Country
61099060 Sep 2008 US
Divisions (1)
Number Date Country
Parent 12563421 Sep 2009 US
Child 13662843 US
Continuations (1)
Number Date Country
Parent 13662843 Oct 2012 US
Child 15586169 US