NOT APPLICABLE
NOT APPLICABLE
NOT APPLICABLE
Embodiments of the invention relate generally to a system for authenticating the identity of a consumer during an electronic transaction without requiring the use of a PIN or a signature from the consumer. Additional embodiments relate generally to conducting aggregated transactions.
Several different types of electronic transaction systems exist today operating in a variety of different ways. For example, a traditional credit card system, utilizes an account identifier and a signature requirement for conducting in-person transactions between a physical merchant and a consumer. The merchant can compare the signature on the receipt with the signature on the signature stripe of the physical credit card. In addition when the credit card is used over a network, such as the Internet in a transaction between a consumer and an internet merchant, a CVV number on the back of the credit card can be used to confirm that the person making the transaction has access to the physical card. The financial risk is passed to the merchant in these situations to confirm that the user is who he or she claims to be.
In a credit card transaction, the merchant does not receive the funds immediately. Rather, the funds must be transferred from the card issuing bank or other financial institution that represents the consumer and the card acquiring bank or other financial institution that represents the merchant. In addition, a transaction can be challenged by a consumer if the consumer believes a charge to have been charged in error and a chargeback issued to credit the account of the consumer from the merchant's financial institution. Moreover, there is often a processing fee that is required for credit card transactions. In addition, in a typical credit card transaction, there is only a pre-authorization inquiry made to assess that the credit card can be used. There is no definitive assessment made that the funds are available. Thus, even when a consumer is authorized to use a credit card by way of a pre-authorization inquiry during a transaction, there is no guarantee that the consumer will later pay the credit card bill.
A different system is the signature debit card system. This system uses a debit account rather than a credit account. However, it does require a signature at a point of sale to confirm that the consumer is who he or she claims to be. Again, the signature can be compared to the signature on the back of the debit card to confirm the authentication. The debit card system is processed across a debit processing system. Furthermore, it makes an actual inquiry at the financial institution of the debit card holder to confirm that the funds are available. If the funds are available, they are debited at that time rather than at some later time. Thus, the merchant has an assurance that the funds are actually available and will be credited to the merchant. However, it is difficult to use such a system across a network such as the internet because of the signature requirement to assure the identity of the consumer.
A third system in use is the ATM PIN debit card system. This system utilizes a personal identification number (PIN) associated with the Primary Account Number (PAN) used on a debit card. When a user makes a transaction, the PIN is entered to confirm that the consumer is who he or she purports to be. The PIN is essentially a secret number. Thus, by entering the secret number, the merchant can have a third party—who also knows the PIN associated with the PAN—confirm that the consumer is who or she purports to be. This allows the consumer to conduct transactions at automated teller machines (ATMs) and with merchants located on a network such as the Internet. In addition, the ATM PIN debit card system can also be used in physical stores at point of sale devices. As a debit card system, a merchant is assured that the funds for the transaction will be transferred to the merchant.
A relatively new system is use of PIN-less debit for payment of bills. In such a system, the debit account can be used across a network such as the internet to pay bills. There is low risk of fraud because the billing account that is being paid identifies the user. Thus, there is low risk to the debit card system that someone will steal another's debit card to pay one's own utility bill. Thus, in this limited situation, the ATM network has been used to pay only bills. It has not apparently been used before in a signature-less and PIN-less manner to pay for consumer purchases. A PIN-less transaction is beneficial in that it does not require a user to enter or remember a PIN number associated with a debit account. Users typically easily remember passwords for their computer accounts; but, purely numeric passwords such as those used for debit cards can be difficult for some people to recall. Thus, it would be beneficial if a system could be configured to eliminate the need for a PIN number when conducting transactions across a network such as the Internet.
As was noted in the case of credit cards, a processing fee is often charged when a transaction takes place across a processing network. As a result, when an item of low value is being purchased, the processing charge can be significant relative to the cost of the good being purchased. Thus, for low value purchases, it can be cost prohibitive to use a processing network. This is harmful to not only the customer but also to the merchant and processing network. Thus, it would be beneficial if there were a way to be able to purchase low value items across a purchasing network and not have to incur the total processing fees associated with such purchases.
According to one embodiment of the invention, a method and system is provided to process financial transactions by receiving at the merchant a first transaction request from a user for a first goods purchase; storing the first transaction request at the merchant; receiving PAN information associated with an account from the user without receiving a PIN from the user for the PAN and without receiving a signature from the user for the PAN; storing the PAN information at the merchant; processing at the merchant a second transaction request from the user for a second goods purchase, the second transaction request separate from the first transaction request; and then utilizing the stored PAN information to process the first transaction request.
According to another embodiment of the invention, a method and system is provided to allow a user to transact a purchase across an ATM network, which comprises pre-registering a user with a merchant so as to provide the merchant with authenticating information; receiving at the merchant a transaction request from the user for a purchase of goods; authenticating the user by the merchant with the authenticating information; receiving PAN information associated with an account from the user without receiving a PIN from the user for the PAN and without receiving a signature from the user; processing the transaction by the merchant on the ATM network without the PIN and without the signature.
In accordance with another embodiment of the invention, a method and system are provided that comprises registering a merchant with an ATM processing network; requiring the merchant to register a prospective consumer with the merchant so as to enable the merchant to authenticate the prospective consumer during a transaction between the merchant and the prospective consumer without requiring the prospective consumer to submit a PIN associated with a PAN or to submit a signature associated with the PAN.
Another embodiment of the invention provides a method and system for processing transactions by utilizing a transaction amount field to indicate an amount of a transaction; utilizing an account identifier field to indicate an account of a financial institution from which payment is to be made; utilizing a PIN-less transaction type identifier field to identify the transaction as a PIN-less ATM purchase transaction; forwarding values for the transaction amount field, the account identifier field and the PIN-less transaction type identifier field across a network for use by a financial institution.
Further embodiments of the invention will be apparent to those of ordinary skill in the art from a consideration of the following description taken in conjunction with the accompanying drawings, wherein certain methods, apparatuses, and articles of manufacture for practicing the embodiments of the invention are illustrated. However, it is to be understood that the invention is not limited to the details disclosed but includes all such variations and modifications as fall within the spirit of the invention and the scope of the Claims.
In the past, it has not been possible to conduct PIN-less purchase transactions across ATM PIN networks because there was no way for the merchant to confirm the identity of the consumer. In addition, most purchases are for large amounts so the risk of loss was too high to justify such a system. In accordance with at least one embodiment of the invention, however, a PIN-less transaction can now be accomplished across a network, such as the Internet, to allow purchases to take place. In accordance with yet another embodiment, a purchase for a small amount can be implemented to allow a user to purchase items that do not cost a large amount of money via an ATM network.
According to one embodiment of the invention, a system can be accomplished by a processing network by requiring a networked merchant, such as a merchant taking orders across the Internet, that participates on an ATM network to take commercially reasonable steps necessary to register a user. Thus, for example, the merchant would need to take steps to register users with the merchant's web site to assign the users with individual usernames and passwords. As part of that registration process, the merchant would need to take steps to authenticate the identity of the user before assigning the user a username and password. Similarly, the merchant would need to implement security measures to make sure that the username and password information could not be compromised so as to allow fraudulent transactions to take place. As noted above, the merchant would be required to take the commercially reasonable measures necessary to ensure that the registration processes are implemented.
Referring now to
A more detailed example is illustrated by flow chart 200 of
Thus, a consumer might register with a merchant's web site on Monday. As part of this registration process, the merchant would use commercially reasonable means to confirm that the user is who he or she purports to be. Thus, the merchant might rely on databases of known addresses for an applicant and compare a registration form for the consumer to see if the registrant correctly enters the prior places of residence. Similarly, the merchant might access credit bureau records and obtain data not easily obtained by the general public for use in confirming the identity of the registrant. In addition, the merchant might use the social security number to authenticate the individual. A variety of registration techniques could be used to authenticate the identity of the registrant as part of the registration process. The consumer might browse the web site the following Saturday. The consumer might then be required to submit the authenticating information to enter the web site or later be prompted for the authenticating information at the time of requesting a purchase. In either instance, the consumer would enter the authenticating information so as to be approved by the merchant. The merchant could perform the authentication by cross-referencing the entered authenticating information, such as username and password, and cross-referencing the information with a PAN number securely stored as part of the registration process for the consumer. The PAN number could then be accepted when the user enters it as part of the transaction.
Referring again to flow chart 200, block 228 illustrates that PAN information can be received that is associated with an account of a user. For example, debit cards typically have PAN numbers listed on them that are not actual account numbers. However, they are recognizable by the associated financial institution so that the associated financial institution that issued the debit card can determine which account the PAN applies to. Block 228 also illustrates that the PAN information is received without receiving a PIN from the user and without receiving a signature from the user. Thus, block 228 emphasizes that the transaction is both PIN-less and signature-less for purposes of authenticating the use of the PAN at the point of sale. Furthermore, it illustrates how the risk of fraud is placed squarely on the shoulders of the merchant to use its authentication process rather than relying on the processing network or financial institution to authenticate a user's PIN. In block 232, the transaction is processed by the merchant by submitting the transaction to the ATM system without the PIN and without any signature data. The account information (e.g., the PAN) is sent across the ATM network for use by the financial institution, as shown in block 236. For example, this can be implemented by submitting a request for funds for the transaction to the financial institution that operates the debit account, as shown by block 240. The financial institution reports back to the merchant across the processing system as to whether the debit account has sufficient funds. Such a determination involves an actual inquiry with the account at issue as opposed to a credit transaction where only a pre-authorization is performed. Thus, block 244 illustrates that the merchant receives confirmation that funds have been debited for the transaction from the debit account of the user. Alternatively, the merchant may receive notice that the user has sufficient funds in the debit account, as shown by block 248. Or, if sufficient funds are not available, block 252 illustrates that the merchant can receive notification that the user has insufficient funds in the debit account. Finally block 256 illustrates that the merchant completes the transaction with the user, such as by conveying the purchased goods to the user.
In accordance with another embodiment of the invention, the processing network can implement a system that is unique from previously employed processing systems. Such an embodiment is illustrated by
Thus, the ATM processing network can be operated in such a way as to ensure that a merchant that wants to conduct PIN-less and signatureless transactions across the ATM network takes commercially reasonable steps to authenticate the consumer without requiring the consumer to use a PIN or a signature during an actual transaction. This can be beneficial for web sites that a consumer visits frequently for low cost digital content. Moreover, it can be useful for when a user subscribes to a subscription service that downloads digital content to the consumer at periodic or intermittent intervals. For example, when a consumer downloads music from a pay web site, the cost of each song can be a very low cost—such as under a $US 1.00. Similarly, when the user subscribes to a daily on-line newspaper, the cost for each edition can be very low cost—such as under $US 1.00. Thus, the risk of loss is somewhat low.
In addition, such purchases can be aggregated and processed as an aggregated transaction. An aggregated transaction in this instance takes the form of grouping multiple individual transactions and then processing the aggregated total across the ATM processing network as a single transaction. Aggregated transactions can be beneficial in that they do not incur multiple processing charges and do not require the resources of the network in multiple submissions across the network. U.S. patent application Ser. No. 11/147,581, filed on Jun. 7, 2005 and entitled “Dynamic Aggregation of Payment Transactions” describes in more detail examples of aggregated payment transactions and is hereby incorporated by reference for all purposes.
Referring now to
In addition, the transaction amount field can include a total amount for aggregated transactions. Thus, the total might comprise the amount for a first purchase and the amount for a subsequent and separate purchase. The merchant can hold the first purchase amount and thus process the amount of the first purchase with the second purchase.
When aggregated transactions are used, the processing system can be configured to hold the PAN information and use it for processing at a later point in time. Thus, for example, a user could arrange with a merchant to purchase several digital downloads of music or subscribe to an on-line newspaper. The initial song could then be purchased from the merchant or the initial daily newspaper could be downloaded from the newspaper in order to initiate the process. Then, the merchant or newspaper could store the PAN information to use for subsequent purchases. Furthermore, the PAN information could be held and used after multiple purchases occurring at separate points in time wherein the purchase were then aggregated together after the latest occurring purchase.
Referring now to
To implement the computer systems shown in
System 900 has extensive flexibility and configurability. Thus, for example, a single architecture might be utilized to implement one or more servers that can be further configured in accordance with currently desirable protocols, protocol variations, extensions, etc. However, it will be apparent to those skilled in the art that embodiments may well be utilized in accordance with more specific application requirements. For example, one or more system elements might be implemented as sub-elements within a system 900 component (e.g. within communications system 906). Customized hardware might also be utilized and/or particular elements might be implemented in hardware, software (including so-called “portable software,” such as applets) or both. Further, while connection to other computing devices such as network input/output devices (not shown) may be employed, it is to be understood that wired, wireless, modem and/or other connection or connections to other computing devices might also be utilized. Operating system utilization will also vary depending on the particular host devices and/or process types (e.g. computer, appliance, portable device, etc.) Not all system 400 components will necessarily be required in all cases.
While various embodiments of the invention have been described as methods or apparatus for implementing the invention, it should be understood that the invention can be implemented through code coupled to a computer, e.g., code resident on a computer or accessible by the computer. For example, software and databases could be utilized to implement many of the methods discussed above. Thus, in addition to embodiments where the invention is accomplished by hardware, it is also noted that these embodiments can be accomplished through the use of an article of manufacture comprised of a computer usable medium having a computer readable program code embodied therein, which causes the enablement of the functions disclosed in this description. Therefore, it is desired that embodiments of the invention also be considered protected by this patent in their program code means as well. Furthermore, the embodiments of the invention may be embodied as code stored in a computer-readable memory of virtually any kind including, without limitation, RAM, ROM, magnetic media, optical media, or magneto-optical media. Even more generally, the embodiments of the invention could be implemented in software, or in hardware, or any combination thereof including, but not limited to, software running on a general purpose processor, microcode, PLAs, or ASICs.
It is also envisioned that embodiments of the invention could be accomplished as computer signals embodied in a carrier wave, as well as signals (e.g., electrical and optical) propagated through a transmission medium. Thus, the various information discussed above could be formatted in a structure, such as a data structure, and transmitted as an electrical signal through a transmission medium or stored on a computer readable medium.
It is also noted that many of the structures, materials, and acts recited herein can be recited as means for performing a function or steps for performing a function. Therefore, it should be understood that such language is entitled to cover all such structures, materials, or acts disclosed within this specification and their equivalents, including the matter incorporated by reference.
It is thought that the apparatuses and methods of the embodiments of the present invention and its attendant advantages will be understood from this specification. While the above is a complete description of specific embodiments of the invention, the above description should not be taken as limiting the scope of the invention as defined by the Claims.
Number | Date | Country | |
---|---|---|---|
Parent | 11536536 | Sep 2006 | US |
Child | 12191026 | US |