Examples of the present invention will now be described in detail with reference to the accompanying drawings in which:
The current state of the art procedure 10 with regard to credit and debit card authorization and transaction settlement is outlined in
The result of the authorization procedure performed by the Issuer 14 will be returned to the Merchant 11 via the Card Authority 13 and Acquirer 12. If the authorization was successful, then the Merchant 11 will settle the transaction. This settlement instruction is transferred from the Merchant 11 to its Acquirer 12, which then sends the settlement details to the Issuer 14 via the Card Authority 13. This results in funds being transferred (minus appropriate fees) from the Issuer to the Acquirer which are then placed in the bank account associated with the Merchant 11.
The preferred implementation of the present invention extends the state of the art procedure in a manner 20 as shown in
The Card Authority 23 will then route the authorization request to the Proxy Card Issuer 24, using the same mechanism used with normal card issuers, based on the first group of digits of the account number on the card. Therefore, the Proxy Card Issuer 24 is assuming the role of a card issuer with respect to the proxy card.
When the Proxy Card Issuer 24 receives the authorization request, it will apply the rules (or policy) setup by the account holder. The rules will determine whether the transaction is valid, based on pre-configured constraints. A non-exhausive set of constraint examples are:
a) whether the transaction is within a date/time range,
b) is associated with an approved merchant (i.e. one within the user's list of preferred merchants),
c) frequency of use within a time period,
d) is within a defined geographical area, and/or
e) the transaction amount is within limits.
Any combination of constraints can be combined to express the card account holder's requirements. These constraints will enable the configuration of rules based on any information explicitly available, or derivable, from the authorization request.
If the card account holder has multiple payment cards associated with the proxy card, then the rules will also be used to determine which real payment card (or cards) should be used to handle the transaction.
If the transaction is considered to be invalid, based on the rules established by the card account holder, then the Proxy Card Issuer 24 will return a transaction authorization rejected notification to the Card Authority 23, which will be forwarded to the Merchant 21 (via their Acquirer 22).
If the transaction is considered to be valid, and a real payment card is identified then the Proxy Card Issuer 24 will assume the role of a Merchant and issue a new authorization request to the relevant real Card Authority 25 associated with the real payment card. This may or may not be the same card authority that is associated with the proxy card. The real Card Authority 25 will then forward the real authorization request to the real payment card's Card Issuer 26 for authorization. When the Card Issuer 26 has determined whether the transaction associated with the real payment card is valid, it will return a response via the real Card Authority 25 back to the Proxy Card Issuer 24.
If the real card transaction was successfully authorized, then the transaction associated with the proxy card will also be authorized, returning a successful authorization response back to the Card Authority 23 which will be forwarded to the Merchant 21 via their Acquirer 22.
If the real card transaction was not successfully authorized (e.g. due to lack of funds or credit limit being reached), then there are two possibilities:
(i) No other payment cards are indicated as being valid according to the card account holder's rules, and therefore the Proxy Card Issuer 24 will send an authorization rejected notification back to the Card Authority 23 which will be forwarded to the Merchant 21 via their Acquirer 22.
(ii) Other real payment cards are available, that also meet the card account holder's rules, and therefore the real authorization request will be sent to each of them in turn, until either no card remains (resulting in a transaction rejected notification being returned to the Merchant 21), or a successful authorization request is received (resulting in a transaction authorized notification being returned to the Merchant 21.
If a transaction authorization is successful, then the Merchant 21 will issue the settlement details to their Acquirer 22, which then sends the settlement details to the Proxy Card Issuer 24 via the Card Authority 23. The Proxy Card Issuer 24 then forwards the settlement details to the real Issuer 26 based on cached information regarding which real card was used in respect of the particular transaction. This results in funds being transferred (minus appropriate fees) from the Issuer 26 to the Proxy Card Issuer 24, and subsequently funds transferred (minus appropriate fees) from the Proxy Card Issuer 24 to the Acquirer 22 which are then placed in the bank account associated with the Merchant 21.
The card account holder would have access to their account, registered with the Proxy Card Issuer 24, to perform the following functions:
a) to configure the rules associated with a proxy card, including placing a complete block on all transactions
b) to view the history of authorization requests (both successful and unsuccessful)
c) configure contact details (such as email, sms, and the like).
Access to these services could be provided via any communications mechanism 28, including website and telephone, over the appropriate network 27. The card holder's account can also be configured with rules to govern under what circumstances they should be informed of activities on their account, e.g. notification of failed authorization requests. Notifications could be provided via a range of communication mechanisms 29, including (but not limited to) email and SMS.
With reference to
The processing steps for a typical situation are as follows:
1. Receive an authorization request for a proxy card transaction.
2. Perform card selection procedure to identify a suitable real card, and issue a real authorization request to the selected card (including commission).
3. If no authorized card is found, then return authorization failed response and finish.
4. If an authorized card is found then cache the card details against a transaction ID.
5. When settlement instructions are received, retrieve the cached card details associated with the transaction ID and send settlement details to the real card issuer (including any commission).
6. When funds are received from the real card issuer, then transfer funds to the merchant (less the commission)
In the above processing steps, the commission refers to the optional fee (or transaction value percentage) that may be charged as remuneration for providing the proxy card service.
If only a single card group is defined, and it has no associated rules, then the card group will be selected by default. If rules are defined against the single card group, then the card group will only be selected if the associated rules return a successful result. If multiple card groups are defined, then they will be evaluated in the order they are defined. Each card group must have rules associated with it, to determine if it should be selected. Only the last card group in the list is permitted to not have associated rules, indicating that it should be selected by default.
The card group selection procedure 33 will iterate through the list of available card groups, evaluating their associated rules, until either a card group s rules successfully evaluate (i.e. the group is selected), or there are no further card groups, in which case the authorization request will fail 35. If a card group is selected, whether explicitly by successful evaluation of its associated rules, or by default (i.e. being the only remaining group and having no specified rules), then the next step is to select a card from the group 34.
In the first two steps described above, rules were used to determine whether the request was valid 32 and then which card group should be selected 33. Once a group has been selected then potentially any card defined within the group could be chosen (i.e. all of the cards within the group are considered to be equivalent for the purpose of the type of transaction being performed).
The mechanism used to select the actual card 34 is based on a strategy. There will be a set of predefined strategies that can be used, but it would also be possible to enable further strategies to be added as appropriate. The initial set of strategies could include the following:
(a) Round Robin. In this approach the list of cards within the group is worked through sequentially, returning the next entry in the list. When the end of the list is reached, then it will start again at the beginning. Each new card selection request will continue from the last position within the list. This approach means that transactions will evenly be distributed across all of the cards within the group.
(b) Ordered. In this approach the list of cards are simply worked through in order. When a new authorization request is received, it will begin again at the top of the card list. This approach means that the top card within the list will generally handle all of the transactions until it reaches its limit, at which point the second card will handle all of the transactions, and so on.
(c) Random. In this approach the cards are simply selected at random.
If the card selection strategy fails to find a card (e.g. all cards within a group are used but fail), then this will result in a failed authorization response 35.
Once a card has been selected, then an authorization request will be issued to the card issuer. If the authorization request is successful, then a successful authorization response will be returned for the proxy card 37. If the authorization request is unsuccessful, then the system will return to the Card Selection step 36 to obtain an alternative card. This loop will continue until a successful authorization request is made, or no further cards remain to be selected. With each iteration of this retry loop, the cards that were previously attempted will be excluded from the initial card selection strategy used.
In general, authorization requests will contain some information that can be analyzed directly to determine whether a request associated with a proxy card should be permitted. However, some of the information that the rules require may not be explicitly available within the request. In these situations, it may be possible to derive the necessary information. We now consider, with reference to
When an authorization request associated with a proxy card 41 is received, the information within the request may be combined with additional accessible information 46 to derive new facts upon which user rules 42 can be applied. A simple example is where the derived information is of the merchant type. The request will only carry the merchant ID, but by looking up the information about the merchant (associated with the ID) it would be possible to present the merchant s type as derived information on which to evaluate the authorization request with the proxy card 41.
For example, a rule may state “I want to spend a maximum of $200 at a Supermarket every Tuesday”. To evaluate this rule we need to use the merchant ID to look up the merchant type, for example to determine if they can be classified as a Supermarket. However, performing this type of look up for every request that a user may make will be time consuming. To optimize access to the derived information, when details of this type are retrieved, they will be cached 45 with the user s account. Therefore, the next time a similar transaction is performed, the participant Merchant ID can automatically be classified as a Supermarket.
In order to ensure that cached information does not become out of date, it should be marked with a expiry date/time, at which point the derived fact should be re-evaluated to determine if it is still relevant. In order to also ensure that the user s cached information does not become too large, the cached entries should also be marked with a last used timestamp, so that any entry that has not been accessed within a configured time period could be removed.
During a transaction the Proxy Card Issuer processing the authorization request effectively acts as a proxy 43 for the merchant and forwards the settlement details received from the Merchant (usually indirectly via their acquirer and the card authority) to the real Issuer based on cached information 44 regarding which real card was used in respect of the particular transaction.
The rules mechanism used for the proxy card system will be dependent upon the complexity required. The rule functionality would typically be implemented as a pluggable component that could be configured with a set of rules in an appropriate format, and that could be supplied with an authorization request and have access to additional reference data which can be used to derive other facts related to the request.
When an authorization request is processed, whether successful or unsuccessful, the information regarding the evaluations that were performed, and the results that occurred at each stage of the authorization procedure will be logged for audit purposes. This information can then be used for the purpose of determining whether invalid authorization attempts were being made, or why authorization requests that were expected to succeed have actually failed. This enables the account owner to modify the rules accordingly to meet their requirements.
When an authorization request is being processed, a notification mechanism will be used to inform the account owner of different situations that may occur with the processing of the request. It will be possible for the account owner to configure the specific situations they are interested in, which may include the following:
an authorization request has been processed successfully.
an authorization request has failed to be processed (including a reason, such as failed initial rules, unable to find card group, unable to find appropriate card in group, and so on).
authorized transaction has been settled.
The notification could be delivered to the account owner via a number of different channels, including SMS and email.
It should be appreciated that a proxy card according to the present invention could be used in situations where proof is required that a second party is acting as a legal proxy on behalf of a first party. The invention would operate in a similar manner to that described above, the difference being that the transaction authorization by the proxy card would not need to be forward to any other card associated with that user.
In this scenario, the proxy card would act as proof that the party presenting the card (i.e., the second party) had the proxy of the card owner (i.e. the first party), but it would not vouch for the identity of the card owner. Therefore, this use of the proxy card would require an additional feature, which would be that the proxy card issuer would enable the organization checking the identity of the proxy card owner to access details associated with the proxy card account number, which can be used to verify the identity of the “real” user. Such details could include: full name, address, date of birth, social security number, and the like.
This application claims the benefit of U.S. Provisional Application Ser. No. 60/806,062, filed Jun. 28, 2006, which is incorporated herein by reference.
| Number | Date | Country | |
|---|---|---|---|
| 60806062 | Jun 2006 | US |