Computing systems are currently in wide use. Some such computing systems are utilized by retail organizations. For example, a computing system can be deployed at a point-of-sale (POS) for a brick and mortar retail store, or in other environments such as kiosks and call centers. In another example, an organization may have an online storefront (or web store front). Such computing systems can be utilized to support consumer transactions through a variety of different value transfer methods.
The discussion above is merely provided for general background information and is not intended to be used as an aid in determining the scope of the claimed subject matter.
A transaction security and authentication system comprises, in one example, a front-end transaction system interface component configured to communicate with a front-end transaction system that performs a transaction with a user, a client device interface component configured to communicate with a client device of the user, and a transaction security component configured to receive a transaction request, for the transaction, from the front-end transaction system, the transaction request including a unique transaction instrument identifier, and authenticate the transaction by sending a transaction confirmation request to the client device based on the unique transaction instrument identifier and receiving a transaction confirmation from the client device.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter. The claimed subject matter is not limited to implementations that solve any or all disadvantages noted in the background.
User 102 illustratively uses a client device 106 to communicate with system 104. For example, client device 106 can communicate with system 104 through a network 108, such as a wide area network (e.g., the Internet). Alternatively, or in addition, client device 106 can communicate with system 104 directly, as indicated by reference numeral 110.
While
Client device 106 can be any of a variety of different types of device. For example, client device 106 can comprise a desktop computer, a laptop computer, a tablet computer, or other mobile device, such as a palm top computer, a smart phone, a non-smart phone (i.e., feature phone), a multimedia player, a personal digital assistant (PDA), et cetera.
Client device 106 includes a communication system 112 for communicating through wired and/or wireless interfaces. As illustrated in
Client device 106 also includes one or more processors 114 and a display system 116 that includes a user interface component 118, one or more sensors 120, and can include other items 122 as well. Sensor(s) 120 are configured to detect inputs to display system 116. In one example, one or more of systems 104, 124, and 126 can include sensors to detect inputs to those systems as well.
User interface component 118 is configured to generate user interface displays 130 with user input mechanisms 132. User 102 interacts with, or actuates, the user input mechanisms 132 in order to control and manipulate client device 106. Client device 106 can include other items 134 as well.
System 104 includes a data store 128 that stores data for use within the organization that employs system 104. For example, data store 128 can include data pertaining to goods and/or services offered by a retail organization, customer information, employee information, et cetera. System 104 can also include a user interface component 135 for generating user interface displays, and/or processor(s)/server(s) 137. System 104 can include other items 139 as well. In one example, processor(s) 114 and/or processor(s)/server(s) 137 comprise a computer processor with associated memory and timing circuitry (not shown). The computer processor is a functional part of the systems within which they are located and is activated by, and facilities the functionality of, other systems, components and items in those systems.
System 104, in one example, includes an on-premise transaction system 136 that includes a transaction agent 138 and other functionality 140. For example, on-premise transaction system 136 can be deployed by an organization within a brick and mortar retail store, kiosk, or other environment. By way of example, an organization can deploy system 136 at one or more points of sale that include point of sale (POS) components. These POS components may be connected to a headquarters or back office system, for example.
For example, a POS can comprise a checkout lane within a retail store so that POS components include some or all of a cash register, a cash drawer, a bar code scanner, an RFID reader, a keyboard, a pin pad, and a credit or debit card hardware device. The POS components can also include a scale as well as other various printers and display devices. In the illustrated example, a wireless communication device, such as a near-field communication device or other wireless communication device, is configured to communicate with communication system 112 of client device 106 through interface 110.
Transaction agent 138 is configured so that user 102 can perform a value transfer transaction using a transaction instrument without the transaction instrument being physically present during the transaction. Examples of transaction instruments include, but are not limited to, a payment card (e.g., a credit card, debit card, smart card, et cetera). This type of transaction is often referred to as a card-not-present transaction since the payment card, or other transaction instrument, is not physically present during the transaction.
Transaction agent 138 is configured to interact with client device 106 to exchange transaction information securely and to request TSAS 124 to conduct a value transfer transaction for user 102 given the transaction instrument information presented by user 102. In one example, a client agent 142 runs on client device 106 and facilitates the interaction. TSAS 124 processes a transaction request received from transaction agent 138 by communicating with transaction provider system 126. By way of example, in processing card payments, an organization uses transaction provider system 126 (which may be an entity that handles value transfers for various banks, or which may be the bank itself) in conducing transactions. Transaction provider system 126 validates the payment card being used by user 102 and authorizes the transfer of funds.
Alternatively, or in addition to system 136, system 104 can include an online (e.g., network-based) transaction system 144. System 144 includes a transaction agent 146 and other functionality 148. In one example, system 144 can provide an e-commerce presence for an organization, such as an online store or marketplace presence in which user 102 can browse, select, and purchase products and/or services provided by an organization through network 108. In one example, transaction agent 146 is similar to transaction agent 138, discussed above.
It is noted that the location and functionality of systems 104, 124, and 126 can be combined and/or distributed in any of a number of ways. Some or all portions of systems 104, 124, and 126 can be local to one another, or can be remotely located. Further, one or more of systems 104, 124, and 126 can be remotely located from client device 106. For instance, some or all of systems 104, 124, and 126 can be provided as cloud based services for client device 106.
Further, systems 104, 124, and/or 126 can be part of and managed by a same organization. For example, systems 104 and 124 can be part of an on-premise deployment at a retail organization. In another example, the organization can deploy system 124 in a cloud-based environment that is used by one or more front-end transaction systems deployed by the organization. In yet another example, transaction provider system 126 may deploy and manage system 124. These, of course, are by way of example only.
The functionality of systems 104, 124, and/or 126 may be combined and/or separated in any of a variety of ways. Therefore, while
Using transaction agent interface component 170 and TSAS interface component 172, client agent 142 interacts with a transaction agent (e.g., transaction agent 138 and/or transaction agent 146) and TSAS 124 to facilitate a transaction involving a value transfer from user 102 to the organization deploying system 104. For example, client agent 142 can prompt user 102 to initiate and provide information (e.g., transaction instrument information) for a value transfer process, and confirm the value transfer that is being made. This is discussed in further detail below.
Component 172 also includes a registration component 180 that is configured to register one or more transaction instruments (e.g., payment cards) of the user and contact information, such as information pertaining to client device 106, that allows TSAS 124 to contact user 102 during a transaction. Using component 174, client agent 142 stores the identifiers of the transaction instrument(s) registered with TSAS 124 in a data store 150 on client device 106. This is represented by block 152 (unique transaction instrument identifier(s) 152, shown in
In the example of
TSAS 124 includes a transaction processing component 208, a registration component 210, and a transaction security component 212. TSAS 124 can include a data store 214, processor(s)/server(s) 215, and can include other items 216 as well. As discussed in further detail below, in one example transaction security component 212 is used to independently contact user 102 using device 106 to authenticate a transaction before processing the value transfer. This is done independent of system 104 in a manner that does not require sensitive transaction instrument information to be passed to system 104. Instead, in one example, user 102 only needs to provide a unique identifier to system 104 upon which, for a transaction request, system 104 passes the unique identifier to TSAS 124 which processes the transaction with transaction provider system 126.
Transaction processing component 206 is configured to process a transaction request received from system 104 using transaction security component 212. Component 212 includes a multi-factor transaction authentication component 218 and a registration record accessing component 220 configured to access registration records 222 in data store 214. Multi-factor transaction authentication component 218 is configured to authenticate the requested transaction with multiple factor authentication (e.g., two-factor authentication et cetera).
In one example, TSAS 124 comprises a service through which users, such as user 102, registers their respective transaction instruments and client devices. Registration component 210 facilitates this registration through client device interface component 204, which communicates with client agent 142 (or other components) on client device 106. In one example, registration component 210 includes a unique transaction instrument identifier generation component 224 that is configured to generate unique identifiers for transaction instruments registered with TSAS 124.
For sake of further illustration,
At block 252, a request to register a user transaction instrument with TSAS 124 is received or otherwise identified. For example, a registration request can be automatically sent to TSAS 124 when a new transaction instrument is issued to a user by transaction provider system 126. This is represented by block 254. In another example, user 102 can connect to TSAS 124 using client device 106. This is represented by block 256. In this example, client device 106 is used to log into TSAS 124 through network 108 using an encrypted relationship for communication between client device 106 and TSAS 124.
At block 258, transaction instrument information is obtained. This can include receiving an account numbers financial institution or provider information, and/or user information for user 102. In the illustrated example, the information obtained at block 258 comprises enough information to allow TSAS 124 to process a value transfer using the transfer instrument with transaction provider system 126. In the case of a credit card, for example, the information obtained at block 258 includes, but is not limited to, a credit card account number, expiration date, security code (e.g., CSC or CSV), financial institution information, et cetera.
At block 260, user contact information is obtained. In the illustrated example, the user contact information obtained at block 260 comprises enough information to allow TSAS 124 to contact user 102 on client device 106 to authenticate a transaction that user 102 (or other user associated with user 102) is making with system 104.
For example, client device information can be obtained at block 262. For instance, where client device 106 comprises a mobile phone, the client device information can include a phone number that allows TSAS 124 to initiate a phone call or send an electronic message (e.g., SMS, et cetera) to the mobile phone. Thus, in one example in which client device 106 does not include a client agent 142 (for example, if client device 106 is a non-smart device such as a feature phone), the communications between client device 106 and TSAS 124 can be performed using other functionality supported by client device 106, such as, but not limited to, sending and receiving SMS or voice messages.
In another example, the information at block 262 can include an electronic serial number (ESN), IP address, or other information associated with client device 106 that allows TSAS 124 to communicate with client agent 142 running on client device 106.
In another example, the information obtained at block 260 is not specific to client device 106. For instance, an email address of the user can be provided at block 260. User 102 can utilize a browser, for example, on client device 106 to access the user's email account to respond to an email sent by TSAS 124 during a transaction authentication process.
Also, it is noted that the information obtained at block 260 can comprise information for a plurality of different communication modalities and channels. For example, for one transaction instrument, the user can provide a phone number for the user's mobile phone and the address of the user's tablet computer so that TSAS 124 uses both devices to contact the user when authenticating a transaction.
At block 264, additional transaction information can be obtained. For example, user preferences can be obtained that define how the user wants the transactions to be authenticated by TSAS 124. This is represented at block 266. In one example, the user can specify an order flow of authentication steps that define which devices should be used to contact user 102 and an order in which those devices are used. In another example, the user can pick a modality for the communication during the authentication. For example, one user may prefer to receive SMS messages while another user may prefer to receive a phone call. Other information can be obtained as well. This is represented at block 268. At block 270, a registration record is generated and stored with TSAS 124. As illustrated in the example of
As shown in
As discussed in further detail below, this advantageously allows user 102 to perform a transaction with system 104 without having to provide the actual transaction instrument to system 104 during the transaction. This is discussed in further detail below.
Registration record 280 includes a user name field 284 that identifies the user, a transaction instrument information field 286 that includes information for the transaction instrument, and a transaction provider information field 288. By way of example, field 286 stores the information for the transaction instrument that is required by TSAS 124 to process a funds transfer with transaction provider system 126 using the transaction instrument. In the case of a checking account, for example, this can include an account number and routing number. In the case of a credit card, for example, this can include a card number, expiration date, CSV, et cetera. The information field 288 can include a name, address and/or other information for the transaction provider system 126 that will process the transaction using the transaction instrument.
Record 280 can also include a client device information field 290 that stores information for the client device, a transaction confirmation modality field 292, a user preferences field 294, and it can include other fields 296 as well. Transaction confirmation modality field 292 identifies a modality for confirming the transaction with user 102 and user preferences field 294 stores user preferences for the confirmation.
At block 302, FET system 104 receives a request to perform a transaction. In the illustrated example, the transaction involves a card-not-present payment, such as in a mobile on-premise transaction or an online transaction. For instance, in a mobile on-premise transaction a user approaches a POS terminal and initiates a transaction using their mobile phone that stores a unique transaction instrument identifier 152. In an online transaction example, such as an e-commerce transaction, a user browses a website of a retail organization and selects one or more products to purchase and then initiates a checkout process. In other words, at block 302, user 102 may be physically present within a brick and mortar retail store of an organization, or maybe using an online marketplace or store of the organization. Other scenarios are possible as well.
At block 304, system 104 requests user transaction instrument information to complete the transaction. For example, system 104 can prompt or otherwise request the user to provide the unique transaction instrument identifier 152 for the transaction instrument that user 102 wants to use for the transaction. The user can be prompted manually (e.g., by an employee at a POS) and/or automatically by system 104 (e.g., by an electronic device at a POS or through a web browser).
At block 306, a transaction agent (e.g., transaction agent 138 and/or 146) receives the unique transaction instrument identifier from user 102. In one example, the user 102 can manually provide this information to system 104. For example, the user can verbally communicate this information to an employee user of system 104 or manually enter this information into an input device of system 104.
In another example, block 306 can be performed automatically or semi-automatically. For instance, user 102 uses client device 106 to wirelessly communicate the unique transaction instrument identifier 152 to a corresponding wireless input device of system 104. Also, the user can provide additional information. For instance, user 102 can identify how the user wishes to confirm the transaction with TSAS 124. In one example, user 102 can identify the device that the user wants to be contacted with and/or a modality for the confirmation request.
At block 308, the transaction agent sends a transaction request to TSAS 124. The request includes the unique transaction instrument identifier provided by user 102. This is represented by block 310. In one example, the unique transaction instrument identifier sent to TSAS 124 comprises an encrypted token. Also, the transaction request can include a transaction amount. This is represented by block 312. Alternatively, or in addition, the transaction request can include a transaction identifier (e.g., a transaction number that identifies the transaction for which the request is being sent). This is represented by block 314. Other information such as client device information, confirmation modality, et cetera can also be sent with the transaction request. This is represented by block 316.
At block 318, TSAS 124 performs multi-factor authentication to approve the transaction request. In the illustrated example, this includes authenticating the unique transaction instrument identifier. This is represented by block 320. In one example, TSAS 124 determines that the unique transaction instrument identifier provided with the transaction request comprises a valid identifier registered in data store 214.
At block 322, TSAS 124 performs second-factor authentication by sending a transaction confirmation request to user 102. For instance, TSAS 124 uses client device interface component 204 to send a communication to client device 106. This can take any of a variety of different communication forms. For example, TSAS 124 can send an electronic message (e.g., email, text message, et cetera), initiate a voice call with user 102, or communicate via client agent 142 on client device 106. Client agent 142 can comprise an application running on client device 106 that presents user interfaces to user 102 that prompts user 102 for confirmation input.
At block 324, the client device generates a transaction confirmation. In one example, client agent 142 utilizes display system controller 176 to control display system 116 to present user interface displays 130 with transaction details. The transaction details can include, but are not limited, an amount of the transaction, a location of the transaction, the organization with which the transaction is taking place, et cetera. This is represented by block 326.
At block 328, user 102 is prompted for a manual input the confirms the transaction. In one example, user 102 responds to messages from an automated system. In another example, user 102 can communicate with person, via a phone call or instant messaging service, that authenticates user 102 for TSAS 124.
In the illustrated example, client device 106 prompts user 102 for input, such as by actuating a user input mechanism (e.g., an accept button). This is represented by block 330. In another example, the user can provide biometric data, such as using a fingerprint or retina scanner on client device 106. This is represented by block 332. In another example, the user can input a personal identification number (PIN) through client device 106. This is represented by block 334. The confirmation can be received from user 102 in other ways as well. This is represented by block 336.
Alternatively, or in addition, the transaction confirmation can be automatically generated by client device 106. This is represented by block 338. For example, client agent 142 can be configured to automatically confirm a transaction in accordance with a set of pre-defined parameters that ensure appropriate authentication of the transaction. For instance, client agent 142 can determine a location of the client device in relation to the location and organization provided with the transaction request. This ensures that the client device is physically present at the location from which the transaction request originated. This, of course, is by way of example only. Other ways of automatically confirming the transaction requests are possible.
At block 340, the client device sends the transaction confirmation to TSAS 124. For example, where user 102 is prompted via a phone call, user 102 can provide a voice input or key press input upon which client device 106 sends a signal to TSAS 124 indicating that user 102 has confirmed the transaction. In another example, at block 340, user 102 can respond with a reply email, SMS message, voice message, or any other suitable communication protocol supported by client device 106.
At block 342, TSAS 124 processes the transaction confirmation to approve the transaction. Based on approving the transaction, at block 344 TSAS 124 processes the transaction with transaction provider system 126. TSAS 124 confirms that the transaction has been processed at block 346. Then, TSAS 124 can send a confirmation that the transaction has been processed to FET system 104 and/or client device 106. This is represented by block 348. The transaction can be finalized or otherwise processed by FET system 104 at block 350.
It can thus be seen that the present description provides significant technical advantages. For sake of illustration, but not by limitation, organizations such as retail establishments are often required to support a variety of different value transfer methods. Many retail establishments are able to accept cash as a payment option, but they can also accept non-cash payment instruments with which a user, such as a consumer, transfers funds between accounts at banks or other financial institutions. Some examples of payment instruments include, but are not limited to, charge cards, credit cards, and debit cards. Further, there are a variety of different types of payment cards. Some cards include magnetic stripes where information is read by a magnetic stripe reader at a point of sale. Other payment cards examples include smart cards or integrated circuit cards (i.e., chip cards) which include an embedded integrated circuit chip that interacts with a chip card reader at the point of sale. These of course, are examples only.
Computing systems used by merchants or other retail organizations facilitate mobile or e-commerce transactions, or other transactions in which the cardholder does not or cannot physically present the card for the merchant's visual examination. These transactions are referred to as “card-not-present” transactions. Some examples of card-not-present transactions include, but are not limited to, payments made by mail-order transactions by mail or fax, or over the phone or internet (e.g., a user accesses a merchant's e-commerce presence, such as an online store or marketplace, to select and purchase goods or services). Another example of a card-not-present transaction includes a mobile payment in which a user uses their mobile device to transfer stored payment card information to the merchant's system, but the user does not physically possess the payment card or otherwise cannot physically present the payment card to the merchant.
Industry standards, such as the Payment Card Industry Data Security Standard (PCI DSS), apply to entities involved in payment card processing, including merchants, processors, acquirers, issuers, and service providers, as well as all other entities that store, process or transmit payment card holder data (CHD). These standards often apply to e-commerce and mobile payments as they accept payment card holder data for the purpose of charging to the payment card for products or services. Further, payment card transactions often include an interchange fee paid between banks or other financial institutions for the acceptance of the card-based transactions. By way of example, the interchange fee is usually a fee that a merchant's bank pays a customer's bank. The card-issuing bank in the transaction deducts the interchange fee from the amount it pays the acquiring bank that handles the transaction for the merchant. The acquiring bank then pays the merchant the amount of the transaction minus both the interchange fee and, often, an additional fee referred to as a discount rate. These interchange rates and fees are much higher for card-not-present transactions than card-present transactions.
Further yet, the lack of presence of the payment card for the transaction increases the possibility of fraudulent activity and other card holder data card security issues. One way to address these limitations is payment card tokenization. However, payment card tokenization does not eliminate the need of the payment solution to accept card numbers entered by the consumer before the number can be tokenized. Another way to address these issues is end-to-end encryption. However, end-to-end encryption requires additional peripherals, such as an encrypted audio jack MSR, or an expensive EMV-capable terminal, and does not allow for “non-smart” phones to make the payment. Also, these solutions do not avoid the expensive card-not-present interchanges rates.
Architecture 100 provides an electronic transaction framework that facilitates secure transfer of user and transaction instrument information in mobile and online transactions, or other card-not-present transactions in which the transaction is made without the card holder physically presenting the transaction instrument for visual examination. In addition to increasing security in these transactions, architecture 100 allows these types of transactions to be settled with transaction interchange rates and fees that are close to card-present transactions.
Architecture 100 reduces the processing burden on an organization by reducing the need to securely pass around transaction instrument information such as payment card information and payment card tokens. The user does not need to send payment card information to the organization during the transaction. Rather, the transaction is independently and separately authenticated with the user using a transaction security and authentication system.
The present discussion has mentioned processors and servers. In one embodiment, the processors and servers include computer processors with associated memory and timing circuitry, not separately shown. They are functional parts of the systems or devices to which they belong and are activated by, and facilitate the functionality of the other components or items in those systems.
Also, a number of user interface displays have been discussed. They can take a wide variety of different forms and can have a wide variety of different user actuatable input mechanisms disposed thereon. For instance, the user actuatable input mechanisms can be text boxes, check boxes, icons, links, drop-down menus, search boxes, et cetera. They can also be actuated in a wide variety of different ways. For instance, they can be actuated using a point and click device (such as a track ball or mouse). They can be actuated using hardware buttons, switches, a joystick or keyboard, thumb switches or thumb pads, et cetera. They can also be actuated using a virtual keyboard or other virtual actuators. In addition, where the screen on which they are displayed is a touch sensitive screen, they can be actuated using touch gestures. Also, where the device that displays them has speech recognition components, they can be actuated using speech commands.
A number of data stores have also been discussed. It will be noted they can each be broken into multiple data stores. All can be local to the systems accessing them, all can be remote, or some can be local while others are remote. All of these configurations are contemplated herein.
Also, the figures show a number of blocks with functionality ascribed to each block. It will be noted that fewer blocks can be used so the functionality is performed by fewer components. Also, more blocks can be used with the functionality distributed among more components.
The description is intended to include both public cloud computing and private cloud computing. Cloud computing (both public and private) provides substantially seamless pooling of resources, as well as a reduced need to manage and configure underlying hardware infrastructure.
A public cloud is managed by a vendor and typically supports multiple consumers using the same infrastructure. Also, a public cloud, as opposed to a private cloud, can free up the end users from managing the hardware. A private cloud may be managed by the organization itself and the infrastructure is typically not shared with other organizations. The organization still maintains the hardware to some extent, such as installations and repairs, et cetera.
In the embodiment shown in
It will also be noted that architecture 100, or portions of it, can be disposed on a wide variety of different devices. Some of those devices include servers, desktop computers, laptop computers, tablet computers, or other mobile devices, such as palm top computers, cell phones, smart phones, multimedia players, personal digital assistants, et cetera.
Under other embodiments, applications or systems are received on a removable Secure Digital (SD) card that is connected to a SD card interface 15. SD card interface 15 and communication links 13 communicate with a processor 17 along a bus 19 that is also connected to memory 21 and input/output (I/O) components 23, as well as clock 25 and location system 27.
I/O components 23, in one embodiment, are provided to facilitate input and output operations. I/O components 23 for various embodiments of the device 16 can include input components such as buttons, touch sensors, multi-touch sensors, optical or video sensors, voice sensors, touch screens, proximity sensors, microphones, tilt sensors, and gravity switches and output components such as a display device, a speaker, and or a printer port. Other I/O components 23 can be used as well.
Clock 25 illustratively comprises a real time clock component that outputs a time and date. It can also, illustratively, provide timing functions for processor 17.
Location system 27 illustratively includes a component that outputs a current geographical location of device 16. This can include, for instance, a global positioning system (GPS) receiver, a LORAN system, a dead reckoning system, a cellular triangulation system, or other positioning system. It can also include, for example, mapping software or navigation software that generates desired maps, navigation routes and other geographic functions.
Memory 21 stores operating system 29, network settings 31, applications 33, application configuration settings 35, data store 37, communication drivers 39, and communication configuration settings 41. Memory 21 can include all types of tangible volatile and non-volatile computer-readable memory devices. It can also include computer storage media (described below). Memory 21 stores computer readable instructions that, when executed by processor 17, cause the processor to perform computer-implemented steps or functions according to the instructions. Items in data store 128, for example, can reside in memory 21. Similarly, device 16 can have a client system 24 which can run various business applications. Processor 17 can be activated by other components to facilitate their functionality as well.
Examples of the network settings 31 include things such as proxy information, Internet connection information, and mappings. Application configuration settings 35 include settings that tailor the application for a specific enterprise or user. Communication configuration settings 41 provide parameters for communicating with other computers and include items such as GPRS parameters, SMS parameters, connection user names and passwords.
Applications 33 can be applications that have previously been stored on the device 16 or applications that are installed during use, although these can be part of operating system 29, or hosted external to device 16, as well.
Additional examples of devices 16 can be used, as well. Device 16 can be a feature phone, smart phone or mobile phone. The phone includes a set of keypads for dialing phone numbers, a display capable of displaying images including application images, icons, web pages, photographs, and video, and control buttons for selecting items shown on the display. The phone includes an antenna for receiving cellular phone signals such as General Packet Radio Service (GPRS) and 1Xrtt, and Short Message Service (SMS) signals. In some embodiments, phone also includes a Secure Digital (SD) card slot that accepts a SD card.
The mobile device can be personal digital assistant (PDA) or a multimedia player or a tablet computing device, et cetera (hereinafter referred to as a PDA). The PDA can include an inductive screen that senses the position of a stylus (or other pointers, such as a user's finger) when the stylus is positioned over the screen. This allows the user to select, highlight, and move items on the screen as well as draw and write. The PDA also includes a number of user input keys or buttons which allow the user to scroll through menu options or other display options which are displayed on the display, and allow the user to change applications or select user input functions, without contacting the display. Although not shown, The PDA can include an internal antenna and an infrared transmitter/receiver that allow for wireless communication with other computers as well as connection ports that allow for hardware connections to other computing devices. Such hardware connections are typically made through a cradle that connects to the other computer through a serial or USB port. As such, these connections are non-network connections. In one embodiment, mobile device also includes a SD card slot that accepts a SD card.
Note that other forms of the devices 16 are possible.
Computer 810 typically includes a variety of computer readable media. Computer readable media can be any available media that can be accessed by computer 810 and includes both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Computer storage media is different from, and does not include, a modulated data signal or carrier wave. It includes hardware storage media including both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by computer 810. Communication media typically embodies computer readable instructions, data structures, program modules or other data in a transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of any of the above should also be included within the scope of computer readable media.
The system memory 830 includes computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) 831 and random access memory (RAM) 832. A basic input/output system 833 (BIOS), containing the basic routines that help to transfer information between elements within computer 810, such as during start-up, is typically stored in ROM 831. RAM 832 typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by processing unit 820. By way of example, and not limitation,
The computer 810 may also include other removable/non-removable volatile/nonvolatile computer storage media. By way of example only,
Alternatively, or in addition, the functionality described herein can be performed, at least in part, by one or more hardware logic components. For example, and without limitation, illustrative types of hardware logic components that can be used include Field-programmable Gate Arrays (FPGAs), Program-specific Integrated Circuits (ASICs), Program-specific Standard Products (ASSPs), System-on-a-chip systems (SOCs), Complex Programmable Logic Devices (CPLDs), et cetera.
The drives and their associated computer storage media discussed above and illustrated in
A user may enter commands and information into the computer 810 through input devices such as a keyboard 862, a microphone 863, and a pointing device 861, such as a mouse, trackball or touch pad. Other input devices (not shown) may include a joystick, game pad, satellite dish, scanner, or the like. These and other input devices are often connected to the processing unit 820 through a user input interface 860 that is coupled to the system bus, but may be connected by other interface and bus structures, such as a parallel port, game port or a universal serial bus (USB). A visual display 891 or other type of display device is also connected to the system bus 821 via an interface, such as a video interface 890. In addition to the monitor, computers may also include other peripheral output devices such as speakers 897 and printer 896, which may be connected through an output peripheral interface 895.
The computer 810 is operated in a networked environment using logical connections to one or more remote computers, such as a remote computer 880. The remote computer 880 may be a personal computer, a hand-held device, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to the computer 810. The logical connections depicted in
When used in a LAN networking environment, the computer 810 is connected to the LAN 871 through a network interface or adapter 870. When used in a WAN networking environment, the computer 810 typically includes a modem 872 or other means for establishing communications over the WAN 873, such as the Internet. The modem 872, which may be internal or external, may be connected to the system bus 821 via the user input interface 860, or other appropriate mechanism. In a networked environment, program modules depicted relative to the computer 810, or portions thereof, may be stored in the remote memory storage device. By way of example, and not limitation,
It should also be noted that the different embodiments described herein can be combined in different ways. That is, parts of one or more embodiments can be combined with parts of one or more other embodiments. All of this is contemplated herein.
Example 1 is a transaction security and authentication system comprises a front-end transaction system interface component configured to communicate with a front-end transaction system that performs a transaction with a user, a client device interface component configured to communicate with a client device of the user, and a transaction security component configured to receive a transaction request, for the transaction, from the front-end transaction system, the transaction request including a unique transaction instrument identifier, and authenticate the transaction by sending a transaction confirmation request to the client device based on the unique transaction instrument identifier and receiving a transaction confirmation from the client device.
Example 2 is the transaction security and authentication system of any or all previous examples, wherein the transaction security component is configured to identify, based on the unique transaction instrument identifier, the client device of the user and a transaction instrument associated with the user.
Example 3 is the transaction security and authentication system of any or all previous examples, wherein the unique transaction instrument identifier comprises an encrypted token.
Example 4 is the transaction security and authentication system of any or all previous examples, and further comprising a registration component configured to generate a registration record that associates the unique transaction instrument identifier to the transaction instrument and to the user, and store the registration record in a data store.
Example 5 is the transaction security and authentication system of any or all previous examples, wherein the registration component is configured to receive a registration request for the transaction instrument associated with the user and to generate the registration record to associate the client device of the user with the unique transaction instrument identifier.
Example 6 is the transaction security and authentication system of any or all previous examples, and further comprising a transaction processing component configured to process the authenticated transaction.
Example 7 is the transaction security and authentication system of any or all previous examples, wherein the unique transaction instrument identifier is generated by the transaction security and authentication system.
Example 8 is the transaction security and authentication system of any or all previous examples, and further comprising a transaction provider system interface component configured to communicate with a transaction provider system, wherein the transaction processing component processes the authenticated transaction by transmitting information for the authenticated transaction to the transaction provider system through the transaction provider system interface component.
Example 9 is the transaction security and authentication system of any or all previous examples, wherein the unique transaction instrument identifier is based on an identifier assigned to the transaction instrument by the transaction provider system.
Example 10 is the transaction security and authentication system of any or all previous examples, wherein the transaction comprises a value transfer and the transaction request identifies an amount.
Example 11 is the transaction security and authentication system of any or all previous examples, wherein the transaction confirmation request prompts the user for a user input on the client device, and the transaction confirmation is sent by the client device in response to the user input.
Example 12 is a computer-implemented method comprising communicating, to a front-end transaction system, a unique transaction instrument identifier for a transaction between a user and the front-end transaction system, receiving, at a client device, a transaction confirmation request from a transaction authentication system that is separate from the front-end transaction system, prompting, using the client device, the user for a user input to confirm the transaction, detecting a user input on the client device that confirms the transaction, and sending a transaction confirmation to the transaction authentication system.
Example 13 is the computer-implemented method of any or all previous examples, wherein communicating comprises electronically transmitting the unique transaction instrument identifier from the client device to the front-end transaction system.
Example 14 is the computer-implemented method of any or all previous examples, wherein the unique transaction instrument identifier is electronically transmitted using corresponding wireless data communication devices on the client device and the front-end trans action system.
Example 15 is the computer-implemented method of any or all previous examples, wherein prompting comprises generating a transaction confirmation user interface display that displays transactions details for the transaction.
Example 16 is a mobile device comprising a data store that stores a unique transaction instrument identifier, a communication system configured to transmit, to a transaction system, the unique transaction instrument identifier for a transaction between a user and the transaction system, and to receive, from a transaction authentication system, a transaction confirmation request that requests user confirmation of the transaction, and a display system configured to generate a transaction confirmation user interface display, with a user input mechanism, based on the transaction confirmation request and to detect a user interaction with the user input mechanism that provides the user confirmation of the transaction, wherein the communication system is configured to transmit a confirmation to the transaction authentication system in response to the user confirmation.
Example 17 is the mobile device of any or all previous examples, wherein the transaction system comprises a front-end transaction system that is separate from the transaction authentication system.
Example 18 is the mobile device of any or all previous examples, and further comprising a client agent that is configured to receive the transaction confirmation request and to control the display system to generate the transaction confirmation user interface display.
Example 19 is the mobile device of any or all previous examples, wherein the transaction confirmation user interface display displays transaction details for the transaction.
Example 20 is the mobile device of any or all previous examples, wherein the communication system comprises a wireless data communication device configured to transmit the unique transaction instrument identifier to a corresponding wireless data communication device in the transaction system.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims and other equivalent features and acts are intended to be within the scope of the claims.
The present application is based on and claims the benefit of U.S. provisional patent application Ser. No. 62/135,331, filed Mar. 19, 2015, the content of which is hereby incorporated by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
62135331 | Mar 2015 | US |