Security system incorporating mobile device

Information

  • Patent Grant
  • 11995633
  • Patent Number
    11,995,633
  • Date Filed
    Wednesday, February 6, 2019
    6 years ago
  • Date Issued
    Tuesday, May 28, 2024
    8 months ago
  • Inventors
  • Original Assignees
  • Examiners
    • Huang; Jay
    Agents
    • Kilpatrick Townsend & Stockton LLP
Abstract
In some embodiments, a first server computer may be provided. The first server computer may comprise a processor and a computer readable medium coupled to the processor. The computer readable medium may include code executable by the processor for implementing a method. The method may include the step of electronically receiving an authorization request message that includes a first device verification value from a merchant for a first transaction, where the first device verification value may have been received by the merchant from a mobile device based on an interaction between the mobile device and an access device. In some embodiments, the mobile device may have received the first verification value based on a first request. The method may further include the step of determining by a data processor if the first device verification value corresponds to a stored device verification value.
Description
BACKGROUND

As methods and devices for engaging in financial transactions have increased, old problems such as fraud and counterfeiting persist. Improved methods and systems for providing greater security in payment transactions are desirable.


Further, the use of mobile devices (such as mobile phones) as payment devices is also becoming more prevalent. It would further be desirable to improve the security of transactions conducted using phones or other types of mobile devices, in a card-present type of transaction environment.


BRIEF SUMMARY

Embodiments disclosed herein may provide for systems, methods, and/or apparatuses that may utilize a mobile device and/or form fill payment processing in a financial transaction. The systems and methods may be implemented using one or more computer apparatuses and/or databases. Although some embodiments are described below with reference to a server computer, embodiments are not so limited and may utilize the methods described herein using any suitable apparatus or system.


In some embodiments, a first server computer may be provided. The first server computer may comprise a processor and a computer readable medium coupled to the processor. The computer readable medium may include code executable by the processor for implementing a method. The method may include the step of electronically receiving an authorization request message that includes a first device verification value from a merchant for a first transaction, where the first device verification value may have been received by the merchant from a mobile device based on an interaction between the mobile device and an access device. In some embodiments, the mobile device may have received the first verification value based on a first request. The method may further include the step of determining by a data processor if the first device verification value corresponds to a stored device verification value.


In some embodiments, in the first server computer has described above, the first request may have been based on an interaction between the mobile device and a portable consumer device associated with the first transaction. In some embodiments, in the first server computer as described above, the interaction between the mobile device and the access device may comprise short-range wireless communication.


In some embodiments, in the first server computer as described above, the method may further include the step of electronically receiving the first request for the first device verification value from the mobile device, where the first request comprises identification information for the portable consumer device. The method may further include the steps of performing by a data processor at least one validation test pertaining to the first request and electronically sending the first device verification value to the mobile device if the at least one validation test is passed. In some embodiments, the method may further include the step of electronically storing the first device verification value.


In some embodiments, in the first server computer as described above, the access device may comprise a point-of-sale terminal (POS). In some embodiments, the first device verification value may comprise a dynamic card verification value 2 (dCVV2), a dynamic primary account number (dPAN), and/or a shared secret value.


In some embodiments, a first method may be provided. The first method may include the steps of electronically receiving an authorization request message comprising a first device verification value from a merchant for a first transaction and determining by a data processor if the first device verification value corresponds to a stored device verification value. In some embodiments, the first device verification value may have been received by the merchant from a mobile device based on an interaction between the mobile device and an access device. In some embodiments, the interaction between the mobile device and the access device may comprise short-range wireless communication. In some embodiments, the mobile device may have received the first verification value based on a first request. In some embodiments, the first request may have been based on an interaction between the mobile device and a portable consumer device.


In some embodiments, the first method as described may further include the steps of electronically receiving the first request for the first device verification value from the mobile device, where the first request may comprise identification information for the portable consumer device. The first method may further include the steps of performing by a data processor at least one validation test pertaining to the first request, electronically sending the first device verification value to the mobile device if the at least one validation test is passed, and electronically storing the first device verification value.


In some embodiments, the first method as described above may further include the steps of generating an authorization response message based at least in part on the determination by the data processor as to whether the first device verification value corresponds to the stored device verification value and electronically sending the authorization response message to the merchant.


In some embodiments, in the first method as described above, the first request may include information associated with the mobile device; and the at least one validation test pertaining to the first request may be based at least in part on the information associated with the mobile device.


In some embodiments, the first method as described above may further include the step of establishing a communications session with the mobile device. In some embodiments, a secured communication channel may be secured by one or more encryption keys. In some embodiments, the first request for the first device verification value may be received through the communications session. In some embodiments, the first device verification value may be provided through the communications channel.


In some embodiments, a mobile device may be provided. The mobile device may include a processor, and a computer readable medium coupled to the processor, where the computer readable medium may comprise code executable by the processor for implementing a method. The method may include the steps of electronically sending a first request for a first device verification value to a server computer and electronically receiving from the server computer the first device verification value. The method may further include the step of electronically sending the first device verification value to a merchant associated with a first transaction based on an interaction between the mobile device and an access device.


In some embodiments, for the mobile device as described above, the method may further include the step of receiving identification information stored on a portable consumer device based on an interaction between the portable consumer device and the mobile device. In some embodiments, the interaction between the mobile device and the access device may comprise short range wireless communication. In some embodiments, the first request may include at least some of the identification information stored on the portable consumer device. In some embodiments, the first device verification value may be received by the mobile device if the first request is validated based at least in part on the identification information.


In some embodiments, the first device verification value sent to the merchant may be included by the merchant in an authorization request message sent to a payment processing network. In some embodiments, the mobile device may comprise a verification token.


In some embodiments, in the mobile device as described above, the method may further include the steps of storing the first device verification value, and electronically sending the first device verification value to a merchant associated with a second transaction based on an interaction between the mobile device and an access device.


In some embodiments, a first method may be provided. The first method may include the steps of electronically sending by a mobile device a first request for a first device verification value to a server computer, electronically receiving at the mobile device the first device verification value from the server computer, and electronically sending by the mobile device the first device verification value to a merchant associated with a first transaction based on an interaction between the mobile device and an access device.


In some embodiments, the first method as described above may further include the step of receiving at the mobile device identification information stored on a portable consumer device based on an interaction between the portable consumer device and the mobile device. In some embodiments, the first request may include at least some of the identification information stored on the portable consumer device. In some embodiments, the first device verification value is received by the mobile device if the first request is validated based at least in part on the identification information


In some embodiments, the first method as described above may further include the steps of initiating a first transaction with the first merchant, and interacting with the access device for the merchant associated with the first transaction using the mobile device.


In some embodiments, the interaction with the access device may comprise short-range communication. In some embodiments, the first merchant may include the first device verification value in an authorization request message associated with the first transaction.


In some embodiments, in the first method as described above, the first method may further include the step of presenting the portable consumer device to the first merchant to pay for the first transaction.


In some embodiments, in the first method as described above, the first method may further include the step of presenting the mobile device to the first merchant to pay for the first transaction.


In some embodiments, a first method may be provided that comprises the steps of: electronically sending by a mobile device a first request for first information to a server computer, where the first request is generated based on an interaction between the mobile device and a portable consumer device; electronically receiving at the mobile device the first information from the server computer; and electronically sending by the mobile device the first information to a merchant associated with a first transaction based on an interaction between the mobile device and an access device located at the merchant.


As discussed herein, systems, methods and apparatuses for conducting a financial transaction may be provided. In some embodiments, a consumer may receive a device verification value (e.g. a dCVV2 value) from a verification entity and may use the device verification value as evidence of the authenticity of a financial transaction. For example, during a first transaction, a consumer may use a mobile device (such as a mobile phone) to interact with a portable consumer device (e.g. by swiping a payment card or through use of a contactless interface) to retrieve information stored on the portable device (e.g. an account number, card verification values, expiration date, etc). This information (along with information related to the mobile device) may then be sent to a verification entity (such as, for example, a payment processing network or component thereof) as part of a request for a device verification value. The validation entity may perform one or more validation tests on the received request based on some or all of the information received from the mobile device, and may then return to the mobile device the device verification value (assuming the request is validated). The device verification value may thereby serve as an indication that the portable consumer device, the mobile device, and/or the consumer has been validated. However, embodiments are not so limited, and the mobile device may receive the device verification value in any suitable manner and based on any request (i.e. a request for a device verification value may, but need not, be based on interaction with a portable consumer device).


In some embodiments, the consumer may present the device verification value to a merchant as part of a financial transaction. For instance, in some embodiments, the device verification value may be stored on the consumer's mobile device, and may be transferred to the merchant through a physical interface or, preferably, through the use of short-range wireless communications (e.g. the mobile device may interact with an access device, such as a POS terminal, through a contactless interface) as part of the first financial transaction. The merchant may then generate an authorization request message for the first transaction that includes, inter alia, the device verification value received from the consumer (via the mobile device) along with other transaction related information (such as, for example, the transaction amount, a merchant identifier, information associated with the portable consumer device, etc.). The authorization request message may be sent to a payment processing network. The device verification value included in the authorization request may be compared by the payment processing network (or any other suitable entity) to a stored version of the device verification value associated with the portable consumer device. If these values match, then it is less likely that the transaction is fraudulent.


In some embodiments, the mobile device may further include a secured element such as a verification token that may perform some or all of the functions described herein and thereby reduce the likelihood of tampering with the hardware and/or software. Such a secured element (even if an independent component incorporated within the mobile device, or a separate competent coupled to the mobile device) may be considered a part of the mobile device as used herein.


Thus, in some embodiments, a financial transaction may take place in a card-present type of (e.g. “brick and mortar”) environment—i.e. the consumer may be at a merchant location, such as in the merchant's store—rather than a virtual environment, but still provide for increased security for conducting a financial transaction.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 shows a block diagram of a system according to an embodiment of the invention.



FIG. 2 shows a block diagram of an exemplary system comprising a server computer in accordance with some embodiments.



FIGS. 3(a) and 3(b) show flowcharts illustrating exemplary methods of conducting a financial transaction in accordance with some embodiments.



FIG. 4 shows a flowchart illustrating a method for conducting a financial transaction in accordance with some embodiments.



FIG. 5 shows an illustration of components of a system and exemplary interactions and steps performed of a method in accordance with some embodiments.



FIG. 6 shows a block diagram of some of the components that may comprise a verification token of a mobile device in accordance with some embodiments.



FIG. 7 shows a block diagram of an exemplary computer apparatus.



FIG. 8(a) shows a block diagram of some of the functional components that may comprise an exemplary mobile device in accordance with some embodiments.



FIG. 8(b) shows a schematic depiction of an exemplary portable consumer device in the form of a payment card.





DETAILED DESCRIPTION

The following disclosure may provide exemplary systems, devices, and methods for conducting a financial transaction and related activities, and in particular, methods of generating and/or obtaining a device verification value using a mobile device, and presenting that device verification value to a merchant for use in authorizing the financial transaction.


This application comprises subject matter that is related to U.S. App. Ser. No. 61/365,119, filed on Jul. 16, 2010, U.S. App. Ser. No. 61/178,636, filed on May 15, 2009, and U.S. application Ser. No. 12/712,148, filed on Feb. 24, 2010, each of which are herein incorporated by reference in their entirety for all purposes.


Before discussing specific embodiments of the invention, some descriptions of some specific terms are provided below.


As used herein, a “mobile device” may comprise any electronic device that may be transported and operated by a user that may also provide remote communication capabilities to a network. Examples of remote communication capabilities include using a mobile phone (wireless) network, wireless data network (e.g. 3G, 4G or similar networks), Wi-Fi, Wi-Max, or any other communication medium that may provide access to a network such as the Internet or a private network (such as those used by a payment processing network). Examples of mobile devices include mobile phones (e.g. cellular phones), PDAs, tablet computers, net books, laptop computers, personal music players, hand-held specialized readers, etc. A mobile device may comprise any suitable hardware and software for performing such functions, and may also include multiple devices or components (e.g. when a device has remote access to a network by tethering to another device—i.e. using the other device as a modem—both devices taken together may be considered a single mobile device). A mobile device may also comprise a verification token in the form of, for instance, a secured hardware or software component within the mobile device and/or one or more external components that may be coupled to the mobile device.


As used herein, a “portable consumer device” may be any suitable device that allows a transaction to be conducted with a merchant. A portable consumer device may be in any suitable form. For example, suitable portable consumer devices can be hand-held and compact so that they can fit into a consumer's wallet and/or pocket (e.g., pocket-sized). They may include smart cards, magnetic stripe cards, keychain devices (such as the Speedpass™ commercially available from Exxon-Mobil Corp.), etc. Other examples of portable consumer devices include cellular phones, personal digital assistants (PDAs), pagers, payment cards, security cards, access cards, smart media, transponders, 2-D barcodes, and the like.


As used herein, an “access device” may be any suitable device for communicating with a merchant computer and for interacting with a portable consumer device and/or mobile device. An access device may in general be located in any suitable location, such as at the same location as a merchant. An access device may be in any suitable form. Some examples of access devices include POS devices, cellular phones, PDAs, personal computers (PCs), tablet PCs, hand-held specialized readers, set-top boxes, electronic cash registers (ECRs), automated teller machines (ATMs), virtual cash registers (VCRs), kiosks, security systems, access systems, Websites, and the like. An access device may use any suitable contact or contactless mode of operation to send or receive data from portable consumer device and/or mobile device.


In some embodiments, where an access device may comprise a POS terminal, any suitable POS terminal may be used and may include a reader, a processor, and a computer-readable medium. A reader may include any suitable contact or contactless mode of operation. For example, exemplary card readers can include radio frequency (RF) antennas, optical scanners, bar code readers, magnetic stripe readers, etc. to interact with a portable consumer device and/or mobile device.


As used herein, a “verification token” may refer to a secured device or component of a device (such as a software or hardware module) that may be used to authenticate or validate a user or portable consumer device. That is, for example, the verification token may refer to a secured component (or components) of a mobile device used to determine that a user is not misrepresenting his identity and/or that he has in his possession a portable consumer device. An example of a verification token is provided in U.S. application Ser. No. 12/712,148 to Hammad, which is again hereby incorporated by reference in its entirety. In general, a verification token may take any suitable form, including an embedded software/hardware module in a mobile device or an attachment to a mobile device (such as a USB stick or other periphery component). As used herein, a verification token that is coupled to, or embedded within, a mobile device may be considered a component of the mobile device (even if the verification token could be physically separated from the mobile device). In some embodiments (e.g. where the verification token is an external component), a verification token that may be coupled to or embedded within a mobile device may utilize short-range communication (such as near-field communication including RFID or Bluetooth®) or a physical interface (such as through the use of a magnetic strip reader) to obtain information stored on a portable consumer device. As contemplated herein, this comprises the mobile device “interacting” with the portable consumer (albeit through a component that may be separately identified as the verification token).


As used herein, “identification information” may include any suitable information associated with an account (e.g. a payment account and/or portable consumer device associated with the account). Such information may be directly related to the account or may be derived from information related to the account. Examples of account information may include a PAN (primary account number or “account number”), user name, expiration date, CVV (card verification value), dCVV (dynamic card verification value), CVV2 (card verification value 2), CVC3 card verification values, etc. CVV2 is generally understood to be a static verification value associated with a portable payment device. CVV2 values are generally visible to a user (e.g., a consumer), whereas CVV and dCVV values are typically embedded in memory or authorization request messages and are not readily known to the user (although they are known to the issuer and payment processors).


As used herein, a “device verification value” may include any information related to the validation of a verification token, a user, a portable consumer device, and/or a mobile device used or associated with a financial transaction. For instance, a device verification value may be information that indicates whether a request sent from a mobile device (and/or a verification token associated with the mobile device) has been validated using any number of validity tests. Exemplary validity tests are described in detail in U.S. patent application Ser. No. 12/712,148 to Hammad entitled “Verification of Portable Consumer Devices,” which is hereby incorporated by reference in its entirety. In this manner, in some embodiments a “request for a device verification” value sent by a mobile device (and/or verification token within, or coupled to, the mobile device) may comprise a message that includes information such as “identification information” for a portable consumer device or user, as well as information associated with the mobile device (and/or verification token) such as a serial number, IP address, account number associated with the mobile device, SIM card information, etc. This information may be used by a validation entity to validate the request and return a device verification value. The device verification value may thereby comprise any information or data that is generated after a request for a verification value is validated (in some instances after a mobile device interacts with the portable device). For instance, the verification information could comprise any dynamic value (such as a dCVV2, dPAN, or other shared secret value) that is generated by a validation entity and sent to a mobile device (and/or verification token) that has interacted with an associated portable consumer device.


As used herein, “transaction information” may include any suitable information related to a financial transaction, such as those conducted with a merchant. This may include a transaction amount, a merchant identifier for the merchant associated with the transaction, and the volume of the transaction or accumulation of previous transactions (for instance, if there are many similar purchases, or many purchases within a short amount of time). It may also include the type of goods, the merchant location, and any other information that is related to the current transaction.


An “authorization request message” may be a message that includes an issuer account identifier. The issuer account identifier may be a payment card account identifier associated with a payment card. The authorization request message may request that an issuer of the payment card authorize a transaction. An authorization request message according to some embodiments may comply with ISO 8583, which is a standard for systems that exchange electronic transactions made by cardholders using payment cards. An authorization request message may comprise data elements including, in addition to the account identifier, a service code, a CVV (card verification value), and an expiration date. An authorization request message may also comprise some or all of the information associated with a transaction, such as the “account information” and/or the “transaction information,” as well as any other information that may be utilized in determining whether to authorize a transaction (e.g. a device verification value). An authorization request message may also comprise a device verification value (e.g. a dCVV2).


An “authorization response message” may be an issuing financial institution's electronic message reply to an authorization request, which may include one or more of the following status indicators: Approval—transaction was approved; Decline—transaction was not approved; or Call Center—response pending more information, merchant must call the toll-free authorization phone number. It may also include an authorization code, which may be a code that a credit card issuing bank returns in an electronic message to the merchant's POS equipment that indicates approval of the transaction. The code serves as proof of authorization. In some embodiments, a payment processor network may generate or forward the authorization response message to the merchant.


A “communications channel” may include any suitable path for communication between two or more entities. Suitable communications channels may be present directly between two entities such as a client computer and a gateway server, or may include a number of different entities. Any suitable communications protocols may be used for communications channels according to embodiments of the invention.


As used herein, a “server computer” is typically a powerful computer or cluster of computers. For example, the server computer can be a large mainframe, a minicomputer cluster, or a group of servers functioning as a unit. In one example, the server computer may be a database server coupled to a Web server.


Embodiments disclosed herein may provide for systems, methods, and/or apparatuses that may utilize, for example, a form fill and mobile device payment processing for a financial transaction. The system, apparatus, and methods may be implemented using one or more computer apparatuses, mobile devices, and/or databases. Although some of the description provided below may make reference to a mobile phone, embodiments are not so limited and may utilize the features and aspects described herein in any suitable system or mobile device. Similarly, although embodiments described below may reference a server computer, embodiments are not so limited and may utilize the aspects and features described herein in any suitable system or device.


As noted above, methods, systems, and apparatuses that provide for increased security for financial transactions, particularly in transactions where a payment device may not be presented to a merchant (e.g. purchases over the Internet, telephone, etc.), have been developed that may reduce the occurrence of fraud and may give additional assurances that valid transactions are in fact genuine (reducing the likelihood that a valid transaction may be rejected as suspicious). Although such transactions involving remote consumers and merchants are generally more susceptible to fraudulent activity due, in part, to the inherent uncertainties that may exist in such transactions (e.g. based on the anonymity that may exist), in-person transactions may also be susceptible to such fraudulent activity as well. However, most systems and methods that have been developed for such environments may rely on the security features contained within the payment device itself, which may be presented to the merchant in conducting the transaction. Thus, these methods and systems may not provide adequate protection in situations such as, for instance, when the payment device itself is stolen or copied by a nefarious party without the knowledge of consumer.


Thus, while the likelihood that fraudulent transactions may occur during in-person financial transactions may not be as high as in the remote entity circumstances, it is still a possible event and does in-fact occur on a routine basis. One factor that may further increase the chance of successfully conducting such fraudulent in-person transactions is that merchants do not typically inspect such portable consumer devices offered by a consumer as payment during these in-person purchases, which may be due to the fact that Merchants do not want to negatively impact the consumer's overall shopping experience by such inquiries (or the Merchants simply do not appreciate the risk of, and/or are not liable for, a fraudulent transaction). Therefore, it may be preferred that, in some embodiments, an exemplary approach to improve security may not overly burden either the Merchant or the consumer in conducting such transactions.


Although not limited to use only in completing in-person transactions, some embodiments provided herein may address some of the concerns noted above regarding such fraudulent activity related to in-person transactions.


With reference to FIG. 5, an exemplary method that may be performed by several exemplary components of a system 500 that may provide for increased security in conducting a financial transaction is shown for illustration purposes. As shown in FIG. 5, at step S501, a consumer may present a portable consumer device (e.g. a payment device such as a credit card, debit card, etc.) 32 to a mobile device 36. That is, for example, the consumer may swipe a portable consumer device 32 having a magnetic stripe using a periphery of the mobile device 36 (e.g. a physical interaction) or may use any suitable form of short range communications (e.g. near field communication, RFID, Bluetooth®, etc.). In this manner, identification information that may be stored on the portable consumer device 32 may be obtained (e.g. received) by the mobile device 36. This information may be retained (e.g. stored) in the mobile device 36 in a secured location, for instance by using either software or hardware components (e.g. a verification token).


At step S502, the mobile device 36 may establish communications with a payment processing network 26 so as to send a request for a device verification value (e.g. a dCVV2 value). The request may comprise some or all of the identification information that the mobile device 36 received from the portable consumer device 32. In some instances, the mobile device 36 may also send information related to the mobile device 36 or components thereof (e.g. part serial numbers, mobile account information, etc) and/or information about the consumer (e.g. a username or password). The payment processing network 26 may utilize some or all of the information that was included in the request for the device verification value to validate the mobile device 36, the consumer, and/or the portable consumer device 32. In this manner, embodiments may provide a method for increasing the certainty that a consumer is in possession of a valid and authentic portable consumer device 32.


If the request sent by the mobile device 36 is validated (which may involve passing one or more validation tests), then at step S503 the payment processing network 26 may send back to the mobile device 36 a device verification value (e.g. dCVV2 value). The payment processing network 26 may also store the device verification value for later comparison and validation during an authorization process, or may send this value to another entity that may perform such validation (e.g. a merchant, an issuer, etc.).


At step S504, the mobile device 36 may interact with an access device at a merchant (which may interface with the merchant computer 22) and thereby send (e.g. pass) the device verification value received in step S503 to the merchant computer 22. This interaction may be performed, for example, by short range wireless communications or through a physical interaction between the mobile device 36 and an access device coupled to the merchant computer 22 (e.g. via a POS terminal). This interaction may be performed, for instance, during a first transaction between the merchant and the consumer, where the consumer may choose to use the portable consumer device 32 to pay for the transaction. That is, for instance, the consumer could provide the portable consumer device 32 to the merchant and/or interact with an access device coupled to the merchant computer 22 using the portable consumer device 32 (e.g. a physical interaction or through short range communications). The consumer may then be prompted to provide a device verification value, at which point the mobile device 36 may interact with the an access device (which may be the same access device or a different access device) coupled to the merchant computer 22 to pass the device verification value received by the mobile device 36 in step S503. The merchant computer 22 may then generate an authorization request message that includes transaction related data, and may form fill the request using the device verification value received form the mobile device 36.


At step S505, the merchant computer 22 may initiate a typical authorization and clearance procedure with the payment processing network 26 using the information associated with the portable consumer device 32 and the device verification value received from the mobile device 36. Moreover, the device verification value that the merchant computer 22 included in the authorization request message may be compared to the device verification value stored by the payment processing network 26 in step S503. If the two values match, then the payment processing network 26 may have further assurance that the transaction is authentic.


In this manner, some embodiments may provide for increased security for financial transactions (particularly those conducted in a brick and mortar environment—e.g. in-person). Moreover, by utilizing processes such as passing values between components of the system using, e.g., short range communications, some embodiments provided herein may reduce the inconvenience of the process for both the merchant and the consumer, without necessarily compromising the security provided.


Although steps S502 and S503 were described above with reference to the payment processing network 26 as the validation entity, embodiments are not so limited. For instance, in some embodiments, a separate validation entity that may be located at the payment processing network 26, or at an entirely separate entity (that may be in communication with the payment processing network 26) may validate the request sent by the mobile device 36 and generate the device verification value. In addition, the communications between the mobile device 36 and the validation entity (shown as the payment processing network 26 in FIG. 5) may be performed through a secured communications channel (such as an encrypted SSL session). This may provide for increased security in the system, and may increase the difficulty for the device verification value to be intercepted and/or utilized by a nefarious party.


Although the exemplary method described above, and with particular reference to steps S501-S503, was described as including an interaction between a mobile device and a portable consumer device to generate a request for a device verification value that may include information from the portable consumer device that may then be used by a validation entity to validate the request, embodiments are not so limited. That is, for instance, the mobile device may receive the device verification value (which, as described above, may comprise a dCCV2 value) in any suitable manner and thereby need not based on the validation process as described above. That is, by way of example only, the consumer may register in advance with an issuer or payment processing network, and may send a request for a device verification value to either of these entities (e.g. by utilizing a username and password system, challenge—response system, etc). For instance, The consumer could enter his credentials and receive from the issuer or payment processing network the device verification value if the credentials are correct and/or validated. In some embodiments, the mobile device could be registered in advance, and thereby if the mobile device sends a request for a device verification value, the receiving entity (such as the issuer or the payment processing network) may return a device verification value for a portable consumer device associated with the mobile device. In some embodiments, an application (or other software or hardware module) may be installed on the mobile device and may be configured to function only with regard to the registered device, which may add security to the process. The above are just a few examples provided for illustration purposes; however, any suitable method of receiving a device verification value on a mobile device may be utilized.


Exemplary Embodiments

Described below are further exemplary embodiments of methods, systems, and apparatuses that may comprise form fill and mobile device payment processing. The embodiments described herein are for illustration purposes only and are not thereby intended to be limiting. After reading this disclosure, it may be apparent to a person of ordinary skill that various components and features as described below may be combined or omitted in certain embodiments, while still practicing the principles described herein.


In some embodiments, a first server computer may be provided. The first server computer may comprise a processor and a computer readable medium coupled to the processor. The computer readable medium may include code executable by the processor for implementing a method. The method may include the step of electronically receiving an authorization request message that includes a first device verification value from a merchant for a first transaction, where the first device verification value may have been received by the merchant from a mobile device based on an interaction between the mobile device and an access device. As was described above, the interaction between the mobile device and the access device may have comprised a short-range wireless communication or a physical interaction (such as a magnetic swipe, USB interface, etc.). The mobile device may have received the first device verification value based on a first request. The method may further include the step of determining by a data processor if the first device verification value corresponds to a stored device verification value.


As was noted above, the first request may be sent by the mobile device to any suitable entity, and may include any relevant information. For example, the first request may include information about a consumer (such as a username and password), information about the mobile device (such as SIM card information, application specific information, serial number, etc.), and/or information corresponding to a portable consumer device (e.g. account number, expiration date, etc.). In some embodiments, the first request may be initiated based on a request by a user (e.g. a user may initiate the first request) and/or may the request may be based on a interaction between a mobile device and a portable consumer device (e.g. the mobile device may automatically generate a request after such an interaction). However, in some embodiments, so long as the device verification value may be received by the mobile device, the form of the request, the information that it may contain, and/or the entity that the request is sent to may not affect the functioning of the method and system (or components therein).


In general, the term “based on interaction,” as used herein may include any suitable method of facilitating the transfer of information stored on one device to another (e.g. from the portable consumer device—such as a credit card—to the mobile device (or a component thereof) and/or from the mobile device to an access device—such as an access device).


For example, in some embodiments, the merchant may receive the stored device verification value from the mobile device based on an interaction between the mobile device and an access device. That is, for instance, in some embodiments after the first device verification value is received by the mobile device, the mobile device (which may, for instance, comprise a contactless interface or other short-range communication capability) may establish communications with the merchant through an access device (where an access device is described below). In this manner, embodiments may provide a secure way to send the device verification value to the merchant from the mobile device for use in an authentication request message. Moreover, in some embodiments where the mobile device comprises a secure component (e.g. hardware or software corresponding to a verification token), the interaction with the merchant's access device may be the most efficient manner of retrieving the device verification value from the mobile device, which also may prevent fraudulent activity such as, for instance, if a unscrupulous party were to acquire the device verification value (which may be the case if it is unsecured and/or presented to a user) and attempt to authenticate a transaction. However, embodiments are not so limited, and in some instances, the device verification value may be presented to a consumer (e.g. graphically), and the consumer may then pass that information to the merchant for inclusion in the authentication request.


The use of the term “stored” with regards to the “stored device verification value” does not necessarily mean that it is different than the “first” device verification value, but is simply used to differentiate the device verification value that is generated, received, and/or stored by the sever computer (or other validation entity) in an initial validation process (examples of which are described below), with the device verification value that is received by the server computer in the authorization request message. For example, when a transaction is valid, the stored device verification value may correspond to the first device verification value that was first received by the mobile device based on an interaction with the portable consumer device, and which was then sent from the mobile device to the merchant. That is, for instance, the server computer may retrieve the stored verification value and compare this to the received first verification value. If there is a correspondence (e.g. if the values match), the server computer has an additional indication that the transaction may be valid. If the values do not match, then this may indicate that there is an increased risk that the transaction is fraudulent.


In some embodiments, and as was discussed above, the interaction between the mobile device and the access device may comprise short-range communication. As used herein, “short range communication” or “short range wireless communication” may comprise any method of providing short-range communications capability, such as RFID, Bluetooth™, infra-red, or other data transfer capability that can be used to exchange data between a portable consumer device, an access device, and/or an emulation device. In some embodiments, short range communications may be in conformance with a standardized protocol or data transfer mechanism (e.g., ISO 14443/NFC). Short range communication typically comprises communications at a range of less than 5 meters. In some embodiments, it may be preferable to limit the range of short range communications (such as to a range of less than 1 meter, less than 10 centimeters, or less than 2.54 centimeters) for security, technical, and/or practical considerations. For instance, it may not be desirable for a POS terminal to communicate with every portable consumer device that is within a 10 meter radius because those two devices may not be involved in a transaction, or it may interfere with a current transaction involving different financial transaction devices.


In general, the use of short range communications may be preferred in some embodiments because it permits devices that otherwise may have no immediate manner to communicate (e.g. the devices may not have corresponding physical interfaces) to do so—and beneficially do not require physical contact, which may avoid damage. Moreover, this may provide for quick communication, with minimal effort on the part of the entities involved in the transaction. The use of short range communications may be used when the merchant and the consumer are in close geographic proximity, such as when the consumer is at the merchant's place of business. In some embodiments, the access device may include a point-of-sale terminal (POS).


The term “associated with a first transaction” may generally refer to when the portable consumer device is presented or selected by a consumer as a payment method for a transaction. For instance, the consumer may present the portable consumer device to the merchant, who may then utilize the card to complete the transaction (e.g. as a typical credit card transaction). In some embodiments, the information associated with the portable consumer device may be received and stored on the mobile device (e.g. based on the interaction that may initiate the request for the device verification value), such that only the mobile device may need to be presented to the merchant (e.g. a POS terminal) to complete the transaction. Such embodiments may be preferred in some instances, because, for example, the portable consumer device need only be interacted with once, and the relevant information corresponding to both the portable consumer device and the device verification value may be sent to the merchant via a single interaction.


In some embodiments, in the first server computer as described above, the method may further include the step of electronically receiving the first request for the first device verification value from the mobile device, where the first request comprises identification information for the portable consumer device. The method may further include the steps of performing by a data processor at least one validation test pertaining to the first request and electronically sending the first device verification value to the mobile device if the at least one validation test is passed.


For instance, in some embodiments, the user may present (e.g. move into close proximity or physically contact) the portable consumer device (e.g. a payment card) to a mobile device (e.g. a mobile phone). The mobile device may comprise a short-range communication interface (e.g. a contactless interface, Bluetooth®, etc.) or other suitable interface (such as a magnetic stripe reader), for which the portable consumer device may comprise a compatible interface. In this manner, the information stored on the payment device (which may include information hidden from a user so as to prevent its misappropriation) may be received and utilized by the mobile device in generating a request that may be sent to the server computer, such that the server may validate the consumer and/or a transaction associated with the portable consumer device. In this regard, and as detailed below, the mobile phone may have one or more secured components (which may, for example, comprise a verification token), such that the information obtained from the portable consumer device (e.g. payment card) not only remains secure, but that any entity that receives such information from the mobile device may have further assurance that the payment card was actually presented to the mobile device. For embodiments comprising a verification token, the verification token may also have stored thereon instructions for operations to perform the validation process, including, for example, the location of the server computer, the format of the request to generate, etc. In some embodiments, this may be stored in a non-secure application (or hardware) on the mobile device, or within the portable consumer device.


As noted above, the server computer (an example of which is described in detail with reference to FIG. 2) may receive a “request” from the mobile phone for a device verification value. The request may be in any suitable form, including an electronic message that comprises one or more packets of data. The request may be received by the server computer and may comprise any suitable information related to, for instance, the portable consumer device, the mobile device, the user, or even transaction information (to the extent that any may exist at the time). As described below, this information may be used to validate the request, and thereby provide additional assurances that the consumer (or the portable consumer device) is valid. Moreover, the request may be sent via a secured channel and/or over any suitable network, including the Internet or over a private network.


Thus, as was noted above, a device verification value (such as was described above), may provide information that may be subsequently used to authenticate the consumer, mobile device, and/or a financial transaction. That is, for instance, a consumer that possesses a valid device verification value (or for which a valid device verification value may be presented during the completion of a financial transaction that indicates that the consumer and/or mobile device has been validated) may provide additional assurances that the consumer is the rightful holder of the portable consumer device and the financial transaction is not fraudulent. Thus, prior to providing such information, the server computer may conduct one or more validation tests. Exemplary validation tests for use with a “verification token” are described, for example, in U.S. application Ser. No. 12,780,657 filed on May 14, 2010 to Hammad, the entire disclosure of which is hereby incorporated by reference. Many of the principles and validation tests described therein may be equally applicable to validation of the request sent from a mobile device as described herein (particularly if the device comprises a secured component corresponding to a verification token). For example, the request may include identification information that identifies the payment account associated with a portable consumer device as well as information that corresponds to the mobile device (e.g. serial number, wireless account information, SIM card information, etc.). In some embodiments, the server computer may comprise (or be in communication with) a database that associates the payment account information with a particular mobile device, and thus if such information is included by the mobile device in the request, the server computer may be more assured that this is a valid request because the consumer not only is in possession of the portable consumer device, but also a mobile device associated with the payment device.


Some embodiments of systems and methods that may utilize a server computer to validate a request received from a mobile device (e.g. based on an interaction with a portable consumer device) may be utilized, for instance, in a “brick and mortar” environment, rather than (or in addition to) in a remote transaction environment (e.g. e-commerce). For example, the mobile device may be used by the consumer in different locations (such as at different merchant locations), and may provide relatively quick validation and response to a request sent by the mobile device, with minimal effort on the part of both the merchant and the consumer. The device verification value received from the server may then be provided as part of a subsequent transaction (e.g. in an authentication request message), and may be used by an authorization entity to determine whether to approve a transaction, as described in detail herein.


In some embodiments, in the first server computer as described above, the method may further include the step of electronically storing the first device verification value by the server computer. That is, for instance, if the first request for a first device verification value is validated such that a device verification value is sent to the requesting mobile device, the server computer (e.g. the validation entity) may also store the first device verification value (or send the first device verification value to an entity or a database that may store the device verification value). The stored first device verification value may be later used in a comparison to determine if, in a subsequent transaction, the portable consumer device and/or the consumer is authentic. That is, for instance, the device verification value may function similar to a shared secret, and the server computer (or other validation or authentication entity) may use this shared secret value to authenticate a transaction involving the portable consumer device, as described above.


In some embodiments, in the first server computer as described above, the method may further include the steps of: generating an authorization response message based at least in part on the determination by the data processor as to whether the first device verification value is the same as the stored device verification value, and electronically sending the authorization response message to the merchant. That is, as noted above, the server computer (or other authorization entity) may compare the received device verification value with the stored device verification value (generated during the validation of the first request from the mobile device) as further criteria in determining whether to authorize a transaction comprising the portable consumer device. In some embodiments, if the first device verification value and the stored device verification value do not correspond (i.e. match), the transaction may be declined. In some embodiments, if the first device verification value and the stored device verification value do no correspond, then this may be considered as part of several other factors (such as the merchant identifier, volume of transactions, transaction histories, etc.) to determine a risk score associated with a transaction. An example of risk score determinations is provided in U.S. application Ser. No. 13/184,080 filed Jul. 15, 2011 to Hammad entitled “Token Validation for Advanced Authorization,” which is hereby incorporated by reference in its entirety.


In some embodiments, in the first server computer as described above the first request may further include information associated with the mobile device. In some embodiments, the step of validating the received first request may be based at least in part on the information associated with the mobile device. As was described above, the “information associated with the mobile device” may comprise any information that may be used to identify the mobile device (and/or an associated verification token), including, by way of example only, SIM card information, IP address information, hardware specific information, token serial number, phone number, wireless account number, etc.


In some embodiments, the mobile device may include a verification token. As was described above, a “verification token” may comprise a separate component coupled to the mobile device, or it may comprise a hardware or software module disposed within the mobile device. However, in general, a verification token may simply refer to a secured component of the mobile device that may, or may not, comprise instructions for initiating and/or completing a request a device verification value. In some embodiments, the mobile device may be anyone of: a mobile phone, a PDA, a tablet computer, a net book, a laptop computer, a personal music player, or a hand-held specialized reader.


In some embodiments, the first device verification value may include anyone of a: dynamic card verification value 2 (dCVV2), a dynamic primary account number (dPAN), and/or a shared secret value. As was described above, the device verification value may comprise any data that may be used by the mobile device and/or the server computer (or other authorization entity) to determine if a portable consumer device (or a mobile device or consumer associated with the portable consumer device) involved in a transaction was previously validated. In this regard, it may be preferred that the device verification value (regardless of characterization) remain a secret known only to the authentication entity and the mobile device, such that when the device verification value is subsequently received by the server computer, this may be an indication that the transaction is authentic.


In some embodiments, in the first server computer as described above, the method may further include the step of establishing a communications session with the mobile device. In some embodiments, the secured communication channel may be secured by one or more encryption keys. In some embodiments, the request for the device verification value may be received through the communications session. In some embodiments, the device verification value may be provided through the communications channel. That is, it may be preferred that the mobile device and the server computer communicate over a secure communications session (e.g. a secure channel) so that when the server computer sends the device verification value, another party may not be capable of intercepting that value and then using the device verification value to complete a transaction. The secured communication session may be established in any suitable manner. For instance, the sever computer could register the mobile device (and its IP address or related information) for a session. A session key may then be established upon mutual authentication to support the communications for that session between the mobile device and the host. The data exchanged between the token and the server computer (e.g. the backend host) may be encrypted and tunneled through an SSL session. The session could stay alive or be terminated or restarted at any time.


In some embodiments, a first method may be provided. The first method may be performed, in whole or in part, by one or more computers (e.g. server computers) and/or one or more software/hardware components within a computer. The first method may include the steps of electronically receiving an authorization request message comprising a first device verification value from a merchant for a first transaction and determining by a data processor if the first device verification value corresponds to a stored device verification value. In some embodiments, the first device verification value may have been received by the merchant from a mobile device based on an interaction between the mobile device and an access device, where the interaction between the mobile device and the access device may comprise, by way of example, short-range wireless communication or a physical interaction. The mobile device may have received the first verification value based on a first request. In some embodiments, the first request was based on an interaction between the mobile device and a portable consumer device. In some embodiments, the first request was based on information provided by a consumer (where the information may have been entered in advance of the generation of the first request—e.g. it may have been stored on the mobile device—or the information may have been entered concurrently with the generation of the first request—e.g. entering in a username and password, challenge response, etc.).


As was described above, the device verification value may be stored (e.g. by an authentication entity) and used as an indication as to whether a mobile device and/or portable consumer device used as part of a transaction with a merchant is authentic. Moreover, the authorization request may be initiated by, for instance, an interaction between a consumer's mobile device (which may have stored thereon the first device verification value) and a merchant's access device. This may be an efficient manner of sending a previously received device verification value from the mobile device to the merchant to authorize a transaction (i.e. to include the device verification value in an authorization request).


In some embodiments, the first method as described may further include the steps of electronically receiving the first request for the first device verification value from the mobile device, where the first request may comprise identification information for the portable consumer device. The first method may further include the steps of performing by a data processor at least one validation test pertaining to the first request, electronically sending the first device verification value to the mobile device if the at least one validation test is passed, and electronically storing the first device verification value. As noted above, a mobile device may establish communications with a validation entity (such as a server computer or IP gateway), and may then request a device verification value from such an entity. The validation entity may use any information received from the mobile device along with, for instance, previous data stored about the portable consumer device and/or mobile device such as: black lists (devices associated with fraudulent activity), white lists (devices not associated with fraudulent activity), associations between portable devices and mobile devices (e.g. registration of information), etc. so as to validate the request. Although not limited thereto, the use of a mobile device may provide for embodiments that may make “brick and mortar” transactions (e.g. where the consumer may be located at the merchant location) more secure, while not substantially increasing the burden on either party.


In some embodiments, the first method as described above may further include the steps of generating an authorization response message based at least in part on the determination by the data processor as to whether the first device verification value corresponds to the stored device verification value and electronically sending the authorization response message to the merchant. In some embodiments, in the first method as described above, the first request may include information associated with the mobile device; and the at least one validation test pertaining to the first request may be based at least in part on the information associated with the mobile device.


In some embodiments, a mobile device may be provided. The mobile device may comprise a processor, and a computer readable medium coupled to the processor that may include code executable by the processor for implementing a method. The method may include the steps of electronically sending a first request for a first device verification value to a server computer, electronically receiving from the server computer the first device verification value The use of a mobile device in some embodiments may provide for increased mobility and flexibility, and may also provide for validation of a portable consumer device “on the fly” while, for instance, a consumer is located at a merchant. In some embodiments, the method may further include the steps of receiving identification information stored on a portable consumer device based on an interaction between the portable consumer device and the mobile device. In some embodiments, the first request may include at least some of the identification information stored on the portable consumer device. In some embodiments, the device verification value is received from the server computer only if the first request is validated. In some embodiment, the validation of the first request may be based at least in part on the identification information.


Moreover, utilizing a mobile device may permit increased security during traditional transactions that otherwise may rely almost entirely on the security features corresponding to the portable consumer device itself. For example, a mobile device may be linked to a wireless phone account or mobile phone serial number (e.g. in a database). The mobile device may send this information along with the request for the first device verification value to a validation entity (e.g. server computer and/or a gateway computer). The server computer (e.g. validation entity) may receive this information and determine if the received information matches any records stored therein. If it does not, then the mobile device may not receive the device verification value from the server computer. Thus, if for example a nefarious party steals a consumer's credit card, and then attempts to receive a dynamic verification value for the credit card to be used in a transaction, even though the nefarious party is in physical possession of the credit card (which previously may have been sufficient to complete the fraudulent transaction), he may not receive the device verification value and thereby such a transaction may be later denied. This example is provided for illustration purposes only, and as was noted above, there may be any number of suitable ways that may be used to validate the first request.


In some embodiments, in the mobile device as described above, the method may further include the step of: electronically sending the first device verification value to a merchant associated with a first transaction based on an interaction between the mobile device and an access device. In some embodiments, the interaction between the mobile device and the access device may include short-range communication. In some embodiments, the access device may be located at the merchant associated with the first transaction. As was noted above, embodiments may be utilized by consumers when located at a merchant, and thereby once the device verification value is received, the inventors have found that a relatively efficient and secure way of passing this information between the mobile device and the merchant may be to use a short-range communication interface (particularly in embodiments where the device verification value is stored in a secure hardware or software component of the mobile device). For example, mobile devices (such as mobile phones) may be constructed with short-range communications capability, and thereby provide increase functionality and security without an increased burden on the consumer.


In some embodiments, in the mobile device as described above that includes a processor and a computer readable medium comprising code that may be executable by the processor for performing of the above methods, the first device verification value sent to the merchant by the mobile phone may be included by the merchant in an authorization request message that may be sent to a payment processing network. By including the device verification value in the authentication request, in some embodiments, the authorization entity (which may be located at a payment processing network) may receive the device verification value and may compare this value to a stored value that corresponds to the device verification value previously sent to the mobile device thereby increasing the security of such transactions.


In some embodiments, in the mobile device as described may include a verification token. As noted above, the verification token of a mobile device may refer to a secure hardware of software component of the mobile device. In some embodiments, the verification token may be an external component that may be coupled/decoupled to the mobile device. The verification token, in some embodiments, may include its own short-range communications interface. It may be preferred in some embodiments to utilize a verification token that is a separate component from the mobile device that may be coupled and decoupled to a mobile device such that a consumer could use the verification token with multiple mobile devices or fixed devices (i.e. it would not require the consumer to purchase multiple verification tokens). Moreover, this may facilitate, in some embodiments, the linking of a portable consumer device with a particular hardware component, and thereby provide more security. For example, if the portable consumer device is used with a verification token or mobile device that is not the verification token that it is usually associated with, it may be likely that the transaction is fraudulent).


In some embodiments, in the mobile device as described above that includes a processor and a computer readable medium comprising code that may be executable by the processor for performing the methods described above, the method may further include the step of: sending to the server computer at least one of: a token serial number, a phone number, an IP address, a mobile phone serial number, a wireless account number, a SIM card information. This information that may be associated with the mobile device (and/or a verification token comprised within the mobile device) may be utilized in some embodiments by a validation entity so as to validate the request for the device verification value. For instance, the information associated with the mobile device may be stored at the server computer and associated with a portable consumer device prior to the receipt of a request from a mobile device. In some embodiments, the information (which may be unique to a mobile device) may be included on a white list or a black list (e.g. of known fraudulent entities). However, as described above, this information may be used in any suitable manner to validate the request and confirm the authenticity of the portable consumer device, the consumer, and the mobile device.


In some embodiments, in the mobile device as described above that includes a processor and a computer readable medium comprising code that may be executable by the processor for performing the methods described above, the method may further include the steps of storing the first device verification value, and electronically sending the first device verification value to a merchant associated with a second transaction based on an interaction between the mobile device and an access device. That is, for instance, in some embodiments, a single device verification value may be used to authenticate multiple transactions. This may reduce the number of operations that the payment processing system (or other validation entity) needs to perform. For example, there could be a fixed number of transactions for which a device verification value may be used for prior to a new verification needing to be generated, or the device verification value may be valid for a fixed period of time. Embodiments may thereby provide for increased security associated with the use of a device verification value, but reduce inconvenience to the consumer and/or data traffic on a network.


In some embodiments, a first method may be provided. The first method may be performed, in whole or in part, by one or more computers (e.g. server computers and/or mobile devices) and/or one or more software/hardware components within a computer. The first method may include the steps of: electronically sending, by a mobile device, a first request for a first device verification value to a server computer and electronically receiving, at the mobile device, the first device verification value from the server computer.


In some embodiments, the first method as described above includes the step of receiving, at the mobile device, identification information stored on a portable consumer device based on an interaction between the portable consumer device and the mobile device. In some embodiments, the first request as described above may include at least some of the identification information stored on the portable consumer device. In some embodiments, the device verification value is revived if the first request is validated based at least in part on the identification information.


In some embodiments, the first method as described may further include the steps of initiating a first transaction with a first merchant, interacting with an access device for the merchant associated with the first transaction using the mobile device, and electronically sending, via the mobile device, the first device verification value to the merchant associated with the first transaction based on the interaction between the mobile device and an access device. In some embodiments, the method may further include the steps of initiating a first transaction with the first merchant, and interacting with the access device for the merchant associated with the first transaction using the mobile device. In some embodiments, the interaction with the access device may comprise short-range wireless communications and/or a physical interaction. In some embodiments, the first merchant may include the first device verification value in an authorization request message associated with the first transaction.


In some embodiments, in the first method as described above, the first method may further include the step of presenting the portable consumer device to the first merchant to pay for the first transaction. In some embodiments, the first method may include presenting the mobile device to the first merchant to pay for the first transaction.


In some embodiments, another method may be provided that comprises the steps of electronically sending by a mobile device a first request for first information to a server computer, wherein the first request is generated based on an interaction between the mobile device and a portable consumer device; electronically receiving at the mobile device the first information from the server computer; and electronically sending by the mobile device the first information to a merchant associated with a first transaction based on an interaction between the mobile device and an access device located at the merchant.


As used in this connect, the “first information” may refer to any information that may be used by the consumer, merchant, and/or the mobile device to for use in completing or authenticating the transaction. Some examples of first information could include a verification value, a dynamic verification value, an account number, an account balance, an authorization message, an IP address, a session key, an account identifier, an expiration date, previous transaction information, or any other relevant category of data. The information may be used by the merchant and/or payment processing network in any suitable manner. For example, when the first information comprises a verification value, the merchant computer may include this information in an authorization request message to complete the first transaction (e.g. for the payment processing network to verify that the transaction is authenticated). When the first information comprises an account balance, the merchant computer may use this information to determine whether the consumer has sufficient funds to complete the transaction or if an alternative payment method may be required. When the first information comprises an account number, the merchant computer may use the account number to identify an appropriate payment method to be used to complete the transaction (which may also be used by the payment processing network when authorizing the transaction). When the information comprises an IP address, the merchant computer may contact a server computer or router at the IP address and send or receive relevant information based on this connection (such as when the IP address corresponds to an IP Gateway computer that may authorize or validate transactions). It should be appreciated that these are just a few examples of the types of information that may be provided to the mobile device (and potential uses of that information).


An example of a process that includes the method as described above is provided below for illustration purposes. A consumer may use his mobile device (e.g. a mobile phone) to interact with a portable consumer device (e.g. a payment card such as a credit card, debit card, etc.) via a contactless interface (e.g. near filed communication) or a physical interface (e.g. swipe). The mobile device may then generate a request for information based on this interaction, which is then sent to a server computer (e.g. at a payment processing network). The request may, but need not, include information received from the portable consumer device such as an account number, a security code, expiration data, consumer name, account number, etc. Some or all of this information could also be stored on the mobile device (such as in a mobile application) rather than being received from the portable consumer device. The request from the mobile device may be sent by any suitable communication channel to the server computer, such as via a wireless network, data network, or wireless LAN network. The server computer may receive the request from the mobile device and provide the first information to the mobile device via the same channel or a different communication channel.


After receiving the first information from the server computer, the mobile device may then interact with an access device located at a merchant. This interaction could comprise a physical interaction, but preferably comprises a short range wireless communication (such as near filed communication, IR, Bluetooth®, etc). The first information may then be sent by (i.e. passed from) the mobile phone to the access device based on this interaction (and preferably though the same communication channel as the interaction). In this manner, the first information that was sent to the mobile device from the server computer based on an interaction between the mobile device and the portable consumer device may then be sent (i.e. passed) to the merchant. The merchant may then include the first information in an authentication request message, or may otherwise use the information to complete the transaction (such as by using the first information to approve the first transaction, identify a location or entity to send an authorization request to, or to authenticate the consumer or the first transaction).


In some instances, to complete the first transaction, the consumer may, but need not, present the portable consumer device to the merchant (either before or after the first information is sent to the merchant by the mobile device). That is, for example, the consumer may still present the portable consumer device to the merchant to pay for the first transaction, and the first information may then be used as further verification of the authenticity of the transaction (or for any other suitable purpose). However, in some embodiments, the consumer need only present the mobile device to the merchant to complete the transaction (i.e. to provide sufficient information to pay for the transaction). The first information (which is sent from the mobile device to merchant) could thereby be sufficient to complete the first transaction, or could be used to supplement payment information stored on the mobile device.


In some embodiments, the server computer could perform one or more validation tests on the first request that is sent by the mobile device, but this is not required. For instance, the mobile device may have a secured application or hardware component that insures that the request is authenticated and therefore the server computer need not perform additional validations tests on the request. The server computer may also store the first information that is sent to the mobile device for later authentication of the first transaction (e.g. to approve an authentication request received by the merchant regarding a first transaction involving the portable consumer device).


I. Exemplary Systems

A system according to an embodiment of the invention is shown in FIG. 1. The system 20 may include a plurality of merchants, access devices, portable devices, acquirers, and issuers. For example, the system 20 may include a merchant computer 22 associated with a merchant, an acquirer computer 24 associated with an acquirer, and an issuer computer 28 associated with an issuer. A payment processing network 26 may be disposed between the acquirer computer 24 and the issuer computer 28. Further, the merchant computer 22, the acquirer computer 24, the payment processing network 26, and the issuer computer 28 may all be in operative communication with each other. The merchant computer 22 may be coupled to an access device (such that information may be received by the access device and communicated to the merchant computer) or, in some embodiments, the access device may comprise a component of the merchant computer 22.


A mobile device 36 may communicate with the merchant computer 22 via short-range communications 72 (such as, for instance, a contactless interface) with an access device. A verification token 34 may be associated with the mobile device 36 that is used by a user 30. The verification token 34 may enable the mobile device 36 to form a first secure communications channel 38 (an example of a first channel) to an Internet Protocol Gateway (IPG) 27, which may be in operative communication with the payment processing network 26. Although the IPG 27 is shown as being a separate entity in FIG. 1, the IPG 27 could be incorporated into the payment processing network 26, or could be omitted. In the latter situation, the first secure communications channel 38 could directly connect the payment processing network 26 and the mobile device 36. In addition, the verification token 34 is shown as connected with to the portable consumer device 32 and mobile device 36 by dotted lines in FIG. 1 so as to indicate that some embodiments may not include a verification token 34 and/or the verification token 34 may be included within the mobile device 36.


The mobile device 36 may be in any suitable form, such as those described above. In some embodiments, the mobile device 36 may comprise a processor, and a computer readable medium coupled to the processor. The computer readable medium may comprise code, executable by the processor, for implementing a method comprising: receiving identification information from a portable consumer device 32 that interacts with the mobile device 36 (and/or verification token 34), wherein the portable consumer device 32 may comprise, for example, a chip storing the account information; establishing a secure communications channel with a remote server computer (e.g. IPG 27 and/or payment processing network 26); and sending the account information associated with the portable consumer device 32 (along with information associated with the mobile device 36) to the server computer as part of a request for a device verification value, where the server computer thereafter may validate the request for a device verification value (and/or may validate the mobile device 36, verification token 34, and/or portable consumer device 32). In some embodiments, some or all of the steps described above may also be performed by the verification token 34, which as noted above may be incorporated into, or coupled to, the mobile device 36 (and thereby as used herein, may be considered as a part of the mobile device 36). The mobile device 36 may also be programmed or configured to interact with an access device coupled to a merchant computer 22, and thereby send the received device verification value to the merchant computer 22 via the access device.


The payment processing network 26 may reside between the acquirer computer 24 and an issuer computer 28. The path that includes the merchant computer 22, the acquirer computer 24, and the payment processing network 26, may form at least part of a second communications channel.


As used herein, an “issuer” is typically a business entity (e.g., a bank) that maintains financial accounts for the user 30 and often issues a portable consumer device 32 such as a credit or debit card to the user 30. A “merchant” is typically an entity that engages in transactions and can sell goods or services. An “acquirer” is typically a business entity (e.g., a commercial bank) that has a business relationship with a particular merchant or other entity. Some entities can perform both issuer and acquirer functions. Some embodiments may encompass such single entity issuer-acquirers.


The portable consumer device 32 may be in any suitable form. In some embodiments, portable consumer devices are transportable by nature. As was noted above, suitable portable devices can be hand-held and compact so that they can fit into a consumer's wallet and/or pocket (e.g., pocket-sized). They may include smart cards, keychain devices (such as the Speedpass™ commercially available from Exxon-Mobil Corp.), etc. Other examples of portable devices include cellular phones, personal digital assistants (PDAs), pagers, payment cards, security cards, access cards, smart media, transponders, and the like. The portable devices can also be debit devices (e.g., a debit card), credit devices (e.g., a credit card), or stored value devices (e.g., a stored value card).


The payment processing network 26 may include data processing subsystems, networks, and operations used to support and deliver authorization services, exception file services, and clearing and settlement services. For example, the payment processing network 26 may comprise a server computer, coupled to a network interface, and a database of information. An exemplary payment processing network may include VisaNet™. Payment processing networks such as VisaNet™ are able to process credit card transactions, debit card transactions, and other types of commercial transactions. VisaNet™, in particular, includes a VIP system (Visa Integrated Payments system) which processes authorization requests and a Base II system which performs clearing and settlement services. The payment processing network 26 may use any suitable wired or wireless network, including the Internet.


Although many of the data processing functions and features of some embodiments may be present in the payment processing network 26 (and a server computer therein), it should be understood that such functions and features could be present in other components such as the issuer computer 28, and need not be present in the payment processing network 26, or server computer therein.


With reference to FIG. 2, an exemplary server computer 230 in payment processing network 26 is shown. It should be noted that for illustration purposes, many components related to various functionality were included in the exemplary server computer 230 in payment processing network 26. However, in some embodiments, one or more of these functions may be located at a different entity within the system 20, and/or one or more components may be disposed within one or more computers and/or database.



FIG. 2 provides a more detailed illustration of an exemplary embodiment of a system for implementing some of the functionality for validating a request for a device verification value and/or authorizing a transaction associated with the request for the device verification value. Specifically, an exemplary server computer 230 that may perform functions in accordance with aspects described above is provided. This exemplary server computer 230 may, for example through the use of software instructions and/or hardware configurations, perform some of the relevant functions and steps described at least with reference to FIGS. 3 and 5. It should be noted that although FIG. 2 illustrates all of the modules located on a single device, the disclosure is not meant to be so limited. A system for implementing functionality related to, for example, validating a request for a device verification value received from a mobile device (and/or authorizing a financial transaction associated with the device verification value) may have additional components or less then all of these components. Additionally, some modules could be located on other devices such as a remote server or other local devices that are functionally connected to the server computer component(s).


The communication module 201 may be configured or programmed to receive and transmit information through the network to any of the entities shown in FIG. 1. The received information may comprise, for instance, identification information, mobile device information (and/or verification token information, etc.) and/or any other information that the payment processing network 26 may utilize in determining whether a request for a device verification value is valid. In some embodiments, the received information may also comprise whether an authorization entity (e.g. an issuer or merchant) approved or declined a transaction involving a mobile device 36 and/or portable consumer device 32. The communication module 201 may transmit any received information to an appropriate module, including the identification information module 202, mobile device/token information module 203, validation module 204, device verification value generation module 205, update module 206, authorization module 207, and/or risk score generation module 208.


The communication module 201 may also be configured or programmed to receive from the authorization module 207 and/or the risk score generation module 208 an authorization response message or a risk score associated with a transaction, respectively, and to transmit the authorization response message or the risk score to an appropriate entity. In some embodiments, the received and transmitted information may be in the form of an authorization request message or authorization response message. In some embodiments, the communication module 201 may also request information that may be stored at the payment processing network 26 and/or an issuer computer 28. Such information may comprise, for instance, information associated with an account, a portable consumer device 32, or a mobile device 36 (and/or verification token 34) used in the transaction (such as PANs, CVVs, past transaction information, etc). This information may then be utilized by the authorization module 207 and or risk score generation module 208 in determining whether to authorize a transaction and/or generate the risk score associated with the transaction.


The identification information module 202 may be programmed or configured to perform some or all of the functions associated with utilizing the identification information received in a request for a device verification value. For instance, the identification information module 202 may be programmed or configured to identify the identification information in the request and to send this information to the validation module 204. The identification information module 202 may also send data related to the identification information to the update module 206, which may then update the validation database 210 with this information. In some embodiments, the identification information module 202 may also receive from the validation database 210 additional information associated with the received identification information, including, for instance, whether such information has been associated with fraudulent transactions in the past. The identification information module 202 may then send this information to the validation module 204 for use in validating the request.


The mobile device/token information module 203 may be programmed or configured to perform some or all of the functions associated with utilizing the mobile device (and/or verification token) information received in a request for a device verification value. For instance, the mobile device/token information module 203 may be programmed or configured to identify the mobile device (and/or token) information in the request (which may include, for instance, serial numbers, mobile account information, etc.) and to send this information to the validation module 204. The mobile device/token information module 203 may also send data related to the mobile device (and/or verification token) to the update module 206, which may then update the validation database 210 with this information. In some embodiments, the mobile device/token information module 203 may also receive from the validation database 210 additional information associated with the received mobile device information, including, for instance, whether such information has been associated with fraudulent transactions in the past. The mobile device/token information module 203 may then send this information to the validation module 204 for use in validating the request.


The validation module 204 may be configured or programmed to perform some or all the functions associated with utilizing the received identification information and/or mobile device information to validate the request for a dynamic verification value. This may include receiving appropriate information from the communication module 201, identification information module 202, and mobile device/token information module 203 and performing one or more validation tests using this information. Exemplary validation tests and methods for validating a request for a device verification value, as noted above, are described in detail in U.S. patent application Ser. No. 12/780,657 to Hammad entitled “Verification of Portable Consumer Devices,” which is hereby incorporated by reference in its entirety. In this regard, the validation module 204 may also communicate with one or more databases (including validation database 210) to retrieve information stored therein to perform any of the validation tests, as required. For example, information about previous fraudulent activity that may be associated with a mobile device 36 or a portable consumer device 32 may be used in determining whether to validate the received request for a device verification value. In some embodiments, this information may be received from the identification information 202 and/or mobile device/token information 203 modules.


In addition, the validation module 204 may also utilize the received identification information and mobile device information in a comparison with similar information stored in validation database 210. That is, for instance, in some embodiments, a consumer may register a portable consumer device 32 with a mobile device 36 in advance (e.g. the mobile device 36 may be associated with a portable consumer device 32 or a payment account), such that when the two devices are used together, the validation entity (in this exemplary embodiment, the payment processing network 26) may have further assurance that the request is valid. However, embodiments are not so limited, and any suitable validation test may be used.


The device verification value generation module 205 may be configured or programmed to perform some or all the functions associated with generating a device verification value, provided that the received request is validated by the validation module 204. For example, the device verification value generation module 205 may be programmed or configured to receive an indication from the validation module 204 that the request has been validated, and may then use any suitable process for generating a variable datum or other data that may be used as a device verification value (e.g. a dCVV2 value). The device verification value generation module 205 may also send the device verification value to the communications module 201 to be included in a response message to the mobile device 36. Moreover, the device verification value generation module 205 may also provide the device verification value to a database (e.g. located at payment processing network 26 or at another entity) to be stored for later comparison with a received authorization request message and/or may send the generated device verification value to the communications module 201, which may then send this value to another authorization entity (e.g. a merchant or an issuer).


The update module 206 may be programmed of configured to maintain and update the authorization databases 215. In this regard, the update module 206 may receive information about a past transaction or request for a device verification value from some or all of the other modules discussed herein. Moreover, the update module 206 may receive information from other sources, such as directly from the payment processing network 26 and/or the IP Gateway 27 (such as, for example, a generated device verification value for a mobile device 36 (and/or a verification token 34) and/or a portable consumer device 32). By maintaining information about past transactions and verification requests, it may be possible in some embodiments to more accurately validate future requests for verification, authorization, and/or to generate risk scores for future transactions.


The authorization module 207 may be configured or programmed to perform some or all the functions associated with authorizing a financial transaction associated with an authorization request message. The authorization request message may be generated by a merchant and may be associated with a transaction involving the portable consumer device 32. The authorization request message may include a device verification value that may have been form filled or otherwise inserted into the authorization request message by the merchant in response to an interaction with the mobile device 36 (e.g. via an access device at the merchant). The authorization module 207 may be programmed or configured to compare the received device verification value with a stored device verification value that was generated and stored by the device verification value generation module 205. In some embodiments, if the two values match, the authorization module 207 may have further assurance that the transaction is valid and may generate an authorization response message authorizing the transaction (or may be more likely to authorize the transaction). The authorization module 207 may also be programmed or configured to execute any further operations associated with a typical authorization and clearing process. This may include retrieving information from one or more databases, including account/transaction information database 220.


In some embodiments, some of the functions described above with regard to the authorization module 207 may be located at one or more of the other entities in the system 20. For instance, in some embodiments, the merchant may request from the payment processing network 26 (or the validation entity) the value of the stored device verification value. The merchant computer 22 may then compare the device verification value received from the mobile device 36 (e.g. via an interaction with an access device) with the device verification value received from the validation entity. Based at least in part on this comparison, the merchant computer (or other entity such as an issuer) may approve or decline the transaction.


The risk score generation module 208 may be configured or programmed to perform some or all the functions associated with generating a risk score associated with a financial transaction that may be used by the payment processing network 26 (e.g. by the authorization module 207) or any other authorization entity in the system 20 to authorize a transaction. Some exemplary processes that may utilize a device verification value (e.g. a dCVV2 value) or other information in generating a risk score are described in detail in U.S. patent application Ser. No. 13/184,080 to Hammad entitled “Token Validation for Advanced Authorization,” which is hereby incorporated by reference in its entirety.


The validation database 210 may comprise information received and stored about a mobile device 36 (e.g. verification token information, serial numbers, mobile account information, etc), portable consumer device 32 (or payment account), associations between mobile devices 36 and portable consumer devices 32 (e.g. advanced registration or past transactions), validation of a request for a device verification value (or failure), and any other suitable information that may be used to validate a request. Such information may include, for instance, mobile device 36 (and/or verification token) serial numbers that have been identified as fraudulent or have been used successfully in previous transactions (that is, transactions that were approved by an appropriate authority and/or were not later found to be fraudulent), IP addresses or mobile account information associated with a mobile device 36 known to be fraudulent (or not fraudulent), etc. The validation database 210 may also comprise generated dynamic verification values from previously validated requests for verification values. This information may be used by the validation module 204 to validate the mobile device 36 and/or portable consumer device 32.


The account/transaction information database 220 may be programmed or configured to comprise information associated with payment accounts and past transactions. The information may be used to authorize a transaction and/or generate a risk score for a current transaction. Such information may include previous transaction information (such as volume, amount, merchant identifiers, etc.) as well as information as to whether the account has been used in fraudulent transactions in the past (e.g. a listing of account numbers used in prior fraudulent transactions, IP addresses used, etc.).


Reference will now be made to FIGS. 6 and 8(a) for a description of some of the components of an exemplary mobile device 36 and/or an exemplary verification token 34 (as a module and as a separate component). In some embodiments where the verification token 34 may comprise a separate component to the mobile device 36, the user 30 may connect the verification token 34 to an input of his mobile device 36. The mobile device 36 can power the verification token 34 in some embodiments. Once the verification token 34 is connected to the mobile device 36, the mobile device 36 may recognize the presence of the verification token 34 as a valid device, and the verification token 34 may self-install. The verification token 34 may check the mobile device 36 to determine connectivity to a network (e.g. via the Internet or mobile network, etc.).


In some embodiments, a verification token 34 may be part of the mobile device 36 (e.g. it may be a software module or an internal hardware and/or software module). This is illustrated in the exemplary embodiment shown in FIG. 8, where verification token 34 is illustrated as a module within the mobile device 36. Indeed, this may be preferred in some embodiments because the verification token 34 (or the functionality associated with the verification token 34) could be remotely downloaded to the mobile device 36 or preinstalled in the device. The component of the mobile device 36 that comprises the verification token 34 may utilize some of the other features shown with respect to the mobile device 36 in FIG. 8 (e.g. contactless element 36(g), microprocessor 36(c), antenna 36(a), etc.) as needed, or may comprise its own separate components. As described above, a verification token 32 (whether an internal, integrated component or external, separable component) may be considered a part of the mobile device 36. In some embodiments, the mobile device may not comprise a secured element such as verification token 34, but may provide similar functionality in performing the methods described below and with reference to FIGS. 3 and 4. Note that the remaining components that may comprise an exemplary mobile device 36 will be described in more detail below with further reference to FIG. 8.


If network connectivity is available (e.g. the Internet, a mobile network, etc.), in some embodiments the verification token 34 may automatically attempt to establish a background SSL session to the IPG 27 (or payment processing network 26) so that it can be used as a part of a validation process. In some embodiments, the session may not be established until a user 30 requests a connection to be established.



FIG. 6 shows some components that may be present in a verification token 34 within, or coupled to, a mobile device 36 in some embodiments. For example, the verification token 34 may include an application, such as the self-installing driver 650, so that the verification token 34 may install itself automatically after the verification token 34 is inserted into and recognized by the mobile device 36 (e.g. when the verification token 34 may comprise an external component). The verification token application may be able to connect to a backend host, perhaps at a predefined IP address, using a background secure SSL browser session. A terminal application 670 and heartbeat application 680 may be used to establish and maintain this browser session. If the session connection is successfully established, the verification token 34 may identify itself (and/or the mobile device 36) to the IPG 27 by providing its unique token serial number, IP address, mobile device account number, mobile device serial number, etc. to the IPG 27. Other information may also be passed (e.g., password, encryption keys, etc.) to the IPG 27 at this point.


The exemplary embodiment of the verification token 34 illustrated in FIG. 6 may comprise a separate component that may connect to the mobile device 36 using connectivity module 630. The verification token 34 (whether internal to the mobile device or coupled thereto) may also comprise a secure element 620 (e.g., a chip such as a smart card chip, which has sufficient data and security protocols and hardware), a wireless/contactless reader 610 capable of reading identification information from a portable consumer device (or a module for using a contactless interface of the mobile device 36), built in memory 640, a self-installing driver 650, a form fill application 660, a terminal application 670, and a heartbeat application 680. The verification token 34 may also have other features such as a keyboard buffer capability and a unique serial number associated with the verification token 34. However, embodiments are not so limited.


Although FIG. 6 includes features and components of a verification token 34 that may be related to embodiments where the verification token 34 is an external component that is coupled to the mobile device 36, as noted above, this exemplary embodiment was provided for illustration purposes only. The verification token 34 may comprise many other suitable forms. For example, as described above, the verification token 34 may comprise hardware (or software) or other module installed in the mobile device 36.


II. Exemplary Methods

Methods according to some embodiments are described below with reference to FIGS. 3 and 4, and with further reference to the system elements in FIGS. 1 and 2. The methods described below are exemplary in nature, and are not intended to be limiting. Methods in accordance with some embodiments described herein may include (or omit) some or all of the steps described below, and may include steps in a different order than described herein.


Referring to FIGS. 1 and 3, prior to establishing the first communication channel 38, in some embodiments, a user 30 may receive hardware and/or software (which may include, for example, a verification token 34) for his mobile device 36 from his or her financial institution or another entity. As described above, this hardware and/or software may comprise an internal component of the mobile device 36 or may comprise an external component that is coupled to the mobile device 36 (e.g. either physically or operatively coupled through a communication mechanism such as short range communication interface). The hardware and/or software may also be secured (e.g. tamper proof) such as when comprising a verification token 34.


Reference will now be made to the exemplary method shown in FIGS. 3(a) and 3(b). Again, this is an exemplary embodiment that is described for illustration purposes only.


At step S300, a user 30 conducting a transaction may generate a request for a dynamic verification value (e.g. dCVV2 or similar information that may be used to validate a transaction) from the payment processing network 26. The request may be made via a portable consumer device 32 (such as a credit card or Visa payWave card) interacting with a mobile device 36 (e.g., that may comprise a verification token 34). In some embodiments, the portable consumer device 32 may include a chip comprising chip-card type data such as a dynamic counter, dynamic verification value, PAN, cryptogram, etc. As noted above, the mobile device 36 may also include a contactless interface to receive data from the chip in the portable consumer device 32. In other embodiments, the portable consumer device 32 may interact with the mobile device 36 using a contact mode of operation. For example, the mobile device 36 may have a magnetic card reader, and the portable consumer device 32 may be a payment card with a magnetic stripe, which can be read by the card reader. However, as described above, embodiments are not so limited and the request for the dynamic verification value may be generated by the mobile device using any suitable information (which may or may not include portable consumer device information) and may be generated or initiated at any suitable time (e.g. a consumer could initiate the request using a preregistered username and password, etc.).


In some embodiments, prior to sending the request, the user 30 may set up an account with the payment processing network 26. That is, for instance, a user 30 may establish an association between a mobile device 36 (and/or verification token 34) and a portable consumer device 32 prior to requesting a device verification value. In this manner, the payment processing network 26 may anticipate receiving the request from the user 30 and can appropriately process the request. In some embodiments, the user 30 may, in addition to or in lieu of requesting a dCVV2, the mobile device 36 may make a request for a PAN, dPAN, cryptogram, counter or the like to the payment processing network 26.


In step S301, the mobile device 36 may establish a first communication channel with the payment processing network 26 (or other validation entity). The communication channel may use any suitable network, including the Internet and/or a private network, and may also utilize any suitable connection method, including use of a mobile network, data network, etc. At step S302. the communication channel may be secured in any suitable manner, including an encrypted SSL session. The mobile device 36 (e.g. through use of a verification token 34) may send to the IPG 27 information associated with the mobile device 36 (e.g. serial numbers of components, etc.), an encrypted message (e.g. using a unique encryption key), and/or information related to the portable consumer device 32 (e.g. account number, verification values, user information, etc.). This may enable the mobile device 36 to form a secure communications channel 38 with the IPG 27 (or any other validation entity).


At step S303, the mobile device 36 may generate and send a first request for a device verification value to the payment processing network 26, IGP 27, or other validation entity. In some embodiments, the mobile device 36 may send any information (whether encrypted or otherwise) that may be used to validate the request for a device verification value, as was described above. At step S304, the request may be received by the validation entity, which may include server computer 210 at the payment processing network 26.


At step S304, the first request for the device verification value (and accordingly, the mobile device 36 and/or portable consumer device 32) may be validated utilizing the information sent in step S303. This may be done in any suitable manner, including those described in detail above. In some embodiments, the validation may involve the IPG 27 communicating with the payment processing network 26. That is, in some embodiments, the payment processing network 26 may comprise information that is used to validate the first request (and/or mobile device 36, including in some embodiments a verification token 34). This could, for example and as described in detail above, comprise a database of information associated with the mobile device 36 (e.g. serial numbers and corresponding encryption keys, IP addresses, etc.). In addition, when the mobile device 36 is connected to the IPG 27 and the payment processing network 26, a number of different processes may be performed. For example, in some embodiments, the payment processing network 26 may receive data from the portable consumer device 32 such as PANs, cryptograms, counters, dynamic verification values, etc. This information may be stored in the payment processing network 26 for use in generating a risk score associated with a later transaction and/or validating a mobile device 36 in a future request from the user 30.


At step S305, it may be determined if the first request is valid. As noted above, this may comprise any suitable validation method, which may include the use of any information that the validation entity received regarding the first transaction and/or regarding past transactions. In some embodiments, if at step S306 the first request is not valid, then at step S310 the validation entity does not send a device verification value. In addition, in some embodiments, the information associated with the first request may be stored at the validation entity (e.g. server computer 210) for use in validating future requests. That is, for instance, if a mobile device 36 was used with one portable consumer device 32 and the request was not validated, and later the same mobile device 36 is used with a different portable consumer device 32′, then it may be evidence of fraudulent activity. If the first request is validated, then the exemplary method may proceed to step S307.


At step S307, in some embodiments if the first request is validated, the user 30 via the mobile device 36 may receive a message from the payment processing network 26 via the secure communications channel 38 and the IPG 27 that includes a device verification value (e.g. dCVV2 and/or similar information that may be used in a subsequent transaction by the user 30). In some embodiments, the message may be sent back through the same channel that the request was sent in, or a different channel, such as an email, text message, or through a web interface. In some embodiments, the information may also be stored in mobile device 36 and the user 30 may (or may not) have access to this information. In such embodiments, as explained below, the mobile device 36 may be used to submit (e.g. send or transmit) the device verification value to a merchant (e.g. via an access device) to perform a transaction, as was described above. The device verification value may also be stored at the payment processing network 26 (or another validation entity) for later use to authorize a financial transaction associated with the portable consumer device 32.


At step S308, the user 30 conducts a transaction with a merchant and may choose to pay for that transaction using the portable consumer device 32 (such as a Visa payWave card). That is, for instance, the user 30 may select a good to purchase at a merchant's store. The merchant may enter the information regarding the transaction (e.g. type of good, price, etc.) and request payment from the user 30. The user 30 may then designate payment using a payment account that may be associated with the portable consumer device 32 by presenting the portable consumer device 32 to the merchant. The merchant may then enter this information into the merchant computer 22 (e.g. via an access device such as a POS terminal). The user 30 may then be prompted to enter in (or otherwise provide) the first device verification value associated with the portable consumer device 32.


At step S309, the first dynamic verification value may be sent (or otherwise provided) to the merchant. That is, the user 30 may provide the received device verification value (e.g. the dCVV2 value) received in step S304 to the merchant (and/or merchant computer 22). In some embodiments, the mobile device 36 may automatically send the device verification value to the merchant (e.g. merchant access device via a POS terminal) using a short range communication. That is, for instance, when the user 30 is prompted in step S308 to provide the device verification value associated with the portable consumer device 32, the user may present the mobile device 36 so that it interacts with the merchant's access device and sends the device verification value. In this manner, neither the user nor the merchant may need access to the device verification value, which may increase the security of some embodiments. Indeed, by directly passing the device verification value from the mobile device 36 to the merchant, embodiments may provide less opportunity for a third party to intercept (or somehow replicate) the device verification value and attempt to conduct a fraudulent transaction. Moreover, by utilizing an interaction between the merchant's access device and the mobile device 36 to send the device verification value, embodiments may provide a fast and efficient manner of providing added security to a transaction (rather than, for instance, requiring the user or merchant to manually enter the information, although embodiments are not so limited). The use of short range communications may also enable mobile devices of different sizes, shapes, etc. to readily interact with the merchant's access device in some embodiments.


At step S311, a first authorization request message corresponding to the first transaction may be generated (e.g., by an access device at the merchant) and sent to the payment processing network 26. The first authorization request message may comprise, for instance, transaction related information (e.g. information such as a merchant identifier, transaction amount, transaction velocity, etc.), account information (e.g. account number, expiration date, card verification value, etc.), and the received device verification value (e.g. a dCVV2 value). In some embodiments, the first authorization request message generated by the merchant may be form filled with the device verification value received from the user 30 (e.g. from the interaction with the mobile device 36) and/or any other transaction related information. That is, the merchant computer 22 may automatically enter the device verification value into a designated field in the authorization request message, which may then be sent to the payment processing network 26.


At step S312, the authorization request message may be received by the payment processing network 26 (e.g. by the communications module 201). At step S313 the payment processing network 26 may then compare the dynamic verification value received in step S312 as part of the authorization request message with the dynamic verification value that was previously received and stored in step S307 as part of the validation of the first request for the device verification value. If it is determined that the two device verification values match, then at step S314, an authorization response message may be generated by the payment processing network 26 approving of the first transaction. If the two device verification values are determined in step S313 not to correspond (i.e. match), then an authorization response message declining the transaction may be generated at step S315. In some embodiments the determination as to whether the two device verification values (e.g. the stored device verification value and the received device verification value included in the authorization request message) correspond may be considered as one factor of a plurality of factors as to whether the transaction is authorized (e.g. it may be included as an input in a calculation of a risk score for the transaction).


At step S316, the merchant may receive the authorization response message generated in steps S314 or S315 and based on this response message, may approve or decline the transaction. At step S317, if the transaction was approved by the payment processing network 26, then the payment processing network 26, issuer, acquirer, and/or merchant may perform the typical clearing and settling of the transaction.


With reference to FIG. 4, another flow chart showing the exemplary steps that may be performed by a merchant according to some aspects of embodiments provided herein is shown. At step S401, a first transaction may begin, for instance, when a user 30 selects one or more items or services to purchase. The merchant may enter in any transaction related data that may be included in an authorization request message. The user 30 may also present a portable consumer device 32 (such as a payment card) to merchant to pay for the transaction. The merchant may interact with the portable consumer device 32 (e.g. through an access device). The merchant and/or the user 30 may then be prompted to enter a device verification value. For instance, in some embodiments, the payment processing network 26 may initially receive an indication from the merchant that the portable consumer device was associated with the first financial transaction (e.g. in a message from the merchant). The payment processing network 26 may determine (e.g. using a look-up database) whether a device verification value is associated with the portable consumer device 32, and, if so, may send a message to the merchant requesting that the device verification value be provided. In some embodiments, the merchant may automatically request that the user 30 provide the device verification value (e.g. prior to a communication with the payment processing network 26), or the user may present the device verification value when completing the first transaction.


At step S402, an access device that may be coupled to the merchant computer 22 may interact with the mobile device 36. That is, for instance, the merchant computer 22 may comprise (and/or be coupled to) an access device that may interact with the mobile device 36. As described above the interaction may comprise short range wireless communication or any other suitable method of transferring data from one device to another (e.g. a physical interaction). At step S403, based on the interaction between the access device that may be coupled to the merchant computer 22 and the mobile device 36, the merchant computer 22 may receive information from the mobile device, including the device verification value.


At step S404, the merchant computer 22 may generate an authorization request message that comprises the received device verification value. For example, in some embodiments, after the device verification value is received from the mobile device 36 in step S403, the merchant computer 22 may form fill this information into a field of an authorization request message (along with any other information). This automatic form fill step may thereby, in some embodiments, make the additional step of including the device verification value more efficient and less burdensome to the merchant. The generated authorization request message may then be electronically sent by the merchant computer 22 to the payment processing network 36.


At step S405, the merchant may receive an authorization response message from the payment processing network 26. The authorization response message may be based, at least in part, on whether the device verification value that was included in the authorization request message sent by the merchant computer 22 matched a previously stored device verification value associated with the device verification value. At step S406, the merchant may approve or decline the transaction based on the received authorization response message, and/or may request additional information from the user 30 to complete to transaction.


As noted above, the method shown in FIG. 4 is provided for illustration purposes and is not intended to be limiting. For instance, in some embodiments, rather than (or in addition to) the merchant computer 22 generating an authorization request message that includes the device verification value, the merchant computer 22 may determine whether the device verification value received from the mobile device 36 matches a stored verification value that was previously associated with the portable consumer device 32. For instance, in some embodiments, the merchant computer 22 may request a stored device verification value from a validation entity (e.g. payment processing network 26), and may then compare the device verification value received form the mobile device 36 with the device verification value received from the validation entity.


In some embodiments, the merchant may determine whether to approve or decline a transaction associated with a payment device 32 based on, for instance, information received from the payment processing network (e.g. when the merchant comprises a merchant processor such as CyberSource®). The information received by the merchant computer 22 from the payment processing network 26 may include, for instance, whether the device verification value provided by the mobile device 36 matches a device verification value previously associated with the portable consumer device 32. In some embodiments, the merchant computer 22 may receive a risk score associated with the transaction that may be based, at least in part, on whether the device verification value provided by the mobile device 36 matches a previously stored device verification value associated with the portable consumer device 32.


Embodiments may provide some advantages. For example, some embodiments may provide for greater security in conducting transactions when a consumer is located at a merchant (i.e. not involved in an e-commerce or remote transaction). That is, for instance, by using a mobile device as part of a system or method to validate the user and/or a portable consumer device prior to conducting a transaction with the merchant, embodiments may provide increased security (and additional information that may be used to authenticate such transactions) that may prevent (or reduce the number of) unauthorized use of a portable consumer device (such as a payment card) even if a nefarious party is in possession of the portable consumer device. As noted above, typically in brick-and-mortar transactions, the merchant does not request additional information from the user that could otherwise be used to authenticate the transaction. By providing an additional validation step of the portable consumer device, embodiments may thereby provide an efficient, cost effective manner to increase the certainty of the authenticity of such transactions. Moreover, in some embodiments, the device verification value may be passed to the merchant by the mobile device without creating a large burden on either the consumer or the merchant (e.g. neither party may need to manually enter the device verification value to complete the transaction). This may increase the likelihood that the consumer and/or the merchant would be willing to use such an authorization system. In addition, by directly passing the device verification value from the mobile phone to the merchant computer, embodiments may increase the security of the system because a nefarious party may not be afforded the opportunity intercept or copy the device verification value before it is provided to the merchant.


III. Exemplary Computer Apparatus, Mobile Device, and Portable Consumer Device

Referring now to FIG. 7 the various participants and elements in FIGS. 1 and 2 can operate one or more computer apparatuses (e.g., a server computer) to facilitate the functions described herein. Any of the elements in FIGS. 1 and 2 can use any suitable number of subsystems to facilitate the functions described herein. Examples of such subsystems or components are shown in FIG. 7. The subsystems shown in FIG. 7 are interconnected via a system bus 710. Additional subsystems such as a printer 703, keyboard 706, fixed disk 707 (or other memory comprising computer readable media), monitor 709, which is coupled to display adapter 704, and others are shown. Peripherals and input/output (I/O) devices, which coupled to I/O controller 700, can be connected to the computer system by any number of means known in the art, such as serial port 705. For example, serial port 705 or external interface 708 can be used to connect the computer apparatus to a wide area network such as the Internet, a mouse input device, or a scanner. The interconnection via system bus allows the central processor 702 to communicate with each subsystem and to control the execution of instructions from system memory 701 or the fixed disk 707, as well as the exchange of information between subsystems. The system memory 701 and/or the fixed disk 707 can embody a computer readable medium.



FIG. 8(a) shows a block diagram of a mobile device 36 that may be used in some embodiments. The mobile device may be both a notification device that can receive alert messages, a portable consumer device that can be used to make payments, and/or a device that may be used in the systems and method described above related to utilizing a device verification value. The exemplary mobile device 36 may comprise a computer readable medium and a body as shown in FIG. 8(a). The computer readable medium 36(b) may be present within the body 36(h), or may be detachable from it. The body 36(h) may be in the form a plastic substrate, housing, or other structure. The computer readable medium 36(b) may be in the form of (or may be included in) a memory that stores data (e.g., issuer account numbers, loyalty provider account numbers, etc.) and may be in any suitable form including a magnetic stripe, a memory chip, etc. The memory may store information such as financial information, transit information (e.g., as in a subway or train pass), access information (e.g., as in access badges), serial numbers, mobile account information, and any other suitable information that may be used in validating the mobile device 36. Financial information may include information such as bank account information, loyalty account information (e.g., a loyalty account number), a bank identification number (BIN), credit or debit card number information, account balance information, expiration date, consumer information such as name, date of birth, etc. Any of this information may be transmitted by the mobile device 36.


In some embodiments, information in the memory may also be in the form of data tracks that are traditionally associated with credit cards. Such tracks include Track 1 and Track 2. Track 1 (“International Air Transport Association”) stores more information than Track 2, and contains the cardholder's name as well as account number and other discretionary data. This track is sometimes used by the airlines when securing reservations with a credit card. Track 2 (“American Banking Association”) is currently most commonly used. This is the track that is read by ATMs and credit card checkers. The ABA (American Banking Association) designed the specifications of this track and all world banks abide by it. It contains the cardholder's account, encrypted PIN, plus other discretionary data.


The mobile device 36 may further include a contactless element 36(g), which is typically implemented in the form of a semiconductor chip (or other data storage element) with an associated wireless transfer (e.g., data transmission) element, such as an antenna. Contactless element 36(g) is associated with (e.g., embedded within) phone 36 and data or control instructions transmitted via a cellular network may be applied to contactless element 36(g) by means of a contactless element interface (not shown). The contactless element interface functions to permit the exchange of data and/or control instructions between the mobile device circuitry (and hence the cellular network) and an optional contactless element 36(g), or between another device having a contactless element (e.g. a POS terminal or a portable consumer device).


Contactless element 36(g) may be capable of transferring and receiving data using a near field communications (“NFC”) capability (or near field communications medium) typically in accordance with a standardized protocol or data transfer mechanism (e.g., ISO 14443/NFC). Near field communications capability may comprise a short-range communications capability, such as RFID, Bluetooth™, infra-red, or other data transfer capability that can be used to exchange data between the mobile device 36 and an interrogation device (or a portable consumer device 32). That is, mobile device 36 may comprise components to both be the interrogator device (e.g. receiving data) and the interrogated device (e.g. sending data). Thus, the mobile device 36 may be capable of communicating and transferring data and/or control instructions via both cellular network (or any other suitable network, such as through the Internet or other data network) and short range communications capability.


The mobile device 36 may also include a processor 36(c) (e.g., a microprocessor) for processing the functions of the phone 36 and a display 36(d) to allow a consumer to see phone numbers and other information and messages. The phone 36 may further include input elements 36(e) to allow a user to input information into the device, a speaker 36(f) to allow the user to hear voice communication, music, etc., and a microphone 36(i) to allow the user to transmit her voice through the mobile device 36. The mobile device 36 may also include an antenna 36(a) for wireless data transfer (e.g., data transmission).


If the portable consumer device is in the form of a debit, credit, or smartcard, the portable consumer device may also optionally have features such as magnetic stripes. Such devices can operate in either a contact or contactless mode.


An example of a portable device 32″ in the form of a card is shown in FIG. 8(b). FIG. 8(b) shows a plastic substrate 32(m). A contactless element 32(o) for interfacing with an access device 34 may be present on or embedded within the plastic substrate 32(m). Consumer information 32(p) such as an account number, expiration date, and user name may be printed or embossed on the card. Also, a magnetic stripe 32(n) may also be on the plastic substrate 32(m). The portable device 32″ may also comprise a microprocessor and/or memory chips with user data stored in them.


As shown in FIG. 8(b), the portable device 32″ may include both a magnetic stripe 32(n) and a contactless element 32(o). In other embodiments, both the magnetic stripe 32(n) and the contactless element 32(o) may be in the portable device 32″. In other embodiments, either the magnetic stripe 32(n) or the contactless element 32(o) may be present in the portable device 32″.


The above description is illustrative and is not restrictive. Many variations of the invention will become apparent to those skilled in the art upon review of the disclosure. The scope of the invention should, therefore, be determined not with reference to the above description, but instead should be determined with reference to the pending claims along with their full scope or equivalents.


One or more features from any embodiment can be combined with one or more features of any other embodiment without departing from the scope of the invention.


A recitation of “a”, “an” or “the” is intended to mean “one or more” unless specifically indicated to the contrary.

Claims
  • 1. A system comprising: a mobile device comprising a processor; and a computer readable medium coupled to the processor, a verification token coupled to the mobile device;a portable consumer device storing account information associated with a user, wherein the portable consumer device is configured to interact with the mobile device and an access device of a first merchant to transmit an identifier identifying an account of the user to the mobile device and the access device, respectively;wherein the computer readable medium comprises code that when executed by the processor, causes the processor to: receive the identifier identifying an account of the user from the portable consumer device via the verification token, wherein the verification token obtains the identifier identifying the account of the user from the portable consumer device;generate a first request for a first device verification value, the first request including the identifier identifying the account of the user, information associated with the mobile device, and information about the user;establish a first secure communication channel with a server computer via the verification token;send the first request to the server computer through the first secure communication channel;receive the first device verification value from the server computer, wherein the first device verification value is a temporary first device verification value that is valid for a first predetermined number of transactions or for a first predetermined amount of time, wherein the temporary first device verification value is generated upon validation of the mobile device, the account, and the user by the server computer using one or more validation tests, wherein the first device verification value is separate and different from an identifier identifying the account;interact with the access device of the first merchant in connection with a first transaction over a short range wireless communication channel; andtransmit, over the short range wireless communication channel, the first device verification value to the first merchant associated with the first transaction based on an interaction between the mobile device and the access device of the first merchant after the access device receives the identifier identifying the account from the portable consumer device, wherein the first device verification value is provided to the access device in connection with the first transaction.
  • 2. The system of claim 1, wherein the first device verification value is received if the first request is validated based at least in part on the account information.
  • 3. The system of claim 1, wherein the first device verification value is transmitted to a payment processing network in an authorization request message associated with the first transaction.
  • 4. A method comprising: receiving, by a mobile device through an interaction with a portable consumer device, an identifier identifying an account of a user via a verification token coupled to the mobile device, wherein the verification token obtains the identifier identifying the account of the user from the portable consumer device, wherein the portable consumer device stores account information associated with the user, wherein the portable consumer device is configured to interact with the mobile device and an access device of a first merchant to transmit the identifier identifying the account of the user to the mobile device and the access device, respectively;generating, by the mobile device, a first request for a first device verification value, the first request including the identifier identifying the account of the user, information associated with the mobile device, and information about the user;establishing, by the mobile device, a first secure communication channel with a server computer via the verification token;sending, by the mobile device, the first request to the server computer through the first secure communication channel;receiving, at the mobile device, the first device verification value from the server computer, wherein the first device verification value is a temporary first device verification value that is valid for a first predetermined number of transactions or for a first predetermined amount of time, wherein the temporary first device verification value is generated upon validation of the mobile device, the account, and the user by the server computer using one or more validation tests, wherein the first device verification value is separate and different from an identifier identifying the account;interacting, by the mobile device, with the access device of the first merchant in connection with a first transaction over a short range wireless communication channel; andtransmitting, by the mobile device over the short range wireless communication channel, the first device verification value to the first merchant associated with the first transaction based on an interaction between the mobile device and the access device of the first merchant after the access device receives the identifier identifying the account from the portable consumer device, wherein the first device verification value is provided to the access device in connection with the first transaction.
  • 5. The method of claim 4, wherein the first device verification value is received by the mobile device if the first request is validated based at least in part on the account information.
  • 6. The method of claim 4, further comprising: prior to sending, by the mobile device, the first device verification value to the first merchant:initiating the first transaction with the first merchant; andinteracting with the access device for the first merchant associated with the first transaction using the mobile device.
  • 7. The method of claim 4, further comprising: wherein the interaction between the mobile device and the access device comprises short-range wireless communication; andwherein the first device verification value is transmitted to a payment processing network in an authorization request message associated with the first transaction.
  • 8. The method of claim 4, further comprising: after the first device verification value becomes invalid:generating, by the mobile device, a second request for a second device verification value;sending, by the mobile device, the second request to the server computer; andreceiving, by the mobile device, the second device verification value from the server computer, wherein the second device verification value is a temporary second device verification value that is valid for a second predetermined number of transactions or for a second predetermined amount of time, wherein the temporary second device verification value includes information related to validation of the mobile device, the account, and the user by the server computer.
  • 9. The method of claim 8, further comprising: interacting, by the mobile device, with an access device of a second merchant in connection with a second transaction; andsending, by the mobile device, the second device verification value to the second merchant associated with the second transaction based on interaction between the mobile device and an access device of the second merchant.
  • 10. The method of claim 4, further comprising: receiving, at the mobile device, the first device verification value from the server computer via a secure communications session.
  • 11. The method of claim 4, further comprising: registering, by the mobile device, for a secure communications session with the server computer, wherein registering establishes a session key, wherein the first device verification value is encrypted with the session key.
  • 12. The method of claim 4, wherein the information associated with the mobile device includes a SIM card information, an application specific information, an IP address information, a hardware specific information, or a serial number.
  • 13. The system of claim 1, wherein the code, when executed by the processor, further causes the processor to: after the first device verification value becomes invalid:generate a second request for a second device verification value;send the second request to the server computer; andreceive the second device verification value from the server computer, wherein the second device verification value is a temporary second device verification value that is valid for a second predetermined number of transactions or for a second predetermined amount of time, wherein the temporary second device verification value includes information related to validation of the mobile device, the account, and the user by the server computer.
  • 14. The system of claim 13, wherein the code, when executed by the processor, further causes the processor to: interact with an access device of a second merchant in connection with a second transaction; andsend the second device verification value to the second merchant associated with the second transaction based on interaction between the mobile device and an access device of the second merchant.
  • 15. The system of claim 1, wherein the code, when executed by the processor, further causes the processor to: receive the first device verification value from the server computer via a secure communications session.
  • 16. The system of claim 1, wherein the code, when executed by the processor, further causes the processor to: register for a secure communications session with the server computer, wherein registering establishes a session key, wherein the first device verification value is encrypted with the session key.
  • 17. The system of claim 1, wherein the information associated with the mobile device includes a SIM card information, an application specific information, an IP address information, a hardware specific information, or a serial number.
Parent Case Info

This application is a divisional application of U.S. patent application Ser. No. 13/413,484 filed Mar. 6, 2012, which is herein incorporated by reference in its entirety for all purposes.

US Referenced Citations (886)
Number Name Date Kind
593611 Scribner Nov 1897 A
5280527 Gullman et al. Jan 1994 A
5336870 Hughes et al. Aug 1994 A
5365586 Indeck et al. Nov 1994 A
5450537 Hirai et al. Sep 1995 A
5477040 LaLonde Dec 1995 A
5550561 Ziarno Aug 1996 A
5613012 Hoffman Mar 1997 A
5625669 McGregor et al. Apr 1997 A
5640577 Scharmer Jun 1997 A
5696824 Walsh Dec 1997 A
5729591 Bailey Mar 1998 A
5742845 Wagner Apr 1998 A
5781438 Lee Jul 1998 A
5794259 Kikinis Aug 1998 A
5883810 Franklin Mar 1999 A
5930767 Reber et al. Jul 1999 A
5953710 Fleming Sep 1999 A
5956699 Wong Sep 1999 A
5974430 Mutschler, III et al. Oct 1999 A
6000832 Franklin Dec 1999 A
6014635 Harris Jan 2000 A
6032859 Muehlberger et al. Mar 2000 A
6044349 Tolopka et al. Mar 2000 A
6044360 Picciallo Mar 2000 A
6055592 Smith Apr 2000 A
6067621 Yu et al. May 2000 A
6163771 Walker Dec 2000 A
6227447 Campisano May 2001 B1
6234389 Valliani et al. May 2001 B1
6236981 Hill May 2001 B1
6253328 Smith, Jr. Jun 2001 B1
6267292 Walker Jul 2001 B1
6299062 Hwang Oct 2001 B1
6327578 Linehan Dec 2001 B1
6341724 Campisano Jan 2002 B2
6354496 Murphy et al. Mar 2002 B1
6385596 Wiser et al. May 2002 B1
6421729 Paltenghe et al. Jul 2002 B1
6422462 Cohen Jul 2002 B1
6425523 Shem-Ur Jul 2002 B1
6449347 Ple et al. Sep 2002 B1
6453301 Niwa Sep 2002 B1
6490601 Markus et al. Dec 2002 B1
6499042 Markus Dec 2002 B1
6560709 Galovich May 2003 B1
6571339 Danneels et al. May 2003 B1
6592044 Wong Jul 2003 B1
6636833 Flitcroft Oct 2003 B1
6685095 Roustaei et al. Feb 2004 B2
6738749 Chasko May 2004 B1
6748367 Lee Jun 2004 B1
6805287 Bishop Oct 2004 B2
6850996 Wagner Feb 2005 B2
6873974 Schutzer Mar 2005 B1
6879965 Fung Apr 2005 B2
6891953 DeMello et al. May 2005 B1
6901387 Wells May 2005 B2
6907476 Wagner Jun 2005 B2
6931382 Laage Aug 2005 B2
6938019 Uzo Aug 2005 B1
6941285 Sarcanin Sep 2005 B2
6947908 Slater Sep 2005 B1
6980670 Hoffman Dec 2005 B1
6983882 Cassone Jan 2006 B2
6990470 Hogan Jan 2006 B2
6991157 Bishop Jan 2006 B2
6993658 Engberg et al. Jan 2006 B1
7007840 Davis Mar 2006 B2
7051929 Li May 2006 B2
7062706 Maxwell et al. Jun 2006 B2
7069249 Stolfo Jun 2006 B2
7080048 Sines et al. Jul 2006 B1
7103576 Mann, III Sep 2006 B2
7111324 Elteto et al. Sep 2006 B2
7113930 Eccles Sep 2006 B2
7136835 Flitcroft Nov 2006 B1
7159180 Ward Jan 2007 B2
7177835 Walker Feb 2007 B1
7177848 Hogan Feb 2007 B2
7194437 Britto Mar 2007 B1
7209561 Shankar et al. Apr 2007 B1
7210169 Smith et al. Apr 2007 B2
7216292 Snapper et al. May 2007 B1
7231045 Parrott Jun 2007 B1
7254560 Singhal Aug 2007 B2
7254569 Goodman et al. Aug 2007 B2
7257581 Steele et al. Aug 2007 B1
7264154 Harris Sep 2007 B2
7275263 Bajikar et al. Sep 2007 B2
7275685 Gray et al. Oct 2007 B2
7287692 Patel Oct 2007 B1
7292999 Hobson Nov 2007 B2
7334184 Simons Feb 2008 B1
7343351 Bishop et al. Mar 2008 B1
7346587 Goldstein et al. Mar 2008 B2
7347361 Lovett Mar 2008 B2
7350139 Simons Mar 2008 B1
7350230 Forrest Mar 2008 B2
7353382 Labrou Apr 2008 B2
7356706 Scheurich Apr 2008 B2
7366703 Gray et al. Apr 2008 B2
7379919 Hogan et al. May 2008 B2
RE40444 Linehan Jul 2008 E
7412420 Holdsworth Aug 2008 B2
7412422 Shiloh Aug 2008 B2
7415443 Hobson et al. Aug 2008 B2
7427033 Roskind Sep 2008 B1
7430540 Asani Sep 2008 B1
7431202 Meador et al. Oct 2008 B1
7437575 Dennis et al. Oct 2008 B2
7437757 Holdsworth Oct 2008 B2
7444676 Asghari-Kamrani Oct 2008 B1
7469151 Khan Dec 2008 B2
7483845 Vetelainen Jan 2009 B2
7512975 Aissi Mar 2009 B2
7523859 Patel et al. Apr 2009 B2
7533063 Kianian May 2009 B2
7533828 Ong May 2009 B2
7543738 Saunders et al. Jun 2009 B1
7548889 Bhambri Jun 2009 B2
7567934 Flitcroft Jul 2009 B2
7567936 Peckover Jul 2009 B1
7568631 Gibbs et al. Aug 2009 B2
7571139 Giordano Aug 2009 B1
7571142 Flitcroft Aug 2009 B1
7580898 Brown et al. Aug 2009 B2
7584153 Brown et al. Sep 2009 B2
7593896 Flitcroft Sep 2009 B1
7599863 Sines et al. Oct 2009 B2
7606560 Labrou Oct 2009 B2
7627531 Breck et al. Dec 2009 B2
7627895 Gifford Dec 2009 B2
7650314 Saunders Jan 2010 B1
7660779 Goodman et al. Feb 2010 B2
7664699 Powell Feb 2010 B1
7685037 Reiners Mar 2010 B2
7694130 Martinez Apr 2010 B1
7702578 Fung Apr 2010 B2
7707120 Dominguez Apr 2010 B2
7712655 Wong May 2010 B2
7716596 Cao et al. May 2010 B2
7734527 Uzo Jun 2010 B2
7753265 Harris Jul 2010 B2
7757953 Hart Jul 2010 B2
7761374 Sahota et al. Jul 2010 B2
7770789 Oder, II Aug 2010 B2
7784685 Hopkins, III Aug 2010 B1
7793851 Mullen Sep 2010 B2
7801826 Labrou Sep 2010 B2
7805376 Smith Sep 2010 B2
7805378 Berardi Sep 2010 B2
7818264 Hammad Oct 2010 B2
7827115 Weller et al. Nov 2010 B2
7828220 Mullen Nov 2010 B2
7835960 Breck Nov 2010 B2
7841523 Oder, II Nov 2010 B2
7841539 Hewton Nov 2010 B2
7844550 Walker Nov 2010 B2
7848980 Carlson Dec 2010 B2
7849014 Erikson Dec 2010 B2
7849020 Johnson Dec 2010 B2
7853529 Walker Dec 2010 B1
7853995 Chow Dec 2010 B2
7865414 Fung Jan 2011 B2
7873579 Hobson Jan 2011 B2
7873580 Hobson Jan 2011 B2
7890393 Talbert Feb 2011 B2
7891560 Hammad Feb 2011 B2
7891563 Oder, II Feb 2011 B2
7896238 Fein Mar 2011 B2
7908216 Davis et al. Mar 2011 B1
7922082 Muscato Apr 2011 B2
7931195 Mullen Apr 2011 B2
7937324 Patterson May 2011 B2
7938318 Fein May 2011 B2
7954705 Mullen Jun 2011 B2
7959076 Hopkins, III Jun 2011 B1
7966257 DiGioacchino Jun 2011 B2
7996288 Stolfo Aug 2011 B1
8025223 Saunders Sep 2011 B2
8046256 Chien Oct 2011 B2
8060448 Jones Nov 2011 B2
8060449 Zhu Nov 2011 B1
8074877 Mullen Dec 2011 B2
8074879 Harris Dec 2011 B2
8082210 Hansen Dec 2011 B2
8095113 Kean Jan 2012 B2
8104679 Brown Jan 2012 B2
RE43157 Bishop Feb 2012 E
8109436 Hopkins, III Feb 2012 B1
8121942 Carlson Feb 2012 B2
8121956 Carlson Feb 2012 B2
8126449 Beenau Feb 2012 B2
8132723 Hogg et al. Mar 2012 B2
8171525 Pelly May 2012 B1
8175973 Davis et al. May 2012 B2
8190523 Patterson May 2012 B2
8196813 Vadhri Jun 2012 B2
8205791 Randazza Jun 2012 B2
8219489 Patterson Jul 2012 B2
8224702 Mengerink Jul 2012 B2
8225385 Chow Jul 2012 B2
8229852 Carlson Jul 2012 B2
8265993 Chien Sep 2012 B2
8280777 Mengerink Oct 2012 B2
8281991 Wentker et al. Oct 2012 B2
8313022 Hammad et al. Nov 2012 B2
8326759 Hammad Dec 2012 B2
8328095 Oder, II Dec 2012 B2
8336088 Raj et al. Dec 2012 B2
8346666 Lindelsee et al. Jan 2013 B2
8376225 Hopkins, III Feb 2013 B1
8380177 Laracey Feb 2013 B2
8387873 Saunders Mar 2013 B2
8401539 Beenau Mar 2013 B2
8401898 Chien Mar 2013 B2
8401968 Schattauer Mar 2013 B1
8402555 Grecia Mar 2013 B2
8403211 Brooks Mar 2013 B2
8412623 Moon Apr 2013 B2
8412837 Emigh Apr 2013 B1
8417642 Oren Apr 2013 B2
8433116 Butler et al. Apr 2013 B2
8447699 Batada May 2013 B2
8453223 Svigals May 2013 B2
8453226 Hammad May 2013 B2
8453925 Fisher Jun 2013 B2
8458487 Palgon Jun 2013 B1
8484134 Hobson Jul 2013 B2
8485437 Mullen Jul 2013 B2
8494959 Hathaway Jul 2013 B2
8498908 Mengerink Jul 2013 B2
8504475 Brand et al. Aug 2013 B2
8504478 Saunders Aug 2013 B2
8510816 Quach Aug 2013 B2
8528067 Hurry et al. Sep 2013 B2
8533860 Grecia Sep 2013 B1
8534564 Hammad Sep 2013 B2
8538845 Liberty Sep 2013 B2
8555079 Shablygin Oct 2013 B2
8566168 Bierbaum Oct 2013 B1
8567670 Stanfield Oct 2013 B2
8571939 Lindsey Oct 2013 B2
8577336 Mechaley, Jr. Nov 2013 B2
8577803 Chatterjee Nov 2013 B2
8577813 Weiss Nov 2013 B2
8578176 Mattsson Nov 2013 B2
8583494 Fisher Nov 2013 B2
8584251 Mcguire Nov 2013 B2
8589237 Fisher Nov 2013 B2
8589271 Evans Nov 2013 B2
8589291 Carlson Nov 2013 B2
8595098 Starai Nov 2013 B2
8595812 Bomar Nov 2013 B2
8595850 Spies Nov 2013 B2
8602293 Hammad Dec 2013 B2
8606638 Dragt Dec 2013 B2
8606700 Carlson Dec 2013 B2
8606720 Baker Dec 2013 B1
8615468 Varadarajan Dec 2013 B2
8620754 Fisher Dec 2013 B2
8635157 Smith Jan 2014 B2
8646059 Von Behren Feb 2014 B1
8651374 Brabson Feb 2014 B2
8656180 Shablygin Feb 2014 B2
8751391 Freund Jun 2014 B2
8751642 Vargas et al. Jun 2014 B2
8762263 Gauthier et al. Jun 2014 B2
8793186 Patterson Jul 2014 B2
8827154 Hammad Sep 2014 B2
8838982 Carlson et al. Sep 2014 B2
8856539 Weiss Oct 2014 B2
8887308 Grecia Nov 2014 B2
8893967 Hammad Nov 2014 B2
9038886 Hammad May 2015 B2
9065643 Hurry et al. Jun 2015 B2
9070128 Adams Jun 2015 B1
9070129 Sheets et al. Jun 2015 B2
9100826 Weiss Aug 2015 B2
9105027 Hammad et al. Aug 2015 B2
9160741 Wentker et al. Oct 2015 B2
9229964 Stevelinck Jan 2016 B2
9245267 Singh Jan 2016 B2
9249241 Dai et al. Feb 2016 B2
9256871 Anderson et al. Feb 2016 B2
9280765 Hammad Mar 2016 B2
9317848 Hammad Apr 2016 B2
9372971 Hammad Jun 2016 B2
9424413 Hammad Aug 2016 B2
9530137 Weiss Dec 2016 B2
9582801 Hammad Feb 2017 B2
9589268 Hammad Mar 2017 B2
9646303 Karpenko et al. May 2017 B2
9680942 Dimmick Jun 2017 B2
9715681 Hammad Jul 2017 B2
9792611 Hammad et al. Oct 2017 B2
9904919 Hammad Feb 2018 B2
10009177 Hammad Jun 2018 B2
10043186 Hammad et al. Aug 2018 B2
10049360 Hammad Aug 2018 B2
10282724 Hammad May 2019 B2
10387871 Hammad Aug 2019 B2
10572864 Hammad Feb 2020 B2
10657528 Hammad May 2020 B2
20010029485 Brody Oct 2001 A1
20010032182 Kumar et al. Oct 2001 A1
20010032192 Putta et al. Oct 2001 A1
20010034720 Armes Oct 2001 A1
20010042785 Walker et al. Nov 2001 A1
20010051924 Uberti Dec 2001 A1
20010054003 Chien Dec 2001 A1
20010054148 Hoornaert et al. Dec 2001 A1
20020007320 Hogan Jan 2002 A1
20020016749 Borecki Feb 2002 A1
20020023054 Gillespie Feb 2002 A1
20020029193 Ranjan Mar 2002 A1
20020035539 O'connell Mar 2002 A1
20020035548 Hogan Mar 2002 A1
20020038286 Koren et al. Mar 2002 A1
20020044689 Roustaei et al. Apr 2002 A1
20020055909 Fung et al. May 2002 A1
20020059146 Keech May 2002 A1
20020073045 Rubin Jun 2002 A1
20020077837 Krueger et al. Jun 2002 A1
20020091877 Karidis Jul 2002 A1
20020107791 Nobrega et al. Aug 2002 A1
20020111919 Weller et al. Aug 2002 A1
20020112171 Ginter Aug 2002 A1
20020116341 Hogan Aug 2002 A1
20020120584 Hogan et al. Aug 2002 A1
20020128977 Nambiar et al. Sep 2002 A1
20020133467 Hobson Sep 2002 A1
20020147913 Lun Yip Oct 2002 A1
20020170960 Ehrensvard et al. Nov 2002 A1
20030028481 Flitcroft Feb 2003 A1
20030038835 DeFelice Feb 2003 A1
20030057219 Risolia Mar 2003 A1
20030097561 Wheeler et al. May 2003 A1
20030115142 Brickell et al. Jun 2003 A1
20030126094 Fisher et al. Jul 2003 A1
20030130955 Hawthorne Jul 2003 A1
20030142855 Kuo et al. Jul 2003 A1
20030191709 Elston Oct 2003 A1
20030191945 Keech Oct 2003 A1
20030200184 Dominguez et al. Oct 2003 A1
20030212642 Weller et al. Nov 2003 A1
20040010462 Moon Jan 2004 A1
20040039651 Grunzig Feb 2004 A1
20040050928 Bishop Mar 2004 A1
20040058705 Morgan et al. Mar 2004 A1
20040059682 Hasumi Mar 2004 A1
20040093281 Silverstein May 2004 A1
20040104268 Bailey Jun 2004 A1
20040127256 Goldthwaite et al. Jul 2004 A1
20040139008 Mascavage Jul 2004 A1
20040143532 Lee Jul 2004 A1
20040158532 Breck Aug 2004 A1
20040188519 Cassone Sep 2004 A1
20040210449 Breck Oct 2004 A1
20040210498 Freund Oct 2004 A1
20040210821 Kasser Oct 2004 A1
20040226999 Ruat et al. Nov 2004 A1
20040232225 Bishop Nov 2004 A1
20040236632 Maritzen et al. Nov 2004 A1
20040248554 Khan et al. Dec 2004 A1
20040254890 Sancho et al. Dec 2004 A1
20040260646 Berardi Dec 2004 A1
20040267672 Gray et al. Dec 2004 A1
20050036611 Seaton, Jr. et al. Feb 2005 A1
20050037735 Coutts Feb 2005 A1
20050043997 Jagdeep et al. Feb 2005 A1
20050065875 Beard Mar 2005 A1
20050077349 Bonalle et al. Apr 2005 A1
20050080730 Sorrentino Apr 2005 A1
20050108178 York May 2005 A1
20050108569 Bantz et al. May 2005 A1
20050109838 Linlor May 2005 A1
20050127164 Wankmueller Jun 2005 A1
20050156026 Ghosh Jul 2005 A1
20050187873 Labrou Aug 2005 A1
20050199709 Linlor Sep 2005 A1
20050246293 Ong Nov 2005 A1
20050250538 Narasimhan Nov 2005 A1
20050269401 Spitzer Dec 2005 A1
20050269402 Spitzer Dec 2005 A1
20050278461 Ohta Dec 2005 A1
20050289052 Wankmueller Dec 2005 A1
20060016879 Kean Jan 2006 A1
20060026098 Peckover et al. Feb 2006 A1
20060131390 Kim Jun 2006 A1
20060142058 Elias et al. Jun 2006 A1
20060168653 Contrera Jul 2006 A1
20060175396 Call et al. Aug 2006 A1
20060235795 Johnson Oct 2006 A1
20060237528 Bishop Oct 2006 A1
20060253389 Hagale Nov 2006 A1
20060278704 Saunders Dec 2006 A1
20060294023 Lu Dec 2006 A1
20060294095 Berk et al. Dec 2006 A1
20070005685 Chau et al. Jan 2007 A1
20070022058 Labrou Jan 2007 A1
20070083444 Matthews et al. Apr 2007 A1
20070107044 Yuen May 2007 A1
20070114274 Gibbs et al. May 2007 A1
20070129955 Dalmia Jun 2007 A1
20070136193 Starr Jun 2007 A1
20070136211 Brown Jun 2007 A1
20070170247 Friedman Jul 2007 A1
20070178883 Nandagopal Aug 2007 A1
20070179885 Bird Aug 2007 A1
20070185820 Talker Aug 2007 A1
20070185821 Wells et al. Aug 2007 A1
20070203850 Singh et al. Aug 2007 A1
20070208671 Brown Sep 2007 A1
20070228148 Rable Oct 2007 A1
20070245414 Chan Oct 2007 A1
20070272743 Christie et al. Nov 2007 A1
20070284433 Domenica et al. Dec 2007 A1
20070284443 Anson et al. Dec 2007 A1
20070288377 Shaked Dec 2007 A1
20070290034 Routhenstein Dec 2007 A1
20070291995 Rivera Dec 2007 A1
20080001744 Batra et al. Jan 2008 A1
20080011823 Patel Jan 2008 A1
20080014867 Finn Jan 2008 A1
20080015988 Brown Jan 2008 A1
20080029607 Mullen Feb 2008 A1
20080034221 Hammad Feb 2008 A1
20080035738 Mullen Feb 2008 A1
20080040276 Hammad Feb 2008 A1
20080040285 Wankmueller Feb 2008 A1
20080052226 Agarwal Feb 2008 A1
20080054068 Mullen Mar 2008 A1
20080054079 Mullen Mar 2008 A1
20080054081 Mullen Mar 2008 A1
20080065554 Hogan Mar 2008 A1
20080065555 Mullen Mar 2008 A1
20080071681 Khalid Mar 2008 A1
20080097925 King Apr 2008 A1
20080103984 Choe May 2008 A1
20080110983 Ashfield May 2008 A1
20080114678 Bennett May 2008 A1
20080120214 Steele et al. May 2008 A1
20080126260 Cox et al. May 2008 A1
20080142582 Corioni Jun 2008 A1
20080154770 Rutherford et al. Jun 2008 A1
20080162312 Sklovsky et al. Jul 2008 A1
20080177796 Eldering Jul 2008 A1
20080201264 Brown Aug 2008 A1
20080201265 Hewton Aug 2008 A1
20080203152 Hammad Aug 2008 A1
20080228646 Myers Sep 2008 A1
20080228653 Holdsworth Sep 2008 A1
20080243702 Hart Oct 2008 A1
20080245855 Fein Oct 2008 A1
20080245861 Fein Oct 2008 A1
20080275779 Lakshminarayanan Nov 2008 A1
20080283591 Oder, II Nov 2008 A1
20080289022 Chiu Nov 2008 A1
20080302869 Mullen Dec 2008 A1
20080302876 Mullen Dec 2008 A1
20080305769 Rubinstein et al. Dec 2008 A1
20080306876 Horvath et al. Dec 2008 A1
20080313264 Pestoni Dec 2008 A1
20080319869 Carlson et al. Dec 2008 A1
20080319905 Carlson Dec 2008 A1
20090006262 Brown Jan 2009 A1
20090006646 Duarte Jan 2009 A1
20090010488 Matsuoka Jan 2009 A1
20090018959 Doran et al. Jan 2009 A1
20090037333 Flitcroft Feb 2009 A1
20090037388 Cooper et al. Feb 2009 A1
20090043702 Bennett Feb 2009 A1
20090044268 Tak Feb 2009 A1
20090048971 Hathaway Feb 2009 A1
20090055277 Myers Feb 2009 A1
20090055893 Manessis et al. Feb 2009 A1
20090103730 Ward et al. Apr 2009 A1
20090104888 Cox Apr 2009 A1
20090106112 Dalmia Apr 2009 A1
20090106138 Smith et al. Apr 2009 A1
20090106160 Skowronek Apr 2009 A1
20090124234 Fisher May 2009 A1
20090125446 Saunders et al. May 2009 A1
20090132413 Engelbrecht May 2009 A1
20090134217 Flitcroft May 2009 A1
20090143104 Loh Jun 2009 A1
20090157555 Biffle Jun 2009 A1
20090159673 Mullen Jun 2009 A1
20090159700 Mullen Jun 2009 A1
20090159707 Mullen Jun 2009 A1
20090160617 Mullen Jun 2009 A1
20090173782 Muscato Jul 2009 A1
20090200371 Kean Aug 2009 A1
20090219430 Okamoto et al. Sep 2009 A1
20090228707 Linsky Sep 2009 A1
20090235339 Mennes Sep 2009 A1
20090248583 Chhabra Oct 2009 A1
20090249462 Chhabra Oct 2009 A1
20090254486 Hutchison et al. Oct 2009 A1
20090254986 Harris et al. Oct 2009 A1
20090255987 Olivares Oct 2009 A1
20090265260 Aabye et al. Oct 2009 A1
20090276347 Kargman Nov 2009 A1
20090281948 Carlson Nov 2009 A1
20090289110 Regen et al. Nov 2009 A1
20090292631 Wells et al. Nov 2009 A1
20090294527 Brabson Dec 2009 A1
20090307133 Holloway et al. Dec 2009 A1
20090307139 Mardikar Dec 2009 A1
20090307140 Mardikar Dec 2009 A1
20090307493 Smith Dec 2009 A1
20090308921 Mullen Dec 2009 A1
20090313168 Manessis Dec 2009 A1
20090319430 Faith et al. Dec 2009 A1
20090319431 Aiello et al. Dec 2009 A1
20090319784 Faith et al. Dec 2009 A1
20090327131 Beenau Dec 2009 A1
20100008535 Abulafia Jan 2010 A1
20100023400 DeWitt Jan 2010 A1
20100088237 Wankmueller Apr 2010 A1
20100094755 Kloster Apr 2010 A1
20100100481 Doran et al. Apr 2010 A1
20100106644 Annan Apr 2010 A1
20100114776 Weller et al. May 2010 A1
20100120408 Beenau May 2010 A1
20100125516 Wankmueller et al. May 2010 A1
20100133334 Vadhri Jun 2010 A1
20100133335 Maguid Jun 2010 A1
20100138347 Chen Jun 2010 A1
20100145860 Pelegero Jun 2010 A1
20100161433 White Jun 2010 A1
20100174556 Wilkins et al. Jul 2010 A1
20100176935 Phillips Jul 2010 A1
20100185545 Royyuru Jul 2010 A1
20100186073 Curtis Jul 2010 A1
20100191613 Raleigh Jul 2010 A1
20100199089 Vysogorets Aug 2010 A1
20100211505 Saunders Aug 2010 A1
20100223184 Perlman Sep 2010 A1
20100223186 Hogan Sep 2010 A1
20100228668 Hogan Sep 2010 A1
20100235284 Moore Sep 2010 A1
20100257102 Perlman Oct 2010 A1
20100258620 Torreyson Oct 2010 A1
20100260388 Garrett Oct 2010 A1
20100274692 Hammad Oct 2010 A1
20100274721 Hammad Oct 2010 A1
20100291904 Musfeldt Nov 2010 A1
20100293189 Hammad Nov 2010 A1
20100293381 Hammad Nov 2010 A1
20100293382 Hammad Nov 2010 A1
20100299267 Faith et al. Nov 2010 A1
20100306076 Taveau Dec 2010 A1
20100318801 Roberge et al. Dec 2010 A1
20100325041 Berardi Dec 2010 A1
20100327054 Hammad Dec 2010 A1
20100332393 Weller et al. Dec 2010 A1
20110010292 Giordano Jan 2011 A1
20110016047 Wu Jan 2011 A1
20110016320 Bergsten Jan 2011 A1
20110040640 Erikson Feb 2011 A1
20110047076 Carlson et al. Feb 2011 A1
20110083018 Kesanupalli Apr 2011 A1
20110087596 Dorsey Apr 2011 A1
20110093397 Carlson Apr 2011 A1
20110106707 Hwang May 2011 A1
20110108623 Hammad May 2011 A1
20110125597 Oder, II May 2011 A1
20110140841 Bona et al. Jun 2011 A1
20110153437 Archer Jun 2011 A1
20110153496 Royyuru Jun 2011 A1
20110153498 Makhotin et al. Jun 2011 A1
20110154466 Harper Jun 2011 A1
20110154467 Bomar et al. Jun 2011 A1
20110161233 Tieken Jun 2011 A1
20110178926 Lindelsee et al. Jul 2011 A1
20110184867 Varadarajan Jul 2011 A1
20110191244 Dai Aug 2011 A1
20110208658 Makhotin Aug 2011 A1
20110238511 Park Sep 2011 A1
20110238573 Varadarajan Sep 2011 A1
20110238579 Coppinger Sep 2011 A1
20110240740 Li et al. Oct 2011 A1
20110246317 Coppinger Oct 2011 A1
20110258111 Raj et al. Oct 2011 A1
20110272471 Mullen Nov 2011 A1
20110272478 Mullen Nov 2011 A1
20110276380 Mullen Nov 2011 A1
20110276381 Mullen Nov 2011 A1
20110276418 Velani Nov 2011 A1
20110276424 Mullen Nov 2011 A1
20110276425 Mullen Nov 2011 A1
20110295745 White Dec 2011 A1
20110302081 Saunders Dec 2011 A1
20110307710 McGuire et al. Dec 2011 A1
20120018506 Hammad et al. Jan 2012 A1
20120018511 Hammad Jan 2012 A1
20120023567 Hammad Jan 2012 A1
20120024946 Tullis et al. Feb 2012 A1
20120028609 Hruska Feb 2012 A1
20120030047 Fuentes et al. Feb 2012 A1
20120031969 Hammad Feb 2012 A1
20120035998 Chien Feb 2012 A1
20120041881 Basu Feb 2012 A1
20120047237 Arvidsson Feb 2012 A1
20120066078 Kingston Mar 2012 A1
20120072350 Goldthwaite Mar 2012 A1
20120078735 Bauer Mar 2012 A1
20120078798 Downing Mar 2012 A1
20120078799 Jackson Mar 2012 A1
20120095852 Bauer Apr 2012 A1
20120095865 Doherty Apr 2012 A1
20120116902 Cardina May 2012 A1
20120116976 Hammad et al. May 2012 A1
20120123882 Carlson May 2012 A1
20120123940 Killian May 2012 A1
20120129514 Beenau May 2012 A1
20120143754 Patel Jun 2012 A1
20120143767 Abadir Jun 2012 A1
20120143772 Abadir Jun 2012 A1
20120153028 Poznansky Jun 2012 A1
20120158580 Eram Jun 2012 A1
20120158593 Garfinkle Jun 2012 A1
20120173431 Ritchie Jul 2012 A1
20120185386 Salama Jul 2012 A1
20120197807 Schlesser Aug 2012 A1
20120203664 Torossian Aug 2012 A1
20120203666 Torossian Aug 2012 A1
20120215688 Musser Aug 2012 A1
20120215696 Salonen Aug 2012 A1
20120221421 Hammad Aug 2012 A1
20120226582 Hammad Sep 2012 A1
20120231844 Coppinger Sep 2012 A1
20120233004 Bercaw Sep 2012 A1
20120246070 Vadhri Sep 2012 A1
20120246071 Jain Sep 2012 A1
20120246079 Wilson et al. Sep 2012 A1
20120265631 Cronic Oct 2012 A1
20120271770 Harris Oct 2012 A1
20120297446 Webb Nov 2012 A1
20120300932 Cambridge Nov 2012 A1
20120303503 Cambridge Nov 2012 A1
20120303961 Kean Nov 2012 A1
20120304273 Bailey Nov 2012 A1
20120310725 Chien Dec 2012 A1
20120310831 Harris Dec 2012 A1
20120316992 Oborne Dec 2012 A1
20120317035 Royyuru Dec 2012 A1
20120317036 Bower Dec 2012 A1
20130017784 Fisher Jan 2013 A1
20130018757 Anderson et al. Jan 2013 A1
20130019098 Gupta Jan 2013 A1
20130031006 McCullagh et al. Jan 2013 A1
20130054337 Brendell Feb 2013 A1
20130054466 Muscato Feb 2013 A1
20130054474 Yeager Feb 2013 A1
20130081122 Svigals Mar 2013 A1
20130091028 Oder, II Apr 2013 A1
20130110658 Lyman May 2013 A1
20130111599 Gargiulo May 2013 A1
20130117185 Collison May 2013 A1
20130124290 Fisher May 2013 A1
20130124291 Fisher May 2013 A1
20130124364 Mittal May 2013 A1
20130138525 Bercaw May 2013 A1
20130144888 Faith Jun 2013 A1
20130145148 Shablygin Jun 2013 A1
20130145172 Shablygin Jun 2013 A1
20130159178 Colon Jun 2013 A1
20130159184 Thaw Jun 2013 A1
20130166402 Parento Jun 2013 A1
20130166456 Zhang Jun 2013 A1
20130173736 Krzeminski Jul 2013 A1
20130185202 Goldthwaite Jul 2013 A1
20130191227 Pasa et al. Jul 2013 A1
20130191286 Cronic Jul 2013 A1
20130191289 Cronic Jul 2013 A1
20130198071 Jurss Aug 2013 A1
20130198080 Anderson et al. Aug 2013 A1
20130200146 Moghadam Aug 2013 A1
20130204787 Dubois Aug 2013 A1
20130204793 Kerridge Aug 2013 A1
20130212007 Mattsson Aug 2013 A1
20130212017 Bangia Aug 2013 A1
20130212019 Mattsson Aug 2013 A1
20130212024 Mattsson Aug 2013 A1
20130212026 Powell et al. Aug 2013 A1
20130212666 Mattsson Aug 2013 A1
20130218698 Moon Aug 2013 A1
20130218769 Pourfallah et al. Aug 2013 A1
20130226799 Raj Aug 2013 A1
20130226802 Hammad et al. Aug 2013 A1
20130226813 Voltz Aug 2013 A1
20130246199 Carlson Sep 2013 A1
20130246202 Tobin Sep 2013 A1
20130246203 Laracey Sep 2013 A1
20130246258 Dessert Sep 2013 A1
20130246259 Dessert Sep 2013 A1
20130246261 Purves et al. Sep 2013 A1
20130246267 Tobin Sep 2013 A1
20130254028 Salci Sep 2013 A1
20130254052 Royyuru Sep 2013 A1
20130254102 Royyuru Sep 2013 A1
20130254117 Von Mueller Sep 2013 A1
20130262296 Thomas Oct 2013 A1
20130262302 Lettow Oct 2013 A1
20130262315 Hruska Oct 2013 A1
20130262316 Hruska Oct 2013 A1
20130262317 Collinge Oct 2013 A1
20130275300 Killian Oct 2013 A1
20130275307 Khan Oct 2013 A1
20130275308 Paraskeva Oct 2013 A1
20130282502 Jooste Oct 2013 A1
20130282575 Mullen Oct 2013 A1
20130282588 Hruska Oct 2013 A1
20130297501 Monk et al. Nov 2013 A1
20130297504 Nwokolo Nov 2013 A1
20130297508 Belamant Nov 2013 A1
20130304649 Cronic Nov 2013 A1
20130308778 Fosmark Nov 2013 A1
20130311382 Fosmark Nov 2013 A1
20130317982 Mengerink Nov 2013 A1
20130332344 Weber Dec 2013 A1
20130339253 Sincai Dec 2013 A1
20130346305 Mendes Dec 2013 A1
20130346314 Mogollon Dec 2013 A1
20140007213 Sanin Jan 2014 A1
20140013106 Redpath Jan 2014 A1
20140013114 Redpath Jan 2014 A1
20140013452 Aissi et al. Jan 2014 A1
20140019352 Shrivastava Jan 2014 A1
20140025581 Calman Jan 2014 A1
20140025585 Calman Jan 2014 A1
20140025958 Calman Jan 2014 A1
20140032417 Mattsson Jan 2014 A1
20140032418 Weber Jan 2014 A1
20140040137 Carlson Feb 2014 A1
20140040139 Brudnicki Feb 2014 A1
20140040144 Plomske Feb 2014 A1
20140040145 Ozvat Feb 2014 A1
20140040148 Ozvat Feb 2014 A1
20140040628 Fort Feb 2014 A1
20140041018 Bomar Feb 2014 A1
20140046853 Spies Feb 2014 A1
20140047551 Nagasundaram et al. Feb 2014 A1
20140052532 Tsai Feb 2014 A1
20140052620 Rogers Feb 2014 A1
20140052637 Jooste Feb 2014 A1
20140061302 Hammad Mar 2014 A1
20140068706 Aissi Mar 2014 A1
20140074637 Hammad Mar 2014 A1
20140108172 Weber et al. Apr 2014 A1
20140110477 Hammad Apr 2014 A1
20140114857 Griggs et al. Apr 2014 A1
20140143137 Carlson May 2014 A1
20140164243 Aabye et al. Jun 2014 A1
20140188586 Carpenter et al. Jul 2014 A1
20140249945 Gauthier et al. Sep 2014 A1
20140294701 Dai et al. Oct 2014 A1
20140297534 Patterson Oct 2014 A1
20140310183 Weber Oct 2014 A1
20140324690 Allen et al. Oct 2014 A1
20140330721 Wang Nov 2014 A1
20140330722 Laxminarayanan et al. Nov 2014 A1
20140331265 Mozell et al. Nov 2014 A1
20140337236 Wong et al. Nov 2014 A1
20140344153 Raj et al. Nov 2014 A1
20140372308 Sheets Dec 2014 A1
20150019443 Sheets et al. Jan 2015 A1
20150032625 Dill et al. Jan 2015 A1
20150032626 Dill et al. Jan 2015 A1
20150032627 Dill et al. Jan 2015 A1
20150046338 Laxminarayanan et al. Feb 2015 A1
20150046339 Wong et al. Feb 2015 A1
20150052064 Karpenko et al. Feb 2015 A1
20150081544 Schulz et al. Mar 2015 A1
20150088756 Makhotin et al. Mar 2015 A1
20150106239 Gaddam et al. Apr 2015 A1
20150112870 Nagasundaram et al. Apr 2015 A1
20150112871 Kumnick Apr 2015 A1
20150120472 Aabye et al. Apr 2015 A1
20150127529 Makhotin et al. May 2015 A1
20150127547 Powell et al. May 2015 A1
20150134537 Hammad May 2015 A1
20150134540 Law et al. May 2015 A1
20150140960 Powell et al. May 2015 A1
20150142673 Nelsen et al. May 2015 A1
20150161597 Subramanian et al. Jun 2015 A1
20150178724 Ngo et al. Jun 2015 A1
20150180836 Wong et al. Jun 2015 A1
20150186864 Jones et al. Jul 2015 A1
20150193222 Pirzadeh et al. Jul 2015 A1
20150195133 Sheets et al. Jul 2015 A1
20150199679 Palanisamy et al. Jul 2015 A1
20150199689 Kumnick et al. Jul 2015 A1
20150220917 Aabye et al. Aug 2015 A1
20150269566 Gaddam et al. Sep 2015 A1
20150278799 Palanisamy Oct 2015 A1
20150287037 Salmon et al. Oct 2015 A1
20150312038 Palanisamy Oct 2015 A1
20150317625 Hammad Nov 2015 A1
20150319158 Kumnick Nov 2015 A1
20150324736 Sheets et al. Nov 2015 A1
20150332262 Lingappa Nov 2015 A1
20150356560 Shastry et al. Dec 2015 A1
20150363781 Badenhorst Dec 2015 A1
20150379515 Hammad et al. Dec 2015 A1
20160028550 Gaddam et al. Jan 2016 A1
20160036790 Shastry et al. Feb 2016 A1
20160042263 Gaddam et al. Feb 2016 A1
20160065370 Le Saint et al. Mar 2016 A1
20160092696 Guglani et al. Mar 2016 A1
20160092872 Prakash et al. Mar 2016 A1
20160092874 O'Regan et al. Mar 2016 A1
20160103675 Aabye et al. Apr 2016 A1
20160109954 Harris et al. Apr 2016 A1
20160119296 Laxminarayanan et al. Apr 2016 A1
20160132878 O'Regan et al. May 2016 A1
20160140545 Flurscheim et al. May 2016 A1
20160148197 Dimmick May 2016 A1
20160148212 Dimmick May 2016 A1
20160171479 Prakash et al. Jun 2016 A1
20160173483 Wong et al. Jun 2016 A1
20160197725 Hammad Jul 2016 A1
20160210628 McGuire Jul 2016 A1
20160217461 Gaddam et al. Jul 2016 A1
20160218875 Le Saint et al. Jul 2016 A1
20160224976 Basu et al. Aug 2016 A1
20160224977 Sabba et al. Aug 2016 A1
20160232527 Patterson Aug 2016 A1
20160239842 Cash et al. Aug 2016 A1
20160269391 Gaddam et al. Sep 2016 A1
20160275501 Hammad Sep 2016 A1
20160308995 Youdale et al. Oct 2016 A1
20160371683 Maus et al. Dec 2016 A1
20160371688 Hammad Dec 2016 A1
20160379217 Hammad Dec 2016 A1
20170046696 Powell et al. Feb 2017 A1
20170076288 Awasthi Mar 2017 A1
20170103387 Weber Apr 2017 A1
20170109745 Al-Bedaiwi et al. Apr 2017 A1
20170116596 Tsui et al. Apr 2017 A1
20170148013 Rajurkar et al. May 2017 A1
20170163617 Laxminarayanan et al. Jun 2017 A1
20170163629 Law et al. Jun 2017 A1
20170186001 Reed et al. Jun 2017 A1
20170200156 Karpenko et al. Jul 2017 A1
20170200165 Laxminarayanan et al. Jul 2017 A1
20170201520 Chandoor et al. Jul 2017 A1
20170220818 Nagasundaram et al. Aug 2017 A1
20170221054 Flurscheim et al. Aug 2017 A1
20170221056 Karpenko et al. Aug 2017 A1
20170228723 Taylor et al. Aug 2017 A1
20170228728 Sullivan Aug 2017 A1
20170236113 Chitalia et al. Aug 2017 A1
20170293914 Girish et al. Oct 2017 A1
20170295155 Wong Oct 2017 A1
20170300884 Hammad Oct 2017 A1
20170337549 Wong Nov 2017 A1
20170364903 Lopez Dec 2017 A1
20170364914 Howard Dec 2017 A1
20170373852 Cassin et al. Dec 2017 A1
20180005238 Hammad Jan 2018 A1
20180006821 Kinagi Jan 2018 A1
20180075081 Chipman Mar 2018 A1
20180247303 Raj et al. Aug 2018 A1
20180262334 Hammad Sep 2018 A1
20180268399 Spector et al. Sep 2018 A1
20180268405 Lopez Sep 2018 A1
20180285875 Law et al. Oct 2018 A1
20180308095 Hammad Oct 2018 A1
20180315050 Hammad Nov 2018 A1
20180324184 Kaja et al. Nov 2018 A1
20180324584 Lopez Nov 2018 A1
20190020478 Girish et al. Jan 2019 A1
20190066069 Faith et al. Feb 2019 A1
20190147439 Wang et al. May 2019 A1
20190303915 Hammad Oct 2019 A1
20190356489 Palanisamy Nov 2019 A1
20190384896 Jones Dec 2019 A1
20190392431 Chitalia et al. Dec 2019 A1
20200151690 Hammad May 2020 A1
20200267153 Kang et al. Aug 2020 A1
20200314644 Dean et al. Oct 2020 A1
Foreign Referenced Citations (76)
Number Date Country
0308951 Jan 2005 BR
2604348 Sep 2006 CA
2449748 Nov 2012 CA
101110113 Jan 2008 CN
101211436 Jul 2008 CN
101485128 Jul 2009 CN
101512957 Aug 2009 CN
101582121 Nov 2009 CN
103270524 Aug 2013 CN
11495 Apr 2009 EA
1028401 Aug 2000 EP
1168265 Jan 2002 EP
1840814 Oct 2007 EP
2098985 Sep 2009 EP
2156397 Feb 2010 EP
2459850 Nov 2009 GB
2006350593 Dec 2006 JP
2008210370 Sep 2008 JP
1020000054496 Sep 2000 KR
1020030020189 Mar 2003 KR
10-2005-0019674 Mar 2005 KR
1020060022304 Mar 2006 KR
10-2006-0096821 Sep 2006 KR
1020060111200 Oct 2006 KR
1020070100076 Oct 2007 KR
1020080026802 Mar 2008 KR
10-2008-0039330 May 2008 KR
10-2008-0051198 Jun 2008 KR
1020090021388 Mar 2009 KR
10-2009-0044619 May 2009 KR
1020100110642 Oct 2010 KR
2252451 May 2005 RU
2331110 Aug 2008 RU
2011148229 Jun 2013 RU
0014648 Mar 2000 WO
0116900 Mar 2001 WO
0117296 Mar 2001 WO
0135304 May 2001 WO
0184509 Nov 2001 WO
0188785 Nov 2001 WO
0201520 Jan 2002 WO
2001035304 May 2002 WO
2002059727 Aug 2002 WO
03047208 Jun 2003 WO
03073389 Sep 2003 WO
03075192 Sep 2003 WO
2004042536 May 2004 WO
2004051585 Jun 2004 WO
2005001618 Jan 2005 WO
2005001635 Jan 2005 WO
2005001751 Jan 2005 WO
2005073931 Aug 2005 WO
2005109360 Nov 2005 WO
2006028488 Mar 2006 WO
2006099294 Sep 2006 WO
2006113834 Oct 2006 WO
2008014554 Feb 2008 WO
2009003030 Dec 2008 WO
2009025605 Feb 2009 WO
2009032523 Mar 2009 WO
09052634 Apr 2009 WO
2009136404 Dec 2009 WO
2010078522 Jul 2010 WO
2010129357 Nov 2010 WO
2011057007 May 2011 WO
2011031988 Jul 2011 WO
2012054763 Apr 2012 WO
2012058309 May 2012 WO
2012068078 May 2012 WO
2012098556 Jul 2012 WO
2012142370 Oct 2012 WO
2012167941 Dec 2012 WO
2013048538 Apr 2013 WO
2013056104 Apr 2013 WO
2013119914 Aug 2013 WO
2013179271 Dec 2013 WO
Non-Patent Literature Citations (78)
Entry
Office Action dated Jun. 9, 2020 in U.S. Appl. No. 16/028,941, 15 pages.
U.S. Appl. No. 16/745,161, Non-Final Office Action, dated Sep. 16, 2020, 11 pages.
International Search Report dated May 27, 2011 from International Patent Application No. PCT/US2010/055500.
International Search Report of the International Searching Authority for Application No. PCT/US2010/048455, dated May 30, 2011, 4 pages.
International Written Opinion of the International Searching Authority for Application No. PCT/US2010/048455, dated May 30, 2011, 5 pages.
“2.4.2 How VISA Card Verification Values are Used,” 2.4.2 “z/OS V1R3.0 ICSF Application Programmer's Guide” IBM Library Server, 1 page, © Copyright IBM Corp. 1997, 2002, downloaded Mar. 27, 2012 from URL: http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/CSFB4Z20/2.4.2?SHEL.
Reisinger, D., “PayPal offers SMS security key for mobile users,” Nov. 24, 2008, pp. 1-3, © Copyright CBS Interactive, downloaded Mar. 27, 2012 from URL: http://news.cnet/com/8301-17939_1209-10106410-2.html.
International Search Report for Application No. PCT/US2010/032825, dated Dec. 1, 2010, 3 pages.
International Written Opinion for Application No. PCT/US2010/032825, dated Dec. 1, 2010, 6 pages.
U.S. Appl. No. 12/778,446, filed Oct. 29, 2009, Perlman, 48 pages.
U.S. Appl. No. 12/778,459, filed Oct. 29, 2009, Perlman, 48 pages.
U.S. Appl. No. 12/778,485, filed Oct. 29, 2009, Perlman et al., 49 pages.
U.S. Appl. No. 12/939,963, filed Nov. 4, 2010, Hammad et al., 105 pages.
U.S. Appl. No. 61/061,936, filed Jun. 16, 2008, Manessis, 12 pages.
U.S. Appl. No. 61/112,124, filed Nov. 6, 2008, Weller et al., 61 pages.
U.S. Appl. No. 61/178,636, filed May 15, 2009, Hammad, 58 pages.
U.S. Appl. No. 61/256,095, filed Oct. 29, 2009, Perlman, 40 pages.
U.S. Appl. No. 61/256, 136, filed Oct. 29, 2009, Perlman, 64 pages.
U.S. Appl. No. 61/256,141, filed Oct. 29, 2009, Perlman, 38 pages.
U.S. Appl. No. 61/256,143, filed Oct. 29, 2009, Perlman et al., 29 pages.
U.S. Appl. No. 61/256,147, filed Oct. 29, 2009, Perlman, 41 pages.
U.S. Appl. No. 61/258,194, filed Nov. 4, 2009, Hammad, 147 pages.
European Examination Report dated Nov. 11, 2016 in EP 10772579.8, 8 pages.
Security Concerns Usher in Disposable Credit Cards, Credit Card News, Sep. 15, 2000, 1 page.
Petition for Inter Partes Review of U.S. Pat. No. 8,533,860 Challenging Claims 1-30 Under 35 U.S.C. § 312 and 37 C.F.R. § 42.104, Before the USPTO Patent Trial and Appeal Board, IPR 2016-00600, Feb. 17, 2016, 65 pages.
U.S. Appl. No. 14/600,523, Titled—Secure Ayment Processing Using Authorization Request filed on Jan. 20, 2015.
U.S. Appl. No. 15/008,388, Titled—Methods For Secure Credential Provisioning filed on Jan. 27, 2016.
U.S. Appl. No. 15/011,366, Titled—Token Check Offline filed on Jan. 29, 2016.
U.S. Appl. No. 15/019,157, Titled—Token Processing Utilizing Multiple Authorizations filed on Feb. 9, 2016.
U.S. Appl. No. 15/041,495, Titled—Peer Forward Authorization of Digital Requests filed on Feb. 11, 2016.
U.S. Appl. No. 61/738,832, Titled—Management of Sensitive Data filed on Dec. 18, 2012.
U.S. Appl. No. 61/751,763, Titled—Payments Bridge filed on Jan. 11, 2013.
U.S. Appl. No. 61/879,362, Titled—Systems and Methods for Managing Mobile Cardholder Verification Methods filed on Sep. 18, 2013.
U.S. Appl. No. 61/892,407, Titled—Issuer Over-The-Air Update Method and System filed on Oct. 17, 2013.
U.S. Appl. No. 61/894,749, Titled—Methods and Systems for Authentication and Issuance of Tokens in a Secure Environment filed on Oct. 23, 2013.
U.S. Appl. No. 61/926,236, Titled—Methods and Systems for Provisioning Mobile Devices With Payment Credentials and Payment Token Identifiers filed on Jan. 10, 2014.
U.S. Appl. No. 62/000,288, Titled—Payment System Canonical Address Format filed on May 19, 2014.
U.S. Appl. No. 62/003,717, Titled—Mobile Merchant Application filed on May 28, 2014.
U.S. Appl. No. 62/024,426, Titled—Secure Transactions Using Mobile Devices filed on Jul. 14, 2014.
U.S. Appl. No. 62/037,033, Titled—Sharing Payment Token filed on Aug. 13, 2014.
U.S. Appl. No. 62/038,174, Titled—Customized Payment Gateway filed on Aug. 15, 2014.
U.S. Appl. No. 62/042,050, Titled—Payment Device Authentication and Authorization System filed on Aug. 26, 2014.
U.S. Appl. No. 62/053,736, Titled—Completing Transactions Without a User Payment Device filed on Sep. 22, 2014.
U.S. Appl. No. 62/054,346, Titled—Mirrored Token Vault filed on Sep. 23, 2014.
U.S. Appl. No. 62/103,522, Titled—Methods and Systems for Wallet Provider Provisioning filed on Jan. 14, 2015.
U.S. Appl. No. 62/108,403, Titled—Wearables With NFC HCE filed on Jan. 27, 2015.
U.S. Appl. No. 62/117,291, Titled—Token and Cryptogram Using Transaction Specific Information filed on Feb. 17, 2015.
U.S. Appl. No. 62/128,709, Titled—Tokenizing Transaction Amounts filed on Mar. 5, 2015.
Gillick, Global Platform, Trusted Execution Environment (TEE) Guide, https://web.archive.org/web/20120212221931/http://www.globalplatform.org/mediaguidetee.asp, Feb. 12, 2012.
Notice of Allowance dated Mar. 1, 2016 in U.S. Appl. No. 13/411,400, 11 pages.
Office Action dated Aug. 28, 2015 in U.S. Appl. No. 13/411,400,19 pages.
Notice of Allowance dated Jun. 15, 2016 in U.S. Appl. No. 14/511,034, 7 pages.
Office Action dated Aug. 25, 2016 in U.S. Appl. No. 14/681,668, 13 pages.
Notice of Allowance dated Jun. 15, 2017 in U.S. Appl. No. 14/732,294, 9 pages.
Office Action dated Apr. 20, 2017 in U.S. Appl. No. 14/681,668, 14 pages.
Office Action dated Jul. 14, 2017 in U.S. Appl. No. 15/070,446, 8 pages.
Notice of Allowance dated Feb. 12, 2018 in U.S. Appl. No. 15/070,446, 10 pages.
U.S. Appl. No. 16/745,161 , Notice of Allowance, dated Jan. 11, 2021, 12 pages.
U.S. Appl. No. 15/252,595 , Notice of Allowance, dated Jan. 27, 2020, 10 pages.
U.S. Appl. No. 16/446,984 , Notice of Allowance, dated Jul. 21, 2020, 11 pages.
U.S. Appl. No. 16/024,323 , Final Office Action, dated Nov. 29, 2021, 37 pages.
U.S. Appl. No. 16/024,323 , “Non-Final Office Action”, dated Feb. 18, 2022, 25 pages.
U.S. Appl. No. 16/269,222 , “Advisory Action”, dated May 19, 2022, 5 pages.
U.S. Appl. No. 16/269,222 , “Non-Final Office Action”, dated Jun. 15, 2022, 21 pages.
U.S. Appl. No. 16/950,186 , “Non-Final Office Action”, dated May 12, 2022, 9 pages.
U.S. Appl. No. 16/024,323 , Notice of Allowance, dated Sep. 21, 2022, 13 pages.
U.S. Appl. No. 16/950,186 , Final Office Action, dated Oct. 27, 2022, 10 pages.
U.S. Appl. No. 16/950,186 , Non-Final Office Action, dated Feb. 17, 2023, 9 pages.
U.S. Appl. No. 16/950,186 , Final Office Action, dated Aug. 3, 2023, 11 pages.
Cai, et al., “Authorization Mechanisms for Mobile Commerce Implementations in Enhanced Prepaid Solutions,” Bell Labs Technical Journal, 2004, vol. 8(4), pp. 121-131.
Ratha, et al., “Enhancing Security and Privacy in Biometrics-Based Authentication Systems,” IBM Systems Journal, 2001, vol. 40, No. 3.
Varshney, Upkar, “Supporting Group-Oriented Mobile Services Transactions,” IT Pro, Nov.-Dec. 2007, pp. 10-15.
English Translation of JP2006350593, Anticounterfeit System for Credit Card or Cash Card Using Anticounterfeit Code, and Anticounterfeit Method,: 2006.
Office Action mailed Jun. 14, 2021 in U.S. Appl. No. 16/024,323, filed Jun. 29, 2018, 28 pages.
U.S. Appl. No. 15/070,446, Non-Final Office Action mailed on Dec. 16, 2016, 7 pages.
U.S. Appl. No. 15/258,258, Non-Final Office Action mailed on Aug. 23, 2017, 9 pages.
U.S. Appl. No. 16/311,144, Titled—Encryption Key Exchange Process Using Access Device filed on Dec. 18, 2018.
U.S. Appl. No. 16/347,175, Titled—Access Identifier Provisioning to Application filed on May 2, 2019.
Related Publications (1)
Number Date Country
20190172048 A1 Jun 2019 US
Divisions (1)
Number Date Country
Parent 13413484 Mar 2012 US
Child 16269222 US