In today's electronic commerce environment, a user typically accesses a merchant's website to purchase a product. The user then typically enters a payment identity (e.g., credit card) to pay for the purchase. Merchants typically store payment identities for many different users, and some merchants willingly store multiple payment identities for each user, thereby creating large databases of payment identities vulnerable to security breaches.
In the following detailed description, reference is made to the accompanying drawings that show, by way of illustration, various embodiments of an invention. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention. It is to be understood that the various embodiments of the invention, although different, are not necessarily mutually exclusive. For example, a particular feature, structure, or characteristic described in connection with one embodiment may be implemented within other embodiments without departing from the scope of the invention. In addition, it is to be understood that the location or arrangement of individual elements within each disclosed embodiment may be modified without departing from the scope of the invention. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope of the present invention is defined only by the appended claims, appropriately interpreted, along with the full range of equivalents to which the claims are entitled. In the drawings, like numerals refer to the same or similar functionality throughout the several views.
After receiving a login request, electronic banking system 120 authenticates the user. In some embodiments, authentication is performed using a username and password, and in other embodiments, authentication also detects the presence of a hardware token present at the electronic banking user. For example, authentication may require that a user's electronic device have a smartcard secure element that is mapped to that user's identity. The smartcard secure element may be resident in the user's electronic device or may be resident on removable media. For example, in some embodiments, a smartcard secure element may be resident on a microSD memory card that is inserted in a memory card slot of the user's electronic device.
Electronic banking system 120 is an example of an electronic financial application that accepts user logins and interfaces with a financial institution (FI). As shown in
When a user is logged in to electronic banking system 120, one or more products are made available for in-application purchase from one or more merchants. When the user makes an in-application purchase, electronic banking system 120 sends a message to the user's financial institution banking core 130. Message to the banking core 130 can happen directly from the electronic banking system 120 or indirectly through other electronic banking systems depending on the implementation within a given financial institution. In response, funds are transferred from the user's account 132 at the financial institution to an intermediate account 134 at the same financial institution. In some embodiments, the intermediate account is not owned or controlled by the merchant from whom a purchase is being made. Electronic banking system 120 also sends a message to the merchant 140. In response to the message to the merchant, the merchant effects a transfer of funds from a guaranteed account 154 to the merchant's account 152 at the merchant's financial institution 150. Message to the banking core 150 can happen directly from the merchant 140 or indirectly through other electronic banking systems depending on the implementation within a given financial institution.
For each in-application purchase made by the user, an appropriate amount is debited from the user's account 132, and an appropriate amount is credited to the merchant's account 152, although there is no direct transfer from the user to the merchant. The two amounts may or may not be equal. For example, the amount credited to the merchant account might be less than the amount debited from the user's account 132. The difference may be credited to one or more financial institutions or to one or more service providers to pay for the in-application commerce service.
Funds sufficient to cover expected in-application purchases are maintained in guaranteed account 154. In some embodiments, these funds are maintained by a service provider that also provides the electronic banking system 120. Merchants are paid in real-time from the guaranteed account, and user's pay in real-time into the intermediate account. Settlement between the intermediate account 134 and the guaranteed account 154 are performed in non-real-time. For example, settlement may occur nightly, weekly, or on any other schedule.
By using electronic banking system 120 with in-application commerce, payment identities (e.g., credit card info) need not be replicated at merchants because the user's financial institution effects payment from the user's account directly, and the merchant is paid from a guaranteed account at its own financial institution. Further, traditional payment networks that charge for real-time settlement are also not necessary.
Merchant 140 may fulfill the order in any manner without departing from the scope of the present invention. For example, physical goods may be shipped to an address specified by the user. Also for example, electronic goods (e.g., coupons, vouchers, gift cards) may be sent electronically to any entity specified by the user, including the user himself.
In some embodiments, the intermediate account 134 and the guaranteed account 154 are owned or controlled by the entity providing electronic banking service 120. For example, a provider of electronic banking services may also fund one or more guaranteed accounts 154 at different financial institutions to pay merchants. Also for example, the provider of electronic banking services may also perform the non-real-time settlement between the intermediate account 134 and guaranteed account 154.
Electronic banking system 120 also sends a message to a consolidator 240 alerting the consolidator that the user made three purchases and requesting the consolidator to transfer funds from the guaranteed account 254 to the consolidator's account 252 at the consolidator's financial institution. The consolidator can then make real-time or offline or have already made in advance payments to the merchants in order to fulfill the purchases depending on their agreement with each of the merchants.
As used herein, the term “consolidator” refers to an entity that provides a service to consolidate interfaces from multiple merchants into one virtual merchant (the consolidator). For example, consolidator 240 may provide an application programming interface (API) to electronic banking system 120 that allows purchases from multiple merchants using one interface.
For example, electronic banking system may accept and authenticate logins from multiple users 110 for or one or more user financial institutions. Each user financial institution maintains one intermediate account 134, and when purchases are made, funds are transferred from user accounts 132 to the intermediate account 134. Further, any user at any user financial institution may make in-application purchases from any merchant 380 using any consolidator 332.
In embodiments represented by
For example, the user financial institution may accept and authenticate logins from users, perform funds transfers between user accounts and an intermediate account, and send messages to merchants and/or consolidators. In some embodiments the FI banking core 130 or the electronic banking system 120 or both maybe hosted outside the user's FI by a third party on behalf of the user's FI.
In some embodiments, electronic financial system 600 is embodied as electronic banking system 120 hosted at a financial institution as shown in
Processor 610 may include any type of processor or computer suitable to perform the functions described herein. For example, processor 610 may include a special purpose computer, or a general purpose computer that is programmed to perform as described. Memory 620 may include any type of electronic storage. For example, memory 620 may include random access memory RAM, read only memory (ROM), or any combination.
Interfaces 630 may include any type of interfaces. For example, in some embodiments, interfaces 630 include one or more network interfaces that are capable of communicating with financial institutions, merchants, and/or consolidators.
Computer readable medium 640 represents any type of medium capable of storing instructions, that when accessed by processor 610, result in the processor performing as described herein. For example, computer readable medium 640 may include any volatile or nonvolatile storage medium, including but not limited to: memory devices, magnetic disks, or optical disks.
As shown in
In some embodiments, electronic financial system 700 is embodied as electronic banking system 120 hosted at a financial institution as shown in
The various components of electronic financial system 700 may be implemented in any manner without departing from the scope of the present invention. For example, a general purpose computer system may be programmed to embody the components shown in
Component 710 accepts logins and authenticates users. Referring back to
Component 720 receives in-application purchase requests made by users. For example, a user may request to buy a physical product or a virtual coupon or gift card from within a web application or a thick application downloaded on the user's electronic equipment.
Component 730 transfers funds (or requests a funds transfer) from a user's account to an intermediate account as described with reference to
Messaging component 740 sends message(s) to a merchant or consolidator to request fulfillment of the in-application purchase. In response to the message, the merchant or consolidator transfers funds from a guaranteed account and then fulfills the order.
Notification/Delivery component 750 notifies the purchaser that the order had been fulfilled, or alternatively, delivers an electronic product. For example, the user may purchase a physical good that is to be shipped, and in these embodiments, component 750 notifies the user that the order has been fulfilled, and that the goods will be shipped. Also for example, the user may purchase an electronic product such as a voucher or coupon, and in these embodiments, component 750 may deliver the electronic product in the form of an email message or other notification. In some embodiments, component 750 is omitted. For example, a merchant may directly notify the user of a successful purchase.
In some embodiments, mobile phone 800 includes a secure element built in to the phone. For example, a smartcard secure element may be an integral part of the hardware of the phone either on the printed circuit board or inside the processor chip. In other embodiments, mobile phone 800 may include a secure element within a subscriber identity module (SIM) card that is inserted in the phone. In still further embodiments, mobile phone 800 may accept a microSD memory card 810 that includes a smartcard secure element.
In some embodiments, mobile phone 800 includes a near field communications (NFC) radio built in to the phone. For example, an NFC radio and antenna may be an integral part of the hardware of the phone. In other embodiments, mobile phone 800 may include an NFC radio within a subscriber identity module (SIM) card that is inserted in the phone. In still further embodiments, mobile phone 800 may accept a microSD memory card 810 that includes an NFC radio with or without a built-in antenna.
The use of a smartcard secure element (e.g., built-in embedded on the printed circuit board, built-in integrated inside the processor, on SIM card, or on microSD card or any other add-on form factor) may provide layered security. For example, without the smartcard secure element, authentication may only include the verification of a username and password. When the smartcard secure element is present, additional “layered” security may be provided by verifying the presence of the secure element. For example, in some embodiments, microSD card 810 may have a smartcard secure element that uniquely identifies a user, thereby providing additional assurances that the user is authentic.
The use of an NFC radio in combination with a smartcard secure element may allow for redemption of purchases at a point of sale. For example, a user may purchase a coupon or a gift card that may be redeemed by passing the phone with secure element and NFC radio near an appropriately equipped point of sale device. An example of combination secure element and NFC radio is the “SmartMX” family of controllers available from NXP Semiconductors N.V. of The Netherlands.
As shown in
As shown in
User 110 performs in-application purchases of gift cards, and funds are transferred from the user's account at the user's financial institution to an intermediate account that does not belong to a merchant. Consolidator 240 is sent a message to fulfill the gift card orders, and then consolidator 240 communicates with merchants 380, which then fulfill the orders by sending electronic indicia of the gift cards to the user.
The electronic indicia may be any indicia that enable use of a gift card. For example, an email with a gift card redemption code may be sent. Also for example, a one dimensional or multi-dimensional bar code may be sent. In still further examples, a quick response (QR) code may be sent. The QR code may identify a web address that houses a gift card, or the gift information may be directly encoded in the QR code.
In some embodiments, a smartcard secure element identity is provided as the electronic gift card indicia. For example, a secure element applet that may be used in near field communications (NFC) transaction at a point of sale may be provided to the user and loaded in a smartcard secure element. The smartcard secure element may be resident in the phone, on a SIM card, on a microSD card, or the like.
Although
The gift card purchases shown in
The example financial application shown in
As shown in the example displays in
Method 2000 begins at 2010 in which a user logs in to a mobile banking application at a financial institution using a mobile device. In some embodiments, the financial institution authenticates the user using only a username and password. In other embodiments, the financial institution authenticates the user using layered security by verifying the presence of a secure element at the user's electronic device.
At 2020, the user requests a gift card purchase from a merchant from within the mobile banking application. This may correspond to a user interacting with the example mobile device displays shown in
At 2030, money is transferred from the user's account at the financial institution to an account at the financial institution belonging to an entity other than the merchant. This corresponds to the transfer of funds to the intermediate account shown in
At 2040, electronic indicia of the gift card purchase is received at the mobile device. In some embodiments, the electronic indicia includes an email, a bar code, a QR code, or a smartcard secure element identity. Examples of electronic gift card indicia are shown in
Utilizing method 2000, a user may purchase and maintain any number of gift cards on a mobile device without divulging any payment identities to merchants when purchasing. Further, in some embodiments, gift cards are sent to individuals other than the user making the purchase.
Method 2100 begins at 2110 in which a user that logs in to an electronic financial application is authenticated. This corresponds to electronic banking system 120 authenticating user 110. Authentication may be performed with only a username and password, or authentication may be more robust using layered security as described above.
At 2120, a request is received from a user to purchase an item from a merchant, where the purchase is made by the user from within the electronic financial application. The item to be purchased may be a physical good or a virtual good.
At 2130, money is transferred within a single financial institution from an account belonging to the user to an account belonging to an entity other than the merchant. In some embodiments, this corresponds to the user's financial institution transferring user funds to an intermediate account as shown in
At 2140, a message is sent outside the single financial institution to request that the merchant fulfill the purchased item. In some embodiments, this corresponds to sending a message directly to the merchant as shown in
Method 2200 begins at 2210 in which a user that logs in to an electronic financial application is authenticated. This corresponds to electronic banking system 120 authenticating user 110. Authentication may be performed with only a username and password, or authentication may be more robust using layered security as described above.
At 2220, a request is received from a user to purchase an item from a merchant, where the purchase is made by the user from within the electronic financial application. The item to be purchased may be a physical good or a virtual good.
At 2230, a message is sent to transfer money from an account at a financial institution belonging to the user to an account at the financial institution belonging to an entity other than the merchant. In some embodiments, this corresponds to electronic banking system 120 sending a message to a user's financial institution requesting the transfer of user funds to an intermediate account as shown in
At 2240, a message is sent to request that the merchant fulfill the purchased item. In some embodiments, this corresponds to sending a message directly to the merchant as shown in
Secure application 2350 holds information regarding multiple merchant accounts. As used herein, the term “merchant account” refers to any type of closed loop merchant card, gift card, prepaid card, stored value card, or the like. For example the gift cards described above with reference to
Secure application 2350 may be implemented in hardware, software, or any combination. For example, as described below with reference to
Electronic indicia 2340 is any indicia that allows the communication of merchant account information. For example, in some embodiments, electronic indicia 2340 may be a display device showing a QR code or bar code. In other embodiments, as described below with reference to
Mobile device radio 2310 is a communications radio that allows the mobile device to login to an electronic financial application as described above. For example, mobile device radio 2310 may be a cell phone radio that allows a user to login to an electronic banking application as described above. Instant top-up component 2330 is an optional component that provides for funding, or “topping up” one or more of merchant accounts without user involvement. Various scenarios of instant top-up are described below. In operation, a user may manually top-up one or more merchant accounts, or instant top-up component 2330 may top up a merchant account as needed when making purchases.
Secure element 2450 holds multiple merchant accounts, and NFC radio 2440 communicates information regarding the merchant accounts when antenna 2442 is in the near field of a NFC point of sale device. In some embodiments, a merchant account is instantly topped up when NFC radio 2440 communicates with a point of sale device to make payment for a purchase. Any of the in-application commerce methods described above may be used to top up a merchant account. For example, if merchant account 1 is to be used for payment, then instant top-up component 2330 may communicate with an electronic financial application to request funding of a particular merchant account. In response, the user's account is debited, the intermediate account is credited, the guaranteed account is debited, and the consolidator/merchant account is credited. In some embodiments, the amount debited from the user's account is the exact amount of the purchase.
In
Various combinations of communications using electronic indicia are employed in different embodiments of the invention. For example, a user device may scan a QR code (on a POS or elsewhere) to alert the user device which merchant account to use, and then the user may effect payment using NFC. Further, the user may manually top up the merchant card, or may allow instant top-up at the point of sale.
Payment network system 2800 includes authentication component 2812, user/FI mapping component 2814, and instant top-up component 2816. In operation, authentication component 2810 authenticates a user 2800 with a secure application and then user/FI mapping component maps the user to an account at a financial institution. In some embodiments, this is the account specified during enrollment as described above.
Payment network system 2810 is an example of an electronic financial application that provides for topping up of merchant account. For example, after the user is logged in, the user may request the a particular merchant card be funded or topped up. In some embodiments, the request may occur when the user is at a point of sale, and the request comes without direct user involvement. The merchant account is topped up by transferring funds from the user account to the intermediate account and transferring funds from the guaranteed account to the consolidator/merchant account.
Method 2900 begins at 2910 in which a user device logs in to an electronic financial application. At 2920, the user device communicates with a point of sale device to make a purchase using a merchant account associated with the user. In some embodiments, this corresponds to a user presenting electronic indicia to the point of sale device. Examples of electronic indicia include a QR code, or an NFC signal with merchant account information. At 2930, the user device communicates with the electronic financial application to request a top-up of the merchant account. In some embodiments, this corresponds to user device 2800 requesting payment system network 2810 to top up a merchant card. The top-up request may be automatic as a result of the interaction occurring at the point of sale, or the top-up request may be initiated by the user.
Method 3000 begins at 3010 in which a user that logs in to an electronic financial application is authenticated. At 3020, a secure application is detected at the user device. In some embodiments, the secure application includes a secure element. The secure element may be built in to the user device, or may be in an add-on form factor such as a microSD card.
At 3030, a user account at a financial institution that corresponds to the secure application is determined. In some embodiments, this is performed by user/FI mapping component 2814 (
Method 3100 begins at 3110 in which a user interacts with a check-in device at a merchant to identify a merchant account to be used. In some embodiments, the check-in device may be a poster as the user enters the merchant's location. The poster may have a QR code or an NFC tag or both to identify the merchant. In some embodiments, the user may scan the QR code or tap the NFC tag to have the user device open the financial application and display the merchant card specifics. Further, if the user is not already logged in to the financial application, the user device may automatically log in at this time.
In some embodiments, the check-in device is the point of sale terminal that the user encounters when checking out. The user may scan a QR code at a point of sale, or may tap the user device against an NFC enabled point of sale that serves as the check-in device.
At 3120, the user device provides for top-up of the appropriate merchant account. In some embodiments, this refers to providing the user a screen that displays the current amount on the merchant account and allowing the user to increase the amount by topping up manually. In other embodiments, this refers to an instant top-up component topping up the card at the point of sale.
At 3130, the user interacts with a check-out device at the merchant to effect payment using the merchant account. This corresponds to using some type of electronic indicia to effect payment using the merchant's closed loop system. For example, in some embodiments, this corresponds to a user device displaying a QR code to be scanned by the point of sale device. In other embodiments, this corresponds to a user device communicating with an NFC enabled point of sale device using near field communications.
The check-in device and check-out device described in method 3100 may be in one unit or may be distributed. For example, the check-in device may be near a store entrance and the check out device may be at a point of sale. Further, both the check-in and check-out devices may be at the point of sale while still being separate. Still further, the check-in device and check-out device may be incorporated in one physical unit (e.g., a point of sale device).
Various usage scenarios have been described. In some scenarios, QR codes are used. When a user enters a merchant's place of business, he scans a QR code (check-in) resulting in his user device displaying the merchant's account info. At this point, the user may manually top up his merchant account using the funding mechanisms described above. At the point of sale (check-out), the user presents his user device with electronic indicia (QR code) for payment using the merchant account.
In other scenarios, NFC is used. When the user enters the merchant's place of business, he taps an NFC tag (check-in) resulting in his user device displaying the merchant's account info. At this point, the user may manually top up his merchant account using the funding mechanisms described above, or the user may elect to have instant top-up occur at the point of sale for the amount of the purchase. At the point of sale (check-out), the user taps his user device against the NFC enabled point of sale device and makes payment using the merchant account. If the user elected instant top-up, then the merchant account is instantly funded for the amount of the purchase, and the merchant sees a closed loop transaction using guaranteed funds.
In another scenario using NFC, both check-in and check-out occur at the point of sale largely transparent to the user. For example, a user may approach an NFC enabled point of sale without first having checked in using any other means. When the user taps the user device, the device checks in and determines which merchant account to use. The instant top-up component then tops up the appropriate merchant card for the amount of the purchase, and makes payment (check-out) with the merchant account. This gives the user the ability to make payments at a very large number of merchants using merchant accounts (closed loop transactions) without the necessity of carrying physical prepaid cards for each merchant. These use cases provide for “virtual open loop payment” in part because the user experience approaches that of traditional open loop payment scenarios long employed by the large established payment brands.
Although the present invention has been described in conjunction with certain embodiments, it is to be understood that modifications and variations may be resorted to without departing from the spirit and scope of the invention as those skilled in the art readily understand. Such modifications and variations are considered to be within the scope of the invention and the appended claims.