Patent classifications
G06Q20/4018
Tap card to securely generate card data to copy to clipboard
A web browser may output a form comprising a payment field. A URL may be received from a communications interface of a contactless card, the URL comprising encrypted data generated by the contactless card based on a private key stored in a memory of the contactless card. An application may transmit the encrypted data to an authentication server, which may decrypt the encrypted data based on the private key. The application may receive, from a virtual account number server, a virtual account number. The application may receive an expiration date and a CVV. The application may copy the virtual account number to a clipboard of an OS. The OS may paste the virtual account number from the clipboard to the payment field of the form in the web browser. The OS may output a notification comprising the expiration date and the CVV associated with the virtual account number.
Payment instrument including primary and auxiliary chips
Apparatus and methods for a payment instrument are provided. The apparatus may include a primary chip positioned on an outer face of the payment instrument and a power source. The apparatus may include a first supplementary chip, a second supplementary chip, and a third supplementary chip. Each of the first, second and third supplementary chips may be positioned within a thickness of the payment instrument and configured to draw power from the power source.
SYSTEMS AND METHODS FOR GENERATING AND TRANSMITTING ELECTRONIC TRANSACTION ACCOUNT INFORMATION MESSAGES
Systems and methods are disclosed for secure transmission of account information messages. One method comprises receiving account information; providing a notification to a third party regarding the account information; receiving a first request for information regarding the notification from the third party; providing a response to the third party regarding the first request; receiving data from the third party; using the data to generate a message including details about the account, wherein at least some of the details about the account are encrypted; receiving a second request for information regarding the notification from the third party; and providing the message to the third party.
Payment service authentication for a transaction using a generated dynamic verification value
Methods and systems for dynamically generating a verification value for a transaction and for utilizing such value to verify the authenticity of the payment service application. The dynamically created verification value may be generated on a payment device, such as an integrated circuit credit card or smart card, embedded into the payment data, and transmitted to a point of sale terminal. Alternatively, payment data is sent by a payment device to a point of sale terminal, which generates a verification value and embeds it into the payment data. The embedded verification value is used by a service provider to verify the authenticity of the transaction. The methods and systems may be used in a contactless (wireless) environment or a non-wireless environment.
System and method using interaction token
A communication device may receive input from a user and initiate generation of an interaction token in response. This interaction token can be used by the communication device in order search for a specific resource provider computer from among one or more resource provider computers, and to initiate a resource transfer between the user and a specific resource provider, mediated by a token provider computer.
Electronic transaction fobs
Systems and methods for electronic fobs that communicate via short range communications protocols to conduct transactions with a nearby device are provided. Such electronic fobs may use electronic tokens to conduct electronic transactions, such as payment transactions. Account data may be stored within a secure element of the electronic fob. Electronic tokens may also be stored by the secure element. Using such data and/or tokens, electronic fob may write electronic tokens to be used in electronic transactions. Also, such electronic fobs may also be used to perform other tasks and interface with other devices.
DATA SECURITY ENHANCEMENT FOR ONLINE TRANSACTIONS INVOLVING PAYMENT CARD ACCOUNTS
Payment card information of a consumer is protected during online payment card based transactions by equipping a user device of the consumer with a control that, when activated by the consumer during an online shopping session, causes the user device automatically to request and receive, from a third-party payment processing service (PPS), temporary proxy payment card information, and to populate that information into an online transaction web interface of the merchant. The temporary proxy payment card information is associated in the third-party PPS with a real payment card account of the consumer. When the PPS receives a transaction authorization request from a merchant via a payment card network, the PPS uses the consumer's real payment card information to authorize the transaction. The consumer's real payment card information is never exposed to the merchant.
Electronic transaction security system and method
A system and method for generating a limited use login credential associated with an account maintained by an institution, where the credential facilitates secure access to the account.
Device enrollment system and method
Embodiments related to systems and methods comprising receiving payment data at an access device; receiving an identifier for a mobile device at the access device; and generating and sending an authorization request message to a payment processing network, wherein the payment processing network generates a verification token, which is then sent to the mobile device whereby the mobile device is thereafter used to conduct payment transactions.
Systems and methods for data desensitization
Systems and methods are provided to identify payment data and desensitize the data by a secure card reader. Desensitization of the payment data may include replacing sensitive information such as discretionary data with zeroes or other predetermined values. Desensitization may also include replacing sensitive information with fraud detection data such as merchant identifying information. Desensitization of the payment data may leave certain payment data intact for customer tracking or other non-payment related purposes.