METHOD FOR MOBILE NETWORK OPERATOR-BASED PAYMENT SYSTEM
20220230170 · 2022-07-21
Inventors
Cpc classification
H04L67/02
ELECTRICITY
H04W4/20
ELECTRICITY
G06Q20/02
PHYSICS
International classification
G06Q20/40
PHYSICS
H04L67/02
ELECTRICITY
Abstract
A method, including the steps of: a) receiving, over a mobile communication network, a user device identifier based on information maintained by a database of the mobile communication network, and first purchase price information from an internet-accessible merchant, b) determining whether a data token is maintained in a memory of the user device, c) generating and transmitting the data token to the user device for storage when the token is not maintained, d) determining, based on the user device identifier, a credit worthiness indicator for the user device, e) transmitting an authorization signal for the requested purchase without concurrently requiring payment when the creditworthiness indicator satisfies predetermined conditions, f) monitoring a total outstanding purchase balance, and g) transmitting a request signal for the user device for settlement of at least a part of the total outstanding purchase balance if this exceeds a predetermined threshold amount.
Claims
1. A computer-implemented method for a payment system comprising the steps of: a. receiving, over a mobile communication network, an identifier of a user device based on user device information maintained by a database associated with a control system of the mobile communication network, and information indicative of a price of a first purchase requested from an internet-accessible merchant by the user device; b. determining whether at least one data token is maintained in a memory of the user device indicative of a prior communication between the user device and the payment system and/or the internet-accessible merchant; c. generating the at least one data token and transmitting the generated data token to the user device for storage when the at least one data token is not determined to be maintained in the user device memory; d. determining, based on the user device identifier, a credit worthiness indicator associated with the user device; e. transmitting an authorization signal to the internet-accessible merchant for the requested purchase without concurrently requiring payment for the purchases when the creditworthiness indicator satisfies predetermined conditions; f. monitoring a total outstanding purchase balance of an account associated with the user device; and g. transmitting a request signal for the user device for settlement of at least a part of the total outstanding purchase balance of the account associated with the user device identifier if the total outstanding purchase balance exceeds a predetermined threshold amount.
2. The computer-implemented method of claim 1, further comprising the steps of: a. receiving, over a data network information indicative of a price of a second purchase requested from an internet-accessible merchant by the user device and information from the data token stored in the user device; b. determining, based on the information from the data token, the credit worthiness indicator associated with the user device; c. transmitting an authorization signal to the internet-accessible merchant for the requested purchase without concurrently requiring payment for the purchases when the creditworthiness indicator satisfies predetermined conditions; d. monitoring a total outstanding purchase balance of an account associated with the information of the data token; and e. transmitting a request signal for the user device for settlement of at least a part of the total outstanding purchase balance of the account associated with the information of the data token if the total outstanding purchase balance exceeds a predetermined threshold amount.
3. The computer-implemented method of claim 1 further comprising the step of transmitting a signal to the control system of the mobile communication network containing information indicative of the at least one token for storage in the database, wherein the transmitted signal enables the mobile communication network control system to maintain in the database information associated with at least one of the account and data tokens corresponding to the identifier of a user device.
4. The computer-implemented method of claim 1 further comprising the step of receiving a signal from the mobile communication network control system indicative of information stored in the database of at least one token associated with the user device, and inhibiting the step of transmitting the signal to the mobile communication network control system containing the information indicative of the at least one token when the received signal from the mobile communication network control system indicative of information stored in the database corresponds to the at least one token that would otherwise have been transmitted.
5. The computer-implemented method of claim 1 wherein the identifier of a user device is a generated device fingerprint.
6. The computer-implemented method of claim 1 further comprising the step of creating an account in the payment system for the user device when no account exists associated with the data token or identifier.
7. The computer-implemented method of claim 1 further comprising the step of creating a combined account in the payment system for the user device when more than one account exists associated with the token and/or identifier.
8. The computer-implemented method of claim 7 wherein the combined account is one of the existing accounts associated with the token and/or identifier.
9. A computer-implemented method for a payment system comprising the steps of: a. receiving, over a data network an information indicative of a price of a purchase requested from an internet-accessible merchant by a user device in substantial absence of an identifier of the user device; b. receiving from the user device an identifier generated based on information maintained by the user device; c. generating at least one data token based in part on the received identifier; d. transmitting the generated data token to the user device for storage in association with at least one of the payment system and the merchant; e. transmitting a signal to a control system of a mobile network containing information indicative of the at least one token for storage in the database, wherein the transmitted signal enables the mobile network control system to maintain in the database information associated with data tokens corresponding to the identifier of a user device; f. determining, based on the user device identifier, a credit worthiness indicator associated with the user device; g. transmitting an authorization signal to the internet-accessible merchant for the requested purchase without concurrently requiring payment for the purchases when the creditworthiness indicator satisfies predetermined conditions; h. monitoring a total outstanding purchase balance associated with the user device; and i. transmitting a request signal for the user device for settlement of at least a part of the total outstanding purchase balance associated with the user device identifier if the total outstanding purchase balance exceeds a predetermined threshold amount.
10. The computer-implemented method of claim 8 further comprising the step of creating an account in the payment system for the user device when no account exists associated with the identifier.
11. The computer-implemented method of claim 8 wherein the step of generating the identifier of the user device comprises generating a device fingerprint.
12. A computer-implemented method for a payment system comprising the steps of: a. receiving, over a mobile communication network, an identifier of a user device based on user device information maintained by a database associated with a control system of the mobile communication network, and information indicative of a price of a purchase requested from an internet-accessible merchant by the user device; b. determining whether at least one data token is maintained in a memory of the user device indicative of a prior communication between the user device and the payment system and/or the internet-accessible merchant; c. generating the at least one data token and transmitting the generated data token to the user device for storage when the at least one data token is not determined to be maintained in the user device memory; d. transmitting a signal to the control system of the mobile communication network containing information indicative of the at least one token for storage in the database, wherein the transmitted signal enables the mobile communication network control system to maintain in the database information associated with data tokens corresponding to the identifier of a user device; and e. executing a settlement action by the mobile device with reference to the purchase price.
13. The computer-implemented method of claim 12, wherein the step of executing the settlement action comprises the steps of: a. determining that the purchase price is less than a predetermined threshold amount qualifying for deferred payment; and b. recording in a secure memory of the payment system, the purchase price in a ledger entry in an account associated with at least one of the user device identifier or information in the at least one data token.
14. The computer-implemented method of claim 12, wherein the step of executing the settlement action comprises the steps of: a. determining that the purchase price is greater than a predetermined threshold amount; b. transmitting a settlement request to a credit card company server or a bank server including information corresponding to an account associated with the at least one of the user device identifier or information in the at least one data token; and c. receiving a confirmation signal from the credit card company server or bank server regarding payment.
15. The computer-implemented method of claim 12, wherein the step of executing a settlement action comprises the steps of: a. determining, based on the user device identifier, a credit worthiness indicator associated with the user device; b. transmitting an authorization signal to the internet-accessible merchant for the requested purchase without concurrently requiring payment for the purchases when the creditworthiness indicator satisfies predetermined conditions; c. monitoring a total outstanding purchase balance associated with the user device; and d. transmitting a request signal for the user device for settlement of at least a part of the total outstanding purchase balance associated with the user device identifier if the total outstanding purchase balance exceeds a predetermined threshold amount.
16. The computer-implemented method of claim 12, wherein the step of executing a settlement action comprises the steps of: a. determining, based on information in the data token, a credit worthiness indicator associated with the data token; b. transmitting an authorization signal to the internet-accessible merchant for the requested purchase without concurrently requiring payment for the purchases when the creditworthiness indicator satisfies predetermined conditions; c. monitoring a total outstanding purchase balance associated with the data token; and d. transmitting a request signal for the user device for settlement of at least a part of the total outstanding purchase balance associated with the data token if the total outstanding purchase balance exceeds a predetermined threshold amount.
17. A computer-implemented method for a payment system comprising the steps of: a. receiving, over a data network, an information indicative of a price of a purchase requested from an internet-accessible merchant by the user device in substantial absence of an identifier of the user device; b. receiving from the user device an identifier of the user device generated based on information maintained by the user device; c. generating at least one data token based in part on the received identifier; d. transmitting the generated data token to the user device for storage; e. transmitting a signal to a control system of a mobile network containing information indicative of the at least one token for storage in the database, wherein the transmitted signal enables the mobile network control system to maintain in the database information associated with data tokens corresponding to the identifier of a user device; and f. executing a settlement action by the mobile device with reference to the purchase price.
18. The computer implemented method of claim 17 further comprising the step of creating an account in the payment system for the user device when no account exists associated with the at least one of the user device identifier or information in the at least one data token.
19. The computer implemented method of claim 17 wherein the step of generating the identifier of the user device comprises generating a device fingerprint.
20. The computer-implemented method of claim 17, wherein the step of executing the settlement action comprises the steps of: a. determining that the purchase price is less than a predetermined threshold amount qualifying for deferred payment; and b. recording in a secure memory of the payment system, the purchase price in a ledger entry in an account associated with at least one of the user device identifier or information in the at least one data token.
21. The computer-implemented method of claim 17, wherein the step of executing the settlement action comprises the steps of: a. determining that the purchase price is greater than a predetermined threshold amount; b. transmitting a settlement request to a credit card company server or a bank server including information corresponding to an account associated with at least one of the user device identifier or information in the at least one data token; and c. receiving a confirmation signal from the credit card company server or bank server regarding payment.
22. The computer-implemented method of claim 17, wherein the step of executing a settlement action comprises the steps of: a. determining, based on the user device identifier, a credit worthiness indicator associated with the user device; b. transmitting an authorization signal to the internet-accessible merchant for the requested purchase without concurrently requiring payment for the purchases when the creditworthiness indicator satisfies predetermined conditions; c. monitoring a total outstanding purchase balance associated with the user device; and d. transmitting a request signal for the user device for settlement of at least a part of the total outstanding purchase balance associated with the user device identifier if the total outstanding purchase balance exceeds a predetermined threshold amount.
23. The computer-implemented method of claim 17, wherein the step of executing a settlement action comprises the steps of: a. determining, based on information in the data token, a credit worthiness indicator associated with the data token; b. transmitting an authorization signal to the internet-accessible merchant for the requested purchase without concurrently requiring payment for the purchases when the creditworthiness indicator satisfies predetermined conditions; c. monitoring a total outstanding purchase balance associated with the data token; and d. transmitting a request signal for the user device for settlement of at least a part of the total outstanding purchase balance associated with the data token if the total outstanding purchase balance exceeds a predetermined threshold amount.
24. The computer-implemented method of claim 1 wherein the authorization signal is generated in substantial absence of registration or login to the payment system or to the content provider computer server by a user associated with the user device.
25. The computer-implemented method of claim 1 wherein the authorization signal is generated in substantial absence of identifying a user associated with the user device.
26. The computer-implemented method of claim 1 wherein the data token is associated with a HTTP cookie.
27. The computer-implemented method of claim 1 wherein the payment system is associated with the mobile communication network operator.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0033] A more complete understanding of the present disclosure may be realized by reference to the accompanying drawing in which:
[0034]
[0035]
[0036]
[0037]
[0038]
[0039]
[0040]
DETAILED DESCRIPTION
[0041] The following merely illustrates the principles of the disclosure. It will thus be appreciated that those skilled in the art will be able to devise various arrangements which, although not explicitly described or shown herein, embody the principles of the disclosure and are included within its spirit and scope.
[0042] Furthermore, all examples and conditional language recited herein are principally intended expressly to be only for pedagogical purposes to aid the reader in understanding the principles of the disclosure and the concepts contributed by the inventor(s) to furthering the art, and are to be construed as being without limitation to such specifically recited examples and conditions.
[0043] Moreover, all statements herein reciting principles, aspects, and embodiments of the disclosure, as well as specific examples thereof, are intended to encompass both structural and functional equivalents thereof. Additionally, it is intended that such equivalents include both currently known equivalents as well as equivalents developed in the future, i.e., any elements later developed that perform the same function, regardless of structure.
[0044] Unless otherwise explicitly specified herein, the drawings are not drawn to scale.
[0045] In the following description, the same reference signs are used for the same and similarly acting parts.
[0046] For purposes of illustrating aspects of the present invention, a basic architecture of a next generation (“5G”) core network that is currently under development by various industry standards bodies is described. Only those elements or functions are described that are necessary to understand principles of the present invention, and acknowledge that additional elements and functions will likely be needed to deploy an actual network.
[0047] As illustrated in
[0048] The core network (CN) provides functionality that is not access specific, e.g. authentication, authorization and accounting (AAA) of devices and/or subscribers, mobility between access networks, routing between the access networks and external data networks and control of quality of service (QoS).
[0049] As depicted in
[0050] A UE 4, when accessing a cellular mobile network, registers with an AMF 3 via a base station of the access network. The registration usually comprises fetching subscriber data by the AMF 3 from the UDM 5 and performing authentication between the Authentication Server Function (“AUSF”) and a SIM-Card of the UE 4. With this authentication the subscriber and potentially also his device is securely identified and e.g. accounting and billing on the subscriber's account is possible. Thus, authentication is a pre-requisite for nearly all services offered to a UE 4 with only few exceptions.
[0051] A registered UE 4 may request service from the network. A typical service request may be directed to data exchange between the UE 4 and an external data network (“DN”) 7. Examples DNs 7 may include the internet for unspecified user data or Over-the-Top applications, an operator managed IP-based Multimedia Subnetwork (IMS) for Voice-over-IP communication or any service-specific data network for e.g. a streaming video service.
[0052] For data communication, a logical connection between UE 4 and a gateway to the respective DN 7 needs to be established. The logical connection (denoted PDU Session) may comprise a fixed route that is established through the CN. The fixed route of a PDU session may utilize user plane functions (“UPFs”) 8 that are routers or gateways to DNs 7 in the 5G core network. A UE 4 requesting a service will thus request from the AMF 3 setup of a PDU Session with a DN 7, and will preferably provide requested QoS parameters. The AMF 3 selects a Session Management Function (“SMF”) 9 to setup the data path in the CN between access network and UPF(s) 8, including setting the required parameters in the involved network functions.
[0053] A UE 4 may request multiple PDU Sessions to the same DN 7, for example, if multiple applications with different QoS demands require data exchange with the same DN. A UE 4 may also request PDU sessions to different DNs 7 in parallel for different applications, for example to have voice connection in parallel to internet data and a streaming service.
[0054] We note that the data network domain 200 may include networks that also have operators. The term “network operator” as used herein is intended to refer to the operator of a “cellular or “mobile network.” The term (cellular) mobile network is intended to refer to a network that offers cellular mobile radio access to mobile devices according to known communication standards and architectures. This does not preclude the (cellular) mobile network from offering non-cellular mobile access or fixed, e.g. wireline, access to the network. However, the mobile networks differ from other access mechanisms using different infrastructures (e.g. wireline networks or public WLAN infrastructure.)
[0055] To ensure the PDU Session is setup according to the services subscribed by the subscriber, the SMF may request the UDM to provide subscriber data related to services subscribed. In addition, the SMF 9 may invoke a Policy Control Function (“PCF”) 10 to take into account the general network policies (for example, rules for derivation of QoS), current network load and other real-time information to adapt the PDU Session parameters.
[0056] The PCF 10 may interact with an Application Function (“AF”) 11 to communicate with an external application server (“AS”) 12. This may be particularly useful if a DN 7 has application servers that need to influence the setup of data connections to UEs 4 accessing the DN 7. Because external AS 12 cannot access the operator's CN directly, they communicate via an AF 11 to exchange, for example, additional authentication data for authentication of the UE 4 in the DN 7, or they exchange QoS information to ensure the data path is setup according to certain minimum or maximum quality requirements by the DN 7. Also, AS 12 may receive information such as location information or availability status information about a UE 4 via the AF 11. In
[0057] Finally, the SMF 9 has setup the CN and the access network to provide the required data path, and the UE 4 is informed about the PDU session setup and its parameters.
[0058]
[0059] Accordingly, a UE 4 may have two different access paths available to access a service or application server: via the mobile network or a wireline network. The present invention utilizes different aspects of both networks to beneficially enhance payment systems and user device identification.
[0060]
[0061] In
[0062] To pay for content that the UE 4 requests from the CP 15, a payment system 16 may be used. To access the payment system 16 through a mobile network, a second PDU session may be set up through the same RAN 1 and UPF 8. In
[0063] For the functions of the core network, e.g. AMF 3 and SMF 9, the payment system 16 may be treated as a stand-alone data network separated from the internet 17 and other potential data networks. Alternatively, the payment system 16 may be accessible via the internet 17 also used to access the CP 15.
[0064] The setup of the PDU sessions, involves using the AMF 3 to register the UE 4 in the mobile network domain 100 (if not already registered) and using an SMF 9 to setup and maintain the data route of the PDU sessions. A PCF 10 may influence the setup and the parameters of the PDU session.
[0065] In addition, the CP 15 and the payment system 16 may both be accessible via another network, e.g. a wireline network 13 which includes, for example, a WLAN 14 access for/to the UE 4. Therefore, the UE 4 has two alternative routes to both the CP 15 and the payment system 16, one which uses the mobile network in the operator network domain 100, and another which does not go through the mobile network.
[0066] When a user accesses the CP 15 using his/her UE 4, and requests content using a service interface, e.g. a web interface, via the mobile network, the UE 4 may be provided with a link that redirects the UE 4 to the payment system 16 for the purpose of identifying the UE 4. Identification of the UE 4 may involve checking access of the UE 4 to the content, and requesting the user's agreement to pay a fee for the content. Alternatively, the UE 4 may be provided with a script that when executed by the UE 4 accesses the payment system 16 and identifies the UE 4, verifies access, and requests agreement to pay. In both alternatives, the UE 4 has a PDU session to the internet to access the CP 15, and the UE 4 has an additional connection to the payment system 16.
[0067] In
[0068] The payment system 16 may, for example, when triggered by the second PDU session establishment, contact an application function (AF) 11 whose function is to manage communication between the core network and external service providers for purposes of identification of the UE 4 that uses the PDU session. The AF 11 may additionally or alternatively be triggered by the PCF 10 during establishment of the additional PDU session to contact the payment system 16. The AF 11 may receive from the PCF 10 or from the UDM 5 identification information of UE 4 which may be subscriber and payment system-specific. This information may not reveal the subscriber's real identity, but otherwise uniquely identify the UE 4 to the payment system 16. The AF 11 may provide the subscriber identity to the payment system 16 in conjunction with an identification process that identifies the connection that is established between the UE 4 and the payments system 16, e.g. a PDU session identification.
[0069] The payment system 16 then has a connection with the UE 4 and the UE 4 is already identified by the payment system 16 before any data is exchanged with the UE 4.
[0070] If the payment system 16 is not accessible via a dedicated DN 7 associated with or accessible to the mobile network 100, such payment system 16 may be accessible via the same DN 7 that also provides access to the internet. The payment system 16 would then be treated by the mobile network 100 similar to a conventional application server, yet with special authorization to connect to an AF 11 and receive subscriber identification as described above. In this embodiment of the present invention, a separate PDU session would not be necessary because the payment system 16 would be accessible via the PDU session that is already setup for connections to the CP 15. In this case, in order to ensure setup of a separate PDU session, the UE 4 may have received policies, as part of the registration process or any other procedure prior to accessing the CP 15, that trigger the UE 4 to request setup of an additional PDU session to the payment system 16 via the same internet DN 7. This is beneficial as the setup of a payment system specific PDU session allows the network to better control the data flow to and from the payment system 16 and support the payment system 16 with a connection identification. The connection identification cannot be a PDU session identifier, as the PDU session does not terminate in the payment system 16 but in the UPF 8 providing access to the internet. The connection identification may be the IP-address and port numbers used, or a tunnel identifier if the UPF 8 and payment system 16 setup a tunnel, e.g. an IPsec-tunnel, for exchange of data to and from the UE 4. Any other connection identifier can also be used.
[0071] The mechanism described above allows the payment system 16 to identify the UE 4 using the mobile network. These processes may be used also with other aspects of this invention which will be described in the following description.
[0072]
[0073] Referring to
[0074] The aim of reading the token in this exemplary procedure is not to specifically identify a user of the UE 4, but to associate the token with a UE 4 identity received from the mobile network 100. The token may have been stored in the past while the UE 4 accessed the same CP 15 over a WLAN 14 connection, and it is advantageous for the CP 15 and the payment system 16 to identify a single UE 4 from both a token and a mobile network-based access.
[0075] In step 130, the CP 15 responds to the request with a re-direction to the PS 16. This re-direction includes an identification of the content the user requested and the token that was read. The re-direction may for example be in the form of a re-direct order which includes a hyper-link to an address of the payment system 16 to enable the UE 4 to request an executable script from the PS 16 in step 140. The re-direction may also be in form of a link to a script provided by the payment system 16 as shown in step 150 that needs to be loaded to and executed by the UE 4.
[0076] The UE 4 may have previously stored a second token, e.g., the second token was stored in the context of the payment system 16 and provided by the payment system 16 in past payment sessions. In step 160, this second token is read when executing the script. For the described procedure, it is not necessary that both the token of the CP 15 and the second token from the payment system 16 are present. Either one of the tokens is sufficient to perform the described tasks, however for the sake of completeness we included both tokens in the example procedure.
[0077] The UE 4 may then, in step 170, access the payment system 16 requesting identification of the UE 4 by the payment system 16, providing the tokens and the identification of the content the user requested. The network then identifies the UE 4 in step 180. The identification is shown to be done, for example, between the PS 16, the UDM 5 and the UPF 8. As explained above, the actual identification information may have been provided by the UDM 5 to the payment system 16 (via PCF and/or AF) in association with a PDU session between UE 4 and payment system 16 before the procedure started. The identification would then simply be the identification of the connection the request is coming from.
[0078] After the UE 4 is identified in step 180, the token(s) received from the UE 4 are stored in the UDM 5 in step 190 so that going forward any data stored in association with any of the tokens is associated with the UE 4 identification provided by the mobile network 100. A single wallet, for example, could then contain information accounting for both purchases by the UE 4 via WLAN 14 and purchases by the UE 4 via a mobile network 100.
[0079] In step 200 of
[0080] Some optional elements of the inventive procedure of
[0081] For settlement various alternative methods can be used. The UE 4 may request settlement from the user based on the current web session, i.e. via a window in the browser providing access to any payment methods and potentially other payment systems such as credit card companies or the like. Another alternative method is billing by the mobile operator, i.e. on the user's telephone bill, which is much easier for the customer, the operator of the mobile network 100 and the payment system 16.
[0082] For that purpose, for example, the payment system 16 may request payment from the operator network 100, e.g. via the AF 11 of
[0088] The methods for settlement of a wallet described above may alternatively be used for each single micropayment, so that an accounting to a wallet is circumvented.
[0089] A novel aspect and benefit of the present invention is the combination of mobile network 100 based identification and browser-based identification depending on the network used, so that mobile network based payment also becomes possible for UEs 4 accessing the payment system 16 via a WLAN 14/wireline 13 network, as described further below.
[0090]
[0091] In step 110 of
[0092] After the UE 4 is identified in step 370, the fingerprint associated with the UE 4 is stored in the UDM 5 in step 380. A token is generated in step 390, and a second token in generated in step 400. In step 200 of
[0093]
[0094]
[0095] The UE 4 provides both tokens to the payment system 16, which uses the tokens to look up the identity of the UE 4 in step 520 of
[0096] Again, use of only one of the two types of tokens is sufficient for the current invention. Both CP 15 and payment system 16-related tokens are only described herein for the sake of completeness, and to show the possible implementation options the invention offers.
[0097] The payment and/or settlement can still be operator supported. Because of the inventive identification of the UE 4, the operator can still use SMS or app-based payment systems, or any other system that makes use of the secure connection of the UE 4 to the payment system 16 via the mobile network 100. This opportunity for the mobile operator is provided by the current invention based on the combined usage of browser-based identities and mobile network identities for the UE 4.
[0098] If, as depicted in another exemplary procedure illustrated by
[0099]
[0100] A request for identification of a UE 4 is received in the payment system 16 at step 30. The payment system 16 may be informed by a mobile network operator about connections (PDU sessions) setup to the payment system 16 so that the payment system 16 can determine at step 31 whether a network-based identification is possible. If it is possible, the UE 4 is identified at step 40, e.g. by information received from the network in combination with the connection used by the UE 4 to connect to the payment system 16. The payment system 16 may then determine at step 41 whether token information is available to identify the UE 4, if tokens are available, they are stored at step 44 in the UDM 5 in association with the UE 4. This step may not be necessary, if the tokens are already known to the UDM 5 in association with the UE 4. If tokens are not available, a fingerprint should be present in the request received from the UE 4 and the fingerprint is stored at step 42 in association with the UE 4. Tokens are then generated or read at step 43 from the UDM 5 and provided to the UE 4 at step 45 for storage and later use.
[0101] If no network based identification is available, e.g. because the UE 4 accesses the payment system 16 through a WLAN 14, the payment system 16 checks at step 32 whether tokens are available to identify the UE 4. If tokens are available, the tokens are looked up in the UDM 5 of the mobile network operator and the UE 4 is identified at step 33. If no tokens are available a fingerprint should be present in the request received from the UE 4. If the fingerprint can be looked up successfully at step 34, new tokens are generated at step 37 and provided to the UE 4 at step 38 for storage and use in subsequent access attempts. If the fingerprint lookup fails (or if tokens are available that are unknown in the UDM 5, and thus lookup fails, which is a scenario not shown in
[0102] In case a UE 4 entry is created anew and new tokens are generated, one can see the benefits of the current invention. If the same UE 4 accesses the payment system 16 at any time later through the mobile network 100, the UE 4 is identified based on the network but the tokens are provided to the payment system 16 for storage in association with the UE 4, for identifying the new entry, and for combining it with existing UDM 5 entries for the identified subscriber, as described with reference to and depicted in
[0103] Another aspect of the current invention is an alternative implementation in the UE 4 that forces the UE 4 to always use the mobile network 100 for accessing the payment system 16 even if the CP 15 is accessed via other networks. This would lead to the mobile network 100 always being able to identify the UE 4 based on mobile network subscription if the mobile network is available. The procedures described above with relation to
[0104] This alternative would require filters or policies in the UE 4, potentially set by the mobile network operator during registration of the UE 4 or setup of a PDU session that direct connections to the payment system 16 through the mobile network 100 even if the originating application (e.g. the browser) is currently using, for example, a WLAN 14 connection. Such directing methods are currently not implemented in mobile device (as they would give mobile network operator power of the use of private WLAN 14 connection), but they should not be excluded by this invention.