SYSTEMS AND METHODS FOR ENCRYPTION AND DECRYPTION SERVICE FOR ELECTRONIC TRANSACTION MONITORING AND REPORTING
20230222497 · 2023-07-13
Inventors
Cpc classification
H04L2209/56
ELECTRICITY
H04L63/0464
ELECTRICITY
G06Q20/206
PHYSICS
International classification
G06Q20/40
PHYSICS
H04L9/32
ELECTRICITY
Abstract
A method for electronic transaction monitoring and reporting includes: determining whether the received transaction request is encrypted, upon determining that the received transaction request is not encrypted, sending a failure alert to the merchant, determining a receiving acquirer processor for the transaction request, and transmitting the transaction request to the determined acquirer processor.
Claims
1-20. (canceled)
21. A computer-implemented method for validating encryption of electronic transactions, the method comprising: receiving, by a decryption service provider, a transaction request from one or more point-of-sale (POS) devices associated with a user; processing, by the decryption service provider, the transaction request to determine whether the transaction request is encrypted, clear data, or corrupted; decrypting, by the decryption service provider, the encrypted transaction request for determining a recipient acquirer processor; re-encrypting, by the decryption service provider, the decrypted transaction request using an encryption key associated with the decryption service provider; and transmitting, by the decryption service provider, the re-encrypted transaction request to the recipient acquirer processor over a computer network for payment authorization.
22. The computer-implemented method of claim 21, further comprising: receiving, by the decryption service provider, a result for the transaction request from the acquirer processor; and transmitting, by the decryption service provider, the result for the transaction request to the one or more POS devices, wherein the result for the transaction request is encrypted.
23. The computer-implemented method of claim 21, further comprising: transmitting, by the decryption service provider, a failure alert to the one or more POS devices upon determining the transaction request is received as the clear data or is corrupted during data transmission, wherein the failure alert is transmitted by way of a reporting portal accessible to the user via the computer network.
24. The computer-implemented method of claim 23, further comprising: assigning, by the decryption service provider, a level of severity to the transaction request based on one or more aspects of the failure alert, wherein the level of severity is higher for the transaction request received as the clear data or is corrupted; and determining, by the decryption service provider, a reporting frequency for the failure alert based on the assigned level of severity.
25. The computer-implemented method of claim 23, wherein a failure alert report is reported to the one or more POS devices based on a scheduled basis or upon an accumulation of a pre-determined number of failure alerts of a pre-determined severity level.
26. The computer-implemented method of claim 23, wherein the corrupted transaction request indicate a mismatch between the encryption key and a registered decryption key associated with the user.
27. The computer-implemented method of claim 23, wherein the corrupted transaction request indicate a failure in decrypting the transaction request due to an error in the transaction request or an internal processing error within the decryption service provider.
28. The computer-implemented method of claim 23, further comprising: returning, by the decryption service provider, the transaction request received as the clear data or is corrupted to the one or more POS devices associated with the user, wherein payment processing services for the returned transaction request is terminated.
29. The computer-implemented method of claim 23, wherein one or more failure alerts are stored in a database, and wherein the failure alert is searched in the database based on a query submitted by the user or other entities having access to reporting data for the user.
30. The computer-implemented method of claim 29, further comprising: generating, by the decryption service provider, a presentation of a dashboard in a user interface of a device associated with the user for viewing a failure report, wherein the dashboard includes search criterion, search values, date ranges, and failure codes for searching the database for detailed information on point-to-point encryption (P2PE) failures.
31. The computer-implemented method of claim 30, wherein the failure report is exported to an external format for incorporation to an external document.
32. A system for validating encryption of electronic transactions, the system comprising: one or more processors; and at least one non-transitory computer readable medium storing instructions which, when executed by the one or more processors, cause the one or more processors to perform operations comprising: receiving, by a decryption service provider, a transaction request from one or more point-of-sale (POS) devices associated with a user; processing, by the decryption service provider, the transaction request to determine whether the transaction request is encrypted, clear data, or corrupted; decrypting, by the decryption service provider, the encrypted transaction request for determining a recipient acquirer processor; re-encrypting, by the decryption service provider, the decrypted transaction request using an encryption key associated with the decryption service provider; and transmitting, by the decryption service provider, the re-encrypted transaction request to the recipient acquirer processor over a computer network for payment authorization.
33. The system of claim 32, further comprising: receiving, by the decryption service provider, a result for the transaction request from the acquirer processor; and transmitting, by the decryption service provider, the result for the transaction request to the one or more POS devices, wherein the result for the transaction request is encrypted.
34. The system of claim 32, further comprising: transmitting, by the decryption service provider, a failure alert to the one or more POS devices upon determining the transaction request is received as the clear data or is corrupted during data transmission, wherein the failure alert is transmitted by way of a reporting portal accessible to the user via the computer network.
35. The system of claim 34, further comprising: assigning, by the decryption service provider, a level of severity to the transaction request based on one or more aspects of the failure alert, wherein the level of severity is higher for the transaction request received as the clear data or is corrupted; and determining, by the decryption service provider, a reporting frequency for the failure alert based on the assigned level of severity.
36. The system of claim 34, wherein a failure alert report is reported to the one or more POS devices based on a scheduled basis or upon an accumulation of a pre-determined number of failure alerts of a pre-determined severity level.
37. The system of claim 34, wherein the corrupted transaction request indicate a mismatch between the encryption key and a registered decryption key associated with the user, and wherein the corrupted transaction request indicate a failure in decrypting the transaction request due to an error in the transaction request or an internal processing error within the decryption service provider.
38. A non-transitory computer readable medium for validating encryption of electronic transactions, the non-transitory computer readable medium storing instructions which, when executed by one or more processors, cause the one or more processors to perform operations comprising: receiving, by a decryption service provider, a transaction request from one or more point-of-sale (POS) devices associated with a user; processing, by the decryption service provider, the transaction request to determine whether the transaction request is encrypted, clear data, or corrupted; decrypting, by the decryption service provider, the encrypted transaction request for determining a recipient acquirer processor; re-encrypting, by the decryption service provider, the decrypted transaction request using an encryption key associated with the decryption service provider; and transmitting, by the decryption service provider, the re-encrypted transaction request to the recipient acquirer processor over a computer network for payment authorization.
39. The non-transitory computer readable medium of claim 38, further comprising: receiving, by the decryption service provider, a result for the transaction request from the acquirer processor; and transmitting, by the decryption service provider, the result for the transaction request to the one or more POS devices, wherein the result for the transaction request is encrypted.
40. The non-transitory computer readable medium of claim 38, further comprising: transmitting, by the decryption service provider, a failure alert to the one or more POS devices upon determining the transaction request is received as the clear data or is corrupted during data transmission, wherein the failure alert is transmitted by way of a reporting portal accessible to the user via the computer network.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0014] The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate various exemplary embodiments and together with the description, serve to explain the principles of the disclosed embodiments.
[0015]
[0016]
[0017]
[0018]
[0019]
[0020]
[0021]
[0022]
DETAILED DESCRIPTION OF EMBODIMENTS
[0023] Various embodiments of the present disclosure relate generally to enabling voice control of an interactive audiovisual environment, and monitoring user behavior to assess engagement.
[0024] The terminology used below may be interpreted in its broadest reasonable manner, even though it is being used in conjunction with a detailed description of certain specific examples of the present disclosure. Indeed, certain terms may even be emphasized below; however, any terminology intended to be interpreted in any restricted manner will be overtly and specifically defined as such in this Detailed Description section.
[0025] Any suitable system infrastructure may be put into place to allow user control of an interactive audiovisual environment, and engagement assessment.
[0026] Aspects of the present disclosure may be embodied in a special purpose computer and/or data processor that is specifically programmed, configured, and/or constructed to perform one or more of the computer-executable instructions explained in detail herein. While aspects of the present disclosure, such as certain functions, are described as being performed exclusively on a single device, the present disclosure may also be practiced in distributed environments where functions or modules are shared among disparate processing devices, which are linked through a communications network, such as a Local Area Network (“LAN”), Wide Area Network (“WAN”), and/or the Internet. Similarly, techniques presented herein as involving multiple devices may be implemented in a single device. In a distributed computing environment, program modules may be located in both local and/or remote memory storage devices.
[0027] Aspects of the present disclosure may be stored and/or distributed on non-transitory computer-readable media, including magnetically or optically readable computer discs, hard-wired or preprogrammed chips (e.g., EEPROM semiconductor chips), nanotechnology memory, biological memory, or other data storage media. Alternatively, computer implemented instructions, data structures, screen displays, and other data under aspects of the present disclosure may be distributed over the Internet and/or over other networks (including wireless networks), on a propagated signal on a propagation medium (e.g., an electromagnetic wave(s), a sound wave, etc.) over a period of time, and/or they may be provided on any analog or digital network (packet switched, circuit switched, or other scheme).
[0028] As described above, merchants, acquirer processors, and financial institutions seek assurances that encryption applied to an electronic transaction request message is robust. Thus, the embodiments of the present disclosure are directed to providing an encryption monitoring and reporting service to validate the encryption of electronic transaction request message and to alert a merchant of encryption failures in transaction request messages.
[0029] In accordance with one or more embodiments, and as described in more detail below, a decryption service provider may detect the transmission of unencrypted transaction messages or other encryption failures in encrypted transaction messages and provide a failure or error reports to a merchant. Such failure or error reports may be provided through a reporting or alerting portal accessible to the merchant over a computer network.
[0030] One or more examples of these non-limiting embodiments are illustrated in the selected examples disclosed and described in detail with reference to
[0031]
[0032] POS device 118 may be configured to interact with payment vehicle 126 to obtain account information about a consumer account affiliated with account holder 113. As shown in the depicted callout of POS device 118, in one or more embodiments, POS device 118 may include a memory 167 coupled to processor 151, which may control the operations of a reader 163, an input device 153, an output device 165, and a network interface 161. Memory 167 may store instructions for processor 151 and/or data, such as, for example, an identifier that is associated with merchant account 112.
[0033] In one or more embodiments, reader 163 may include a magnetic strip reader. In one or more embodiments, reader 163 may include a contactless reader, such as, for example, a radio frequency identification (RFID) reader, a near field communications (NFC) device configured to read data via magnetic field coupling (in accordance with ISO standard 14443/NFC), a Bluetooth transceiver, a Wi-Fi transceiver, an infrared transceiver, a laser scanner, and so forth.
[0034] In one or more embodiments, input device 153 may include key buttons that may be used to enter the account information directly into POS device 118 without the physical presence of payment vehicle 126. Input device 153 may be configured to provide further information to initiate a transaction, such as, for example, a personal identification number (PIN), password, zip code, etc., or in combination with the account information obtained from payment vehicle 126. In one or more embodiments, output device 165 may include a display, a speaker, and/or a printer to present information, such as, for example, the result of an authorization request, a receipt for the transaction, an advertisement, and so forth.
[0035] In one or more embodiments, network interface 161 may be configured to communicate with acquirer processor 122 such as, for example, via a telephone connection, an Internet connection, or a dedicated data communication channel.
[0036] In one or more embodiments, the instructions stored in memory 167 may be configured at least to cause POS device 118 to send an authorization request message to acquirer processor 122 to initiate a transaction. POS device 118 may or may not send a separate request for the clearing and settling of the transaction. The instructions stored in memory 167 also may be configured to cause POS device 118 to perform other types of functions discussed in this description.
[0037] In one or more embodiments, POS device 118 may have fewer components than those illustrated in
[0038] During a purchase event, merchant POS device 118 may send an authorization request 120 for the purchase transaction to acquirer processor 122 that processes payment vehicle transactions for merchant 116. Additional intermediary entities, such as one or more payment gateways, may assist with the handling and routing of authorization request 120 or other related messaging. For the purposes of illustration, such intermediary entities may be considered part of acquirer processor 122. Authorization request 120 may include identifying information from payment vehicle 126, such as a BIN number, an expiration date, and a first and last name of the account holder, for example. Authorization request 120 may further include identifying information from the purchase, such as an amount and identifying information from merchant POS device 118 and/or merchant 116, for example.
[0039] In one or more embodiments, payment vehicle 126 may be used to establish a recurring billing arrangement between account holder 113 and merchant 116. An initial transaction may allow merchant 116 to store account information that may be used for subsequent billing events. The account information may be stored in a cards-on-file storage 136. For example, the purchase event illustrated in
[0040] A payment processing computing system 124 at acquirer processor 122 may receive authorization request 120 from merchant 116. Payment processing computing system 124 may translate authorization request 120, if necessary, and may provide authorization request 120 to a payment network 142. Payment network 142 may be, for example, a network of a credit card association affiliated with payment vehicle 126. Nonlimiting examples of credit card associations include VISA, MASTERCARD, DISCOVER, and AMERICAN EXPRESS, and so on. Authorization request 120 then may be provided to a payment processing computing system 128 at an issuer processor 130. In response to receiving the authorization request, and based on the type of payment vehicle 126, payment processing computing system 128 may provide authorization request 120 to issuer financial institution 114. Using information from authorization request 120, issuer financial institution 114 may associate the purchase transaction with an account 131 of account holder 113 held by issuer financial institution 114. Issuer financial institution 114 then may send an authorization response 132 which may either approve or deny the transaction. Authorization response 132 may be provided to payment processing computing system 128 at issuer processor 130 and then provided to payment network 142. Authorization response 132 then may be provided to payment processing computing system 124 at acquirer processor 122. Upon receiving authorization response 132, payment processing computing system 124 may send either an approval message or a denial message to merchant POS device 118 to complete the purchase transaction. If the purchase transaction is approved, it may be posted to account holder's account 131 and reconciled later with account holder 113 and merchant 116.
[0041] Transaction records may be stored in one or more locations within system 100. In one or more embodiments, the transaction record may be stored within a transaction data database 134 of acquirer processor 122. The transaction data may be received by transaction data database 134 from various sources, such as merchant POS device 118, merchant 116, acquirer processor 122, and so on. A plurality of transaction parameters associated with the purchase transaction may be stored in each transaction record, which may generally be used for settlement and financial recordkeeping. While the transaction parameters stored in each transaction record may vary, example transaction parameters may include, without limitation, account number, card number, payment vehicle information, product information (such as product type, product serial number, and so forth), transaction amount, loyalty account information, merchant information, transaction amount, response code, transaction date, transaction time, whether the transaction was a “card present” transaction, and so on.
[0042]
[0043]
[0044]
[0045]
[0046]
[0047]
[0048] The processes described herein may be performed on or between one or more computing devices that are specially configured to perform the processing described herein. Referring now to
[0049] The computing device 600 may include a processor 602 that may be any suitable type of processing unit such as, for example, a general purpose central processing unit (CPU), a reduced instruction set computer (RISC), a processor that has a pipeline or multiple processing capability including having multiple cores, a complex instruction set computer (CISC), a digital signal processor (DSP), an application specific integrated circuits (ASIC), a programmable logic devices (PLD), and a field programmable gate array (FPGA), among others. The computing resources may further include, for example, distributed computing devices, cloud computing resources, and virtual computing resources in general, etc.
[0050] The computing device 600 also may include one or more memories 606 such as, for example, read only memory (ROM), random access memory (RAM), cache memory associated with the processor 602, or other memories such as dynamic RAM (DRAM), static ram (SRAM), programmable ROM (PROM), electrically erasable PROM (EEPROM), flash memory, a removable memory card or disk, a solid state drive, and so forth. The computing device 600 also may include storage media such as, for example, a storage device that can be configured to have multiple modules, such as magnetic disk drives, floppy drives, tape drives, hard drives, optical drives and media, magneto-optical drives and media, compact disk drives, Compact Disk Read Only Memory (CD-ROM), Compact Disk Recordable (CD-R), Compact Disk Rewriteable (CD-RW), a suitable type of Digital Versatile Disk (DVD) or BluRay disk, and so forth. Storage media such as flash drives, solid state hard drives, redundant array of individual disks (RAID), virtual drives, networked drives and other memory means including storage media on the processor 602, or memories 606 are also contemplated as storage devices. It can be appreciated that such memory can be internal or external with respect to operation of the disclosed embodiments. It can be appreciated that certain portions of the processes described herein may be performed using instructions stored on a non-transitory computer-readable medium or media that direct a computer system to perform the process steps. Non-transitory computer-readable media, as used herein, comprises all computer-readable media except for transitory, propagating signals.
[0051] Network and communication interfaces 612 may be configured to transmit to, or receive data from, other computing devices 600 across a network 614. The network and communication interfaces 612 may be, for example, an Ethernet interface, a radio interface, a Universal Serial Bus (USB) interface, or any other suitable communications interface and can include receivers, transmitter, and transceivers. For purposes of clarity, a transceiver may be referred to as a receiver or a transmitter when referring to only the input or only the output functionality of the transceiver. Example communication interfaces 612 may include, for example, wired data transmission links such as Ethernet and TCP/IP. The communication interfaces 612 may include, for example, wireless protocols for interfacing with private or public networks 614. For example, the network and communication interfaces 612 and protocols may include interfaces for communicating with private wireless networks such as, for example, a Wi-Fi network, one of the IEEE 802.11x family of networks, or another suitable wireless network. The network and communication interfaces 612 may include interfaces and protocols for communicating with public wireless networks 612, using, for example, wireless protocols used by cellular network providers, including Code Division Multiple Access (CDMA) and Global System for Mobile Communications (GSM), etc. A computing device 600 may use network and communication interfaces 612 to communicate with hardware modules such as, for example, a database or data store, or one or more servers or other networked computing resources. Data may be encrypted or protected from unauthorized access.
[0052] According to one or more embodiments, the computing device 600 may include a system bus 616 for interconnecting the various components of the computing device 600, or the computing device 600 may be integrated into one or more chips such as, for example, a programmable logic device or an application specific integrated circuit (ASIC), etc. The system bus 616 may include, for example, a memory controller, a local bus, or a peripheral bus for supporting input and output devices 604, and communication interfaces 612, etc. Example input and output devices 604 may include keyboards, keypads, gesture or graphical input devices, motion input devices, touchscreen interfaces, one or more displays, audio units, voice recognition units, vibratory devices, computer mice, and any other suitable user interface.
[0053] The processor 602 and memory 606 may include nonvolatile memory for storing, for example, computer-readable instructions, data, data structures, program modules, code, microcode, and other software components for storing the computer-readable instructions in non-transitory computer-readable mediums in connection with the other hardware components for carrying out the methodologies described herein. Software components may include, for example, source code, compiled code, interpreted code, executable code, static code, dynamic code, encrypted code, or any other suitable type of code or computer instructions implemented using any suitable methodology including, for example, high-level, low-level, object-oriented, visual, compiled, or interpreted programming language, etc.
[0054] These and other embodiments of the systems and methods may be used as would be recognized by those skilled in the art. The above descriptions of various systems and methods are intended to illustrate specific examples and describe certain ways of making and using the systems disclosed and described here. These descriptions are neither intended to be nor should be taken as an exhaustive list of the possible ways in which these systems can be made and used. A number of modifications, including substitutions of systems between or among examples and variations among combinations can be made. Those modifications and variations should be apparent to those of ordinary skill in this area after having read this disclosure.
[0055] The systems, apparatuses, devices, and methods disclosed herein are described in detail by way of examples and with reference to the figures. The examples discussed herein are examples only and are provided to assist in the explanation of the apparatuses, devices, systems and methods described herein. None of the features or components shown in the drawings or discussed below should be taken as mandatory for any specific implementation of any of these the apparatuses, devices, systems or methods unless specifically designated as mandatory. For ease of reading and clarity, certain components, modules, or methods may be described solely in connection with a specific figure. In this disclosure, any identification of specific techniques, arrangements, etc. are either related to a specific example presented or are merely a general description of such a technique, arrangement, etc. Identifications of specific details or examples are not intended to be, and should not be, construed as mandatory or limiting unless specifically designated as such. Any failure to specifically describe a combination or sub-combination of components should not be understood as an indication that any combination or sub-combination is not possible. It will be appreciated that modifications to disclosed and described examples, arrangements, configurations, components, elements, apparatuses, devices, systems, methods, etc. can be made and may be desired for a specific application. Also, for any methods described, regardless of whether the method is described in conjunction with a flow diagram, it should be understood that unless otherwise specified or required by context, any explicit or implicit ordering of steps performed in the execution of a method does not imply that those steps must be performed in the order presented but instead may be performed in a different order or in parallel.
[0056] Reference throughout the specification to “various embodiments,” “some embodiments,” “one embodiment,” “some example embodiments,” “one example embodiment,” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with any embodiment is included in at least one embodiment. Thus, appearances of the phrases “in various embodiments,” “in some embodiments,” “in one embodiment,” “some example embodiments,” “one example embodiment, or “in an embodiment” in places throughout the specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures or characteristics may be combined in any suitable manner in one or more embodiments.
[0057] Throughout this disclosure, references to components or modules generally refer to items that logically can be grouped together to perform a function or group of related functions. Like reference numerals are generally intended to refer to the same or similar components. Components and modules can be implemented in software, hardware, or a combination of software and hardware. The term “software” is used expansively to include not only executable code, for example machine-executable or machine-interpretable instructions, but also data structures, data stores and computing instructions stored in any suitable electronic format, including firmware, and embedded software. The terms “information” and “data” are used expansively and includes a wide variety of electronic information, including executable code; content such as text, video data, and audio data, among others; and various codes or flags. The terms “information,” “data,” and “content” are sometimes used interchangeably when permitted by context. It should be noted that although for clarity and to aid in understanding some examples discussed herein might describe specific features or functions as part of a specific component or module, or as occurring at a specific layer of a computing device (for example, a hardware layer, operating system layer, or application layer), those features or functions may be implemented as part of a different component or module or operated at a different layer of a communication protocol stack. Those of ordinary skill in the art will recognize that the systems, apparatuses, devices, and methods described herein can be applied to, or easily modified for use with, other types of equipment, can use other arrangements of computing systems such as client-server distributed systems, and can use other protocols, or operate at other layers in communication protocol stacks, than are described.
[0058] It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.