摘要:
Systems, apparatus, and methods are provided for efficiently authorizing a transaction initiated by a consumer. An authorization can be generated before the consumer actually initiates the transaction. For example, a future transaction can be predicted, and an authorization can be generated for the predicted transaction. In this manner, the authorization can be ready and quickly used when the consumer does initiate the transaction. Previous transactions made by the consumer can be used to predict when the future transaction is likely. In various examples, the authorization can be sent to a specific merchant or to the consumer for use when the consumer initiates the predicted transaction, or saved by an authorization server for use in response to an authorization request from the merchant.
摘要:
A method is disclosed. The method includes generating a uniquely derived data string using personalized information and a first encryption algorithm, generating at least one uniquely derived key using the uniquely derived data string, and creating a dynamic verification value using a second encryption algorithm using the at least one uniquely derived key, wherein the first encryption algorithm is different than the second encryption algorithm.
摘要:
Systems and methods of converting transactions to a new currency and tax processing based on the location of the mobile communication device. The systems and methods send transaction information including a transaction amount associated with a transaction conducted between a merchant and a consumer at an access device, to a server computer. The server computer determines a location of a mobile communication device operated by the consumer and converts an transaction amount to a currency based on a conversion rate based on the location of the mobile communication device or determines a tax amount based on the transaction amount and based on the location of the mobile communication device. The method also receives the converted transaction amount or the tax amount.
摘要:
A method for authenticating a consumer. The method includes receiving an authorization request message associated with a consumer conducting a transaction with a portable consumer device. A challenge message is sent to the consumer, where the challenge message is dynamic or semi-dynamic. A challenge response message is received from the consumer, and an authorization response message is sent to the consumer. The authorization response message indicates whether or not the transaction is authorized.
摘要:
A method and system for using a secured account number for processing proximity types of wireless financial transactions associated with portable consumer proximity devices is disclosed. In one embodiment, the method includes receiving a proximity type of wireless financial transaction request along with a secured account number from a portable proximity consumer device such as a contactless smart card, converting the secured account number to the user's real account number, and transmitting the financial transaction request along with the user's real account number to the issuer of the user's real account number for authorization and processing.
摘要:
A computer-implemented method for predicting financial risk, which includes receiving first transaction data pertaining to transactions performed on a first financial account. The first financial account represents a financial account issued to a given account holder by a first account issuer. The method further includes receiving second transaction data pertaining to transaction performed on a second financial account different from the first financial account. The second financial account represents a financial account issued to the given account holder by a second account issuer different from the first account issuer. There is further included scoring the first transaction data and the second transaction data based on a preexisting model to form a score for the account holder. Additionally, there is included transmitting, if the score is below a predefined financial risk threshold, the score to one of the first account issuer and the second account issuer.
摘要:
In order to make it more difficult to obtain numbers that can be used to conduct fraudulent transactions, a portion of a real account number is encrypted. The encrypted portion of the account number is used to generate a new account number, a new expiration date, and a new verification value. This information can be determined using processor that may reside in a point of sale terminal, a smart card, or a computer operated by a user. The new account number, the new expiration date, and the new verification value can be used in a payment transaction. A server computer in a central payment processing network may determine that the new account information is not the real account information, and may subsequently generate a modified authorization request message using the real account information and may send it to an issuer for approval. The transmission of data is more secure, since real account information is not sent from the merchant to the payment processing network.
摘要:
A method is disclosed. The method includes generating an initial key after interacting with an access device, storing the initial key at a key storage location, altering the initial key with a public key to form an altered key, and sending the altered key to a server computer along with an identifier for the access device. The altered key is changed to the initial key at the server computer and is stored with the identifier in a database in operative communication with the server computer. The initial keys that are stored at the key storage location and in the database are used to alter and restore transaction data associated with multiple financial transactions that are conducted using the access device.
摘要:
A method and computer readable medium for conducting a transaction, comprising receiving a verification value and a portion of a dynamic data element, determining candidate dynamic data elements using the portion of the dynamic data element, calculating candidate verification values using candidate dynamic data elements, and determining if the received verification value matches any of the candidate verification values, wherein the transaction is thereafter authenticated if a candidate verification value matches a candidate verification value.
摘要:
Techniques for eliminating the need for merchants and acquirers to conduct Payment Card Industry (“PCI”) security audit procedures are provided. Merchants and acquirers can eliminate the operating expenses associated with conducting audits to ensure compliance with PCI Data Security Standards (“DSS”), while at the same time ensuring that cardholders' data remains secure, thus protecting the cardholders from fraudulent transactions. System security is further enhanced through the use of per transaction audits, with the scope of the audit being directly between the Point of Sale (POS) terminal and the payment processing network. PCI DSS compliance can thus be assured on a per transaction basis, as opposed to only ensuring compliance generally for a merchant or acquirer on a periodic basis. Per transaction PCI DSS compliance is assured, while at the same time eliminating the need for merchants or acquirers to conduct compliance audits.