Abstract:
A method for processing a personalized gift card transaction includes: receiving a gift card request from a consumer associated with a payment account, the request including a usage amount, a plurality of merchant identifiers, an account identifier associated with the payment account, and a message; identifying a personalized gift card number; storing a gift card data entry including the personalized gift card number, usage amount, plurality of merchant identifiers, account identifier, and message; transmitting the personalized gift card number; receiving an authorization request for a financial transaction not involving the consumer, the request including the personalized gift card number, a transaction amount, and at least one merchant identifier of the plurality of merchant identifiers; processing the financial transaction including updating, in the database, the usage amount of the gift card data entry based on the transaction amount; and transmitting the message to a recipient of the personalized gift card.
Abstract:
A credit card system is provided which has the added feature of providing additional limited use credit card numbers and/or cards. These numbers and/or cards can be used for a single or limited use transaction, thereby reducing the potential for fraudulent reuse of these numbers and/or cards. The credit card system finds application to “card remote” transactions such as by phone or Internet. Additionally, when a single use or limited use credit card is used for “card present” transactions, so called “skimming” fraud is eliminated. Various other features enhance the credit card system which will allow secure trade without the use of elaborate encryption techniques. Methods for limiting, distributing and using a limited use card number, controlling the validity of a limited use credit card number, conducting a limited use credit card number transaction and providing remote access devices for accessing a limited use credit card number are also provided.
Abstract:
A credit card system is provided which has the added feature of providing additional limited use credit card numbers and/or cards. These numbers and/or cards can be used for a single or limited use transaction, thereby reducing the potential for fraudulent reuse of these numbers and/or cards. The credit card system finds application to “card remote” transactions such as by phone or Internet. Additionally, when a single use or limited use credit card is used for “card present” transactions, so called “skimming” fraud is eliminated. Various other features enhance the credit card system which will allow secure trade without the use of elaborate encryption techniques. Methods for limiting, distributing and using a limited use card number, controlling the validity of a limited use credit card number, conducting a limited use credit card number transaction and providing remote access devices for accessing a limited use credit card number are also provided.
Abstract:
A transaction processing system for the real time authorization of payment transactions. The system comprises a verification system (4) connected to an issuer card management system (3). A cardholder can access the system via an interface (2) which can be for example the Internet, a wireless device, telephone, or a branch visit. The interface allows the cardholder to input rules governing how their credit card transactions are to be authorized. When the cardholder initiates a purchase transaction with their credit card, an authorization request is passed from the card network to the verification system which executes the rules created by the cardholder in order to approve or deny the transaction.
Abstract:
A credit card system is provided which has the added feature of providing additional limited use credit card numbers and/or cards. These numbers and/or cards can be used for a single or limited use transaction, thereby reducing the potential for fraudulent reuse of these numbers and/or cards. The credit card system finds application to “card remote” transactions such as by phone or Internet. Additionally, when a single use or limited use credit card is used for “card present” transactions, so called “skimming” fraud is eliminated. Various other features enhance the credit card system, which will allow secure trade without the use of elaborate encryption techniques. Methods for limiting, distributing and using a limited use card number, controlling the validity of a limited use credit card number, conducting a limited use credit card number transaction and providing remote access devices for accessing a limited use credit card number are also provided.
Abstract:
Controlled Payment Numbers (CPNs) which issue as a unique payment number for each transaction uniquely identify the transaction for matching the purchase and payment information. The issuance of the CPN is controlled by business rules which are designed to and effectively restrict the use of the CPN, such that if a user exceed his authorization, a CPN is not issued. The business rules are set-up according to a heirarchy of users. Further, a declining balance CPN is also provided.
Abstract:
A credit card system is provided which has the added feature of providing additional limited use credit card numbers and/or cards. These numbers and/or cards can be used for a single or limited use transaction, thereby reducing the potential for fraudulent reuse of these numbers and/or cards. The credit card system finds application to nullcard remotenull transactions such as by phone or Internet. Additionally, when a single use or limited use credit card is used for nullcard presentnull transactions, so called nullskimmingnull fraud is eliminated. Various other features enhance the credit card system, which will allow secure trade without the use of elaborate encryption techniques. Methods for limiting, distributing and using a limited use card number, controlling the validity of a limited use credit card number, conducting a limited use credit card number transaction and providing remote access devices for accessing a limited use credit card number are also provided.
Abstract:
A transaction processing system for the real time authorization of payment transactions. The system comprises a verification system (4) connected to an issuer card management system (3). A cardholder can access the system via an interface (2) which can be for example the Internet, a wireless device, telephone, or a branch visit. The interface allows the cardholder to input rules governing how their credit card transactions are to be authorized. When the cardholder initiates a purchase transaction with their credit card, an authorization request is passed from the card network to the verification system which executes the rules created by the cardholder in order to approve or deny the transaction.
Abstract:
A method for processing a personalized gift card transaction includes: receiving a gift card request from a consumer associated with a payment account, the request including a usage amount, a plurality of merchant identifiers, an account identifier associated with the payment account, and a message; identifying a personalized gift card number; storing a gift card data entry including the personalized gift card number, usage amount, plurality of merchant identifiers, account identifier, and message; transmitting the personalized gift card number; receiving an authorization request for a financial transaction not involving the consumer, the request including the personalized gift card number, a transaction amount, and at least one merchant identifier of the plurality of merchant identifiers; processing the financial transaction including updating, in the database, the usage amount of the gift card data entry based on the transaction amount; and transmitting the message to a recipient of the personalized gift card.
Abstract:
A credit card system is provided which has the added feature of providing additional limited use credit card numbers and/or cards. These numbers and/or cards can be used for a single or limited use transaction, thereby reducing the potential for fraudulent reuse of these numbers and/or cards. The credit card system finds application to “card remote” transactions such as by phone or Internet. Additionally, when a single use or limited use credit card is used for “card present” transactions, so called “skimming” fraud is eliminated. Various other features enhance the credit card system, which will allow secure trade without the use of elaborate encryption techniques. Methods for limiting, distributing and using a limited use card number, controlling the validity of a limited use credit card number, conducting a limited use credit card number transaction and providing remote access devices for accessing a limited use credit card number are also provided.