摘要:
The system and method described allow electronic valuables to be transferred between two users each provided with a communication device adapted to exchange data through an interconnected data network such as for example, the Internet. The transfer of electronic valuables occurs following the exchange of preparatory messages for handling valuables, which messages are duly completed, finalized and approved by the users involved before the transfer is made.
摘要:
Die vorliegende Erfindung ist gerichtet auf ein Verfahren zur Anonymisierung von Transaktionen einer Blockkette, welches es ermöglicht, dass beispielsweise ein Besitzer eines Gegenstands in einer Datenhistorie bzw. einer sogenannten Blockkette Information bezüglich vergangener Transaktionen bzw. Datenbeständen erhält, nicht jedoch zukünftige Besitzer. So kann beispielsweise eine Information bezüglich einer Fahrzeugwartung stets dem aktuellen Besitzer zugänglich gemacht werden, ohne dass dieser aktuelle Besitzer Information bezüglich zukünftiger Besitzer abrufen kann. Die Erfindung ist ferner gerichtet auf ein entsprechend eingerichtetes Kommunikationsprotokoll sowie auf ein Kommunikationssystem zur Anonymisierung von Transaktionen einer Blockkette. Ferner wird ein Computerprogrammprodukt vorgeschlagen, mit Steuerbefehlen, welche das vorgeschlagene Verfahren ausführen bzw. das vorgeschlagene Kommunikationssystem betreiben.
摘要:
Disclosed are exemplary embodiments of systems and methods for facilitating services associated with transaction requests. In an exemplary embodiment, a method generally includes receiving, from a first entity, a transaction request for a payment account transaction. The transaction request includes a primary account number (PAN) for a payment account involved in the transaction. The exemplary method also includes overwriting the PAN in the transaction request with a non-PAN identifier (NPI), where a first segment of the PAN is identical to a first segment of the NPI and where the NPI is an invalid PAN. The exemplary method further includes routing the transaction request to a service, whereby the service is able to be implemented for the transaction request based, in part, on the first segment of the NPI while the PAN remains anonymous to the service.
摘要:
Embodiments concern a dynamic authorization framework. Security Classification Process (SCP) is the process of classifying raw data, information extracted from raw data, content or code from security-value perspective. Security Achievability Determination Process (SADP) is a process based on a SV/SC that has been assigned, the RHE may determine the Security Requirements and how the security requirements may be achieved. During the Security Achievability Listing Process (SALP), the RHE uploads onto the Resource Listing Entity (RLE) the URI of the resource, the SAM associated with the resource and optionally a digital certificate associated with the resource. During the SAM Assessment Process (SAMAP) process, a Client evaluates the security mechanisms that must be carried out in order to meet the SAM that was provided as part of the Discovery Process (DP). Based on the SAM obtained from the RLE, the Client may initiate a Security Achievability Enabling Process (SAEP). The Client may be required to initiate an Authentication, Authorization, Payment and obtain an assertion of secure behavior from a Security -Achievability Enabler Function (SAEF), which may be a trusted third-party Function or Entity.
摘要:
A user requests to utilize anonymized user data to conduct a transaction. The anonymized user data keeps the users sensitive data private, while still allowing certain entities to perform fraud analyses. The user configures a specific combination of user data elements to be anonymized prior to or at the time of the transaction. In some embodiments, the specific combination may be associated with a location or merchant type, which can also be selected by the user. The registration of a password associated with the anonymized user data may further increase security of the transaction.
摘要:
A web browser inserts a user-neutral identifier into its webpage requests. A proxy server creates records of the webpage requests, and further processes these records to create and update profiles for the corresponding user-neutral identifiers. Upon receiving a webpage request including payment transaction information, which is redirected from a payment provider, the proxy server determines whether payment should be processed by analyzing one or more data elements in the request in view of the corresponding profile. Upon determining that the payment should be processed, the proxy server forwards the payment transaction information to a payment provider. By indexing the profiles according to user-neutral identifiers, rather than specific user information, user privacy can be maintained while still being able to authenticate whether a payment transaction is legitimate.
摘要:
In a system for protecting account identifiers in financial transactions, a consumer provides an account identifier to be used for purchasing a good or service from a merchant. However, only a portion of the account identifier is transmitted to the merchant. The remaining portion of the account identifier is transmitted to a server, referred to as a "payment facilitator," that is not controlled by the merchant. During the financial transaction, the merchant submits a request for financial payment containing a portion of the consumer's account identifier to the payment facilitator. The payment facilitator combines the account identifier portion in the request with the account identifier portion transmitted to it from the consumer in order to determine the consumer's full account identifier. The payment facilitator then submits a request for financial payment to a financial institution for approval.
摘要:
Aspects of the present invention relate to systems and methods for increasing security and privacy of financial transactions. More specifically, certain aspects of the invention provide consumers, financial institutions, and/or merchants with increased protection of sensitive information associated with financial accounts and transactions. Herein disclosed are methods and systems for allowing a consumer to pay a merchant without the consumer needing to disclose confidential information to the merchant.
摘要:
A system for processing a debit transaction between a merchant and a consumer. The system includes one or more processors programmed to receive payment information for the consumer, collect authentication data for the debit card from the consumer, transmit an alias account number unique to the debit transaction to the merchant, receive a credit authorization message including the alias account number from the merchant, translate the credit authorization message to a debit authorization message using the authentication data, and transmit the debit authorization message to a payment processor.
摘要:
Techniques for eliminating the need for merchants and acquirers to conduct Payment Card Industry ("PCI") security audit procedures are provided. Merchants and acquirers can eliminate the operating expenses associated with conducting audits to ensure compliance with PCI Data Security Standards ("DSS"), while at the same time ensuring that cardholders' data remains secure, thus protecting the cardholders from fraudulent transactions. System security is further enhanced through the use of per transaction audits, with the scope of the audit being directly between the Point of Sale (POS) terminal and the payment processing network. PCI DSS compliance can thus be assured on a per transaction basis, as opposed to only ensuring compliance generally for a merchant or acquirer on a periodic basis. Per transaction PCI DSS compliance is assured, while at the same time eliminating the need for merchants or acquirers to conduct compliance audits.