Abstract:
An email-based e-commerce system is disclosed with additional features for added security. The system may include security features for email based e-commerce providing added assurance to customers of a higher level of protection than generally required. These security features enhance the password reset function without requiring a password, generate confirmations on outside messaging systems and implement an oversight management tool for authorizing transactions. The methods and apparatus described herein may enhance security by designing a system that can confirm payments through a separate non-email based media. The e-commerce system may send alerts or requests for confirmation in a variety of media to ensure a secure payment process. The methods and apparatus described herein may expand the list of individuals that may request or approve payments based on a single account registered by a single credit card holder. A single user may receive requests from registered sub-customers for payments by email.
Abstract:
The invention concerns a method of making a payment transaction between a customer and a merchant using a payment card (200) of the customer including steps of: transmitting details of the payment transaction from a mobile device (202) to a remote server; capturing at least one image of the payment card using the mobile device of the merchant; transmitting the at least one image of the payment card to the remote server; identifying, by the remote server, the merchant and the payment card captured in the at least one image; and implementing the payment transaction between bank accounts (208, 210) of the customer and the merchant.
Abstract:
A novel method of providing verifications for access to stored data programs within a cloud server protocol is provided. Such a method is operated through the implementation of a specific algorithm that permits a cloud server the means to communicate directly, reliably, safely, and nearly instantaneously with an individual (or his or her proxy) (at multiple contact points) for verification purposes in relation to an established data program stored within such a cloud server (whether in terms of written documentation, bank account, secure information, etc.). Such verifications may thus permit quick and reliable access to secured cloud programs such that only those individuals (or other entities) that are authenticated for such access through the utilization of such a verification procedure are permitted in such an instance.
Abstract:
A method and system for conducting an online payment transaction through a point of sale device. The method includes receiving input from a user selecting an item for purchase through the point of sale device; calculating a total purchase amount for the item in response to a request from the user to purchase the item; and sending payment authorization for the total purchase amount from the point of sale device to a payment entity, in which the payment authorization is sent to the payment entity via a mobile communication device of the user. The method further includes receiving a result of the payment authorization from the payment entity through the mobile communication device; and completing the payment transaction based on the result of the payment authorization.
Abstract:
The present invention provides a service for allowing secure financial transactions to be carried out, the service involving authenticating a user's identity and/or status as part of a financial transaction with another party and in the event that the user is authenticated arranging for the transaction to be completed without revealing the user's financial details and/or other personal details to that other party. Authentication data and transaction data may be communicated over any suitable communications channel(s). The invention provides a trusted authentication and payment environment that protects a user's financial details, but allows them to be securely authenticated and arranges for transactions to be fulfilled, whilst providing other parties with reassurance that transactions will be completed. In this way, fraud and theft due to misappropriation of financial details can be minimized.
Abstract:
A system may include a communication interface configured to communicate with a mobile device and processing logic. The processing logic may be configured to receive authorization from the mobile device, when the mobile device is located proximate to the system, for a first payment for a good or service, and transmit a communication to the mobile device subsequent to receiving the authorization from the mobile device, where the communication is transmitted when the mobile device is not located proximate to the system. The processing logic may further be configured to receive authorization from the mobile device for a second payment in response to the communication.
Abstract:
A method and system for processing payment transaction at a computing device is provided. The method includes receiving a payment request at the computing device from a purchaser terminal, the payment request including purchaser information, determining whether payment information associated with the purchaser information exists at the computing device, and processing payment transaction using the payment information if it is determined that the payment information associated with the purchaser information exists at the computing device.
Abstract:
A method and a system authenticate an identity of an entity or a user (16) transacting with a remotely accessible transaction host (10). A first message (32), encoded using a first transaction verification code, including a verification response address associated with the transaction host, is transmitted over a first communication channel (20) to a remote client device (18). A verification response number (address) is provided for communication from a remote communication device (22) with the transaction host over a second communication channel (26) with a second message (36) encoded by using a second transaction verification. The first and second transaction verification codes are compared. The identity of an entity or a user having transmitted the second message is authenticated, if the second message, received by the transaction host at the verification response address, has the second transaction verification code correspond to the first transaction verification code.
Abstract:
The present invention relates to a method to handle the authentication of a user of a device with an operator, said operator needing a user identifier for the purchase of additional element of an application installed in the device, said method implemented by a dedicated client component of the application. The invention also concerns an authentication server, a device and a software development kit to implement the method within an application in a device.
Abstract:
A method and apparatus for sending a code grid representing an indication of payment for a good or service from a service provider (107), to a customer's portable communication device (101) using SMS messaging is disclosed. In response to receiving a request from a customer to purchase good or service, the code grid is created. The code grid is then sent to the customer's portable communication device in a SMS message.