US12293355B2 - Status system with data security for transactions - Google Patents
Status system with data security for transactions Download PDFInfo
- Publication number
- US12293355B2 US12293355B2 US17/350,415 US202117350415A US12293355B2 US 12293355 B2 US12293355 B2 US 12293355B2 US 202117350415 A US202117350415 A US 202117350415A US 12293355 B2 US12293355 B2 US 12293355B2
- Authority
- US
- United States
- Prior art keywords
- client
- data
- account
- merchant system
- tokenized
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
- G06Q20/202—Interconnection or interaction of plural electronic cash registers [ECR] or to host computer, e.g. network details, transfer of information from host to ECR or from ECR to ECR
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/389—Keeping log of transactions for guaranteeing non-repudiation of a transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
Definitions
- the present disclosure relates generally to data security and transactions.
- the systems and methods described herein may be used to implement data security in a variety of transactional contexts, and particularly modular integration of data security in transaction websites.
- Clients often seek to obtain and use credit from a lending institution for a variety of purposes.
- a client may interact with a merchant in an environment where the client does not have access to the client's account number, or where the client prefers additional security and protection for the client's data.
- Managing a transaction in such environments can create barriers to completing transactions between clients, merchants, and lenders.
- other considerations can be involved in such transactions, such as lender and merchant concerns related to fraud, and regulatory controls on data sharing when the data used in such transactions can be subject to a variety of privacy and regulatory considerations.
- Such considerations can further create barriers in the context of network communications and data management in a communication system for the data used to facilitate credit options and associated purchase transactions.
- Disclosed examples may provide a framework to implement data security for client data used as part of a network transaction, and to manage merchant access to tokenized client data that protects client data security while facilitating transactions.
- an independent structure for transaction authorization can be implemented, where a merchant may want to also offer secure validation of client accounts.
- Examples described herein include systems and methods that allow account number lookup and account number validation to be enabled within a merchant system while protecting client data from the merchant system. These data lookup operations can be done with a security system that validates the merchant system, and then interacts with a client system to perform lookup or validation for client data while maintaining client data security.
- a data security system can be invoked via an interface element included in a merchant user interface. Selection of the interface element can be used as part of a secure transaction to allow a client to perform an account lookup operation or an account validation operation.
- selection of the associated interface element by a client device interacting with a merchant website causes a checkout communication to be initiated by a merchant system.
- the account security system initially uses the checkout communication to authenticate the merchant system (e.g. confirming that the checkout communication is from a validated checkout system).
- the associated operations can occur in real-time (e.g., occurring immediately or nearly immediately within the context of communications that occur over a fixed amount of time, such as within 1 second) during a transaction to add security to transactions and associated real-time communications. Examples described herein improve the operation of devices and networks with improved security and privacy that can be added to existing devices and networks in real-time secure communication environments.
- the data security system can then generate a client token for the merchant system that can be sent to the client device to confirm that the merchant system has been validated.
- the client device can then open a modal (e.g. an interface overlay on top of the merchant website interface) that is used for a communication channel with the account security system.
- This modal allows the merchant website to maintain a consistent look, feel, and interface flow while isolating the merchant system from sensitive client data.
- the communication channel between the client device and the account security system can be used to transmit identifying client information to the account security system, so that the account security system can provide information for the secure transaction.
- Account security can include account lookup information, such as providing an account number to a client.
- Account security can also include account verification, including verifying an account number and providing account details such as an available balance.
- This account data can then be tokenized to provide security and to isolate the merchant system from the actual data.
- the tokenized data is then available to be provided to a merchant system if requested by the merchant system for use in completing a secure transaction.
- a data security system can implement improvements in security, performance, and access to tokenized data to facilitate a secure transaction using a data pull system for tokenized data.
- a merchant system can submit a status inquiry when the merchant system receives a notice that a modal and associated communication channel between a client device and an account security system close. The closure can trigger the merchant system to send a status inquiry to the account security system to request postback data including a tokenized client account number.
- Different examples described herein can perform various operations and communications to access the postback data or communicate system failures that allow a merchant system to respond appropriately. In some examples, this can include resubmitting the request (e.g. when timing errors cause the issue) or to proceed with an alternate system when aspects of the account security system are not available or not functional.
- the account security system can perform additional operations including receiving a checkout communication associated with a secure transaction.
- an account security system can function where the checkout includes data describing a validated checkout system, and where, when the checkout communication is received from a merchant system, the checkout communication does not include client information.
- the account security system can then process the checkout communication to authenticate that the checkout communication is from the validated checkout system, and generate a client token in response to an authentication that the checkout communication is from the validated checkout system.
- the client token can then be transmitted, so that when the client token is received at the client device, the client token is used to verify the merchant system.
- the account security system receives an account communication including the client token and client information (e.g.
- the client information is not received from the merchant system
- the tokenized client account number is then transmitted for use in facilitating the secure transaction, where the tokenized client account number allows the merchant system to process the secure transaction without access to the client information.
- Additional examples or variations can include further security operations to confirm the security of a client device, and to enable interactions with other systems as part of a secure transaction.
- the examples described above improve the operation of transaction communications systems and devices in such communication systems by improving device security and security of sensitive data within such devices and systems.
- interfaces described herein improve both the operation of devices displaying such interfaces and communication systems used by such devices by improving the operation flow and reducing the number of user actions to perform operations as part of a secure transaction, as well as by enabling new functionality in system devices.
- FIG. 1 depicts aspects of a system that can be used for data security in accordance with examples described herein.
- FIG. 2 depicts aspects of an account security system for implementing data security in accordance with some examples.
- FIG. 3 depicts aspects of a system and system operations for data security in accordance with some examples.
- FIG. 4 depicts aspects of a system and user interfaces for data security in accordance with some examples.
- FIG. 5 depicts aspects of a system and user interfaces for data security in accordance with some examples.
- FIG. 6 depicts aspects of a system and system operations for data security in accordance with some examples.
- FIG. 7 depicts aspects of a system and system operations for data security in accordance with some examples.
- FIG. 8 is a flow diagram illustrating a method in accordance with some examples.
- FIG. 9 depicts aspects of a system and system operations for data security in accordance with some examples.
- FIG. 10 depicts aspects of a system and system operations for data security in accordance with some examples.
- FIG. 11 depicts aspects of a system and system operations for data security in accordance with some examples.
- FIG. 12 depicts aspects of a system and system operations for data security in accordance with some examples.
- FIG. 13 is a flow diagram illustrating a method in accordance with some examples.
- FIG. 14 shows a computing system architecture including various components in electrical communication with each other using a connection in accordance with various examples.
- client facing systems for transactions e.g. merchant websites
- client facing systems for transactions e.g. merchant websites
- Certain systems can be implemented without structures for secure client account validation or data security. Examples described herein include modular features to add user interface elements and underlying systems to enable account number lookup and use in a modular fashion that can be integrated with an existing website.
- tokenized account number By enabling a tokenized account number as well as additional validation and security features, sensitive client data can be kept secure and never shared with a merchant system. Instead, the merchant system can use tokenized data that keeps the actual client data secure.
- allowing modular integration e.g. with the addition of a single user interface button that calls a modal or overlay in the website) provides a way to provide account validation without reorganizing existing systems for payment authorization and settlement, thus improving the operation and function of existing devices and device configurations with added data security.
- Some examples described herein allow merchant systems to pull postback data including tokenized client account numbers from an account security system.
- Such data pull functionality can include account security system operations for processing status requests associated with a transaction from a merchant.
- An account security system can then respond with data including a tokenized client account number when the status request is identified as valid and secure. If validity or security issues are identified for a status request received from a merchant system, a response indicating some aspect of the problem can be returned to the requesting merchant system, allowing the merchant system to respond appropriately. In some examples, this can include resubmitting the request (e.g. when timing errors cause the issue) or to proceeding with an alternate system when aspects of the account security system are not available or not functional.
- Such pull examples can improve the functionality of a system and reduce system errors when compared with push systems where transaction failures can be caused by the merchant system attempting to access data prior to the data being pushed to the merchant system.
- Examples described herein can allow a checkout button associated with an account security system to be added to a website.
- This button allows an interface for account lookup and verification to facilitate custom payment solutions selected by a merchant.
- the button is provided to client devices as part of a web page user interface from a merchant system.
- client interacting with a merchant website clicks the described modular button various operations for account security are initiated.
- the merchant system responds to this selection by communicating with an account security system to authenticate the merchant system.
- the account security system can then return a client token and postback identifier if the merchant is authenticated. This response information can be used to initiate a modal on the client's device as part of the merchant website user interface.
- the modal can appear as integrated with the merchant website, but rather than using the existing channel between the client device and the merchant system, the modal uses a separate communication channel between the client device and the account security system. This channel allows the client to provide sensitive client information as part of client verification or account access (e.g. for account lookup or account verification operations).
- the account security system can then generate tokenized client data for use with the merchant.
- the tokenized client data keeps the regular client data secure and separate from the merchant system, while allowing the merchant system to perform operations for a secure transaction, so that the merchant can receive payment while only having access to secure (e.g. tokenized) client data that does not put the client's sensitive information at risk.
- the initial modal and channel between the client device and the account security system can be initiated, in some examples, only after the client device has been determined to be secure (e.g. using a security analysis of the device). Additionally, other examples can add additional security operations, or can perform different operations for any number of accounts associated with clients.
- the account security system is modular and independent of other operations for a secure transaction, after the account validation is performed and the tokenized client data is generated, the merchant device can interact with separate independent systems to finalize and settle the secure transaction. In various examples, the account security system may communicate with such independent systems to facilitate the use of the tokenized data. Details of selected examples are below, though it will be apparent that additional implementations are possible other than the specific examples provided.
- Such examples allow the use of both push systems and pull systems to allow different merchant systems to access tokenized client data.
- the push systems improve the operations of a transaction system and associated devices by avoiding synchronization errors and providing additional system security.
- the use of both push and pull systems for different merchant systems using an account security system allows additional system flexibility and functionality, improving the overall operation of an account security system over systems that only provide a push system or a pull system.
- FIG. 1 is a block diagram of a payment communication network 100 in which network data management and security for transactions is implemented in accordance with some examples.
- the example payment communication network 100 includes a merchant 102 implementing a merchant system 108 , which can be one or more networked computing devices that can be networked.
- Merchant system 108 can include any number of devices (e.g. a checkout register, point of sale (POS) devices, or any other such device) as well as server systems and computers that implement a website that can be used to perform secure transactions over a network 120 .
- the merchant system 108 and associated website can be implemented as a computing device with architecture 1400 described below and illustrated in FIG. 14 .
- the merchant system 108 is configured to perform operations associated with a purchase transaction for a client 122 and a product 128 .
- a client can use a client device 124 (e.g., a cellular telephone, laptop computer, a desktop computer, etc.) associated with a client account to interact with merchant system 108 as part of a secure transaction.
- client device 124 can include a display device 126 (e.g., a conventional touch screen) and wireless or wired network connections to network 120 .
- the client device 124 includes software 116 that can additionally cause display of user interfaces 118 on display device 126 in accordance with various examples. This can include, as described herein, web browser software as part of software 116 that can display a user interface using data received from a website of merchant system 108 .
- a client 122 may select one or more products 128 for purchase via interface(s) of the merchant's website.
- the client device 124 interacts with the merchant system 108 via a website interface, the merchant system 108 can use a payment channel based on the particular client device 124 and options selected by client 122 .
- the merchant system 108 generates and communicates an authorization request message with authorization and payment settlement system(s) 130 as part of a secure transaction.
- the authorization request message can be routed to an authorization system, with the authorization system 130 processing the authorization request message to generate an authorization response.
- An authorization entity can operate one or more authorization computing devices as part of an authorization system 130 configured as part of a payment communication network 100 .
- the authorization system 130 can include various sub-systems or component functions implemented on processors of the authorization system to enable authorization of payment transactions between client 122 and merchant 102 .
- the authorization system 130 can include validation and fraud systems as well as a promotion system. These systems can be systems that operate in addition to similar systems of account security system 140 or independent fraud detection system 150 .
- Validation and fraud systems of system 130 can include computing systems for validating card numbers from client device 124 to confirm that credit or payment funds are available to match the purchase amount associated with a transaction being authorized. Additional fraud analysis operations can analyze and process information associated with any aspect of a transaction to approve or deny an authorization request.
- an authorization system can in various implementations, include additional systems for security, fraud detection, and other functionalities.
- Some implementations can include a token service that can act in a number of ways to facilitate secure communications between client 122 and various other services and devices, including retail merchant system 108 and other systems.
- Tokenization is a process of substituting sensitive data elements with non-sensitive equivalents (e.g. tokens).
- the token is a reference identifier that can be mapped to the sensitive data via token service.
- Such a token service can use large random number in combination with other systems, such as timing systems, to limit and secure the use of sensitive data being communicated over networks such as networks 120 .
- authorization system 130 can be integrated with other systems, such as a credit issuing system and communication channels with a client 122 outside the authorization channels used to communicate authorization request messages and responses between merchant devices and devices of an authorization system (e.g. authorization system 130 ).
- a credit issuing system and communication channels with a client 122 outside the authorization channels used to communicate authorization request messages and responses between merchant devices and devices of an authorization system (e.g. authorization system 130 ).
- authorization system 130 various additional functionality can be integrated for security and payment systems improvements, such as the use of token services as described above.
- payment communication network 100 illustrates communications between various systems and devices, including merchant system 108 , client device 124 , authorization system 130 , account security system 140 , fraud detection system 150 , and network 120 , in additional examples, other aspects of payment communication network 100 can further be altered or include additional or intervening elements, such as multiple clients, clients with shared accounts and devices, additional merchant or retailer systems, subsystems that can operate independently, additional communication channels, or other such structures.
- Fraud detection system(s) 150 can include any independent service or system that can be used by account security system 140 or authorization system 130 to supplement or support fraud or security systems.
- fraud detection system 150 can include systems for detecting if a computer of merchant system 108 or a user device 124 has been compromised by malicious software or other security risks.
- Fraud detection as described herein can include the use of independent data identifying such issues, as well as communications and analysis operations performed with such devices before they are allowed to participate in secure transactions with account security system 140 and/or authorization system 130 . Additional examples can include other such security and fraud detection schemes to support the implementation of secure transactions as described herein. Additional details of an account security system 140 are described below, and in various examples, fraud detection system(s) 150 can be implemented with varying degrees of integration with an account security system 140 .
- FIG. 2 depicts aspects of an example account security system 140 , which can be used within a payment communication network 100 or other systems to implement data security as described herein.
- Account security system includes a number of different elements that can be implemented as modules or different devices networked to implement various security functions.
- Account security system can be implemented as a single server, or as a distributed system using multiple networked devices.
- Input/output systems 270 can manage transmission of data and receipt of data both between different elements of the system 140 as well as with other devices, such as merchant servers and client devices, using any suitable network and communication components, such as those described below with respect to FIG. 14 .
- the described elements of account security system 140 include merchant system verification 210 , client device verification 220 , account number lookup 230 , account verification, fraud detection 250 , and input/output systems 270 .
- these elements can be grouped in a variety of different ways.
- client device verification 220 and fraud detection 250 can, in some examples, be structured as a single sub-system, or can be largely implemented as a separate system (e.g. using separate fraud detection system(s) 150 ).
- the elements of account security system perform different parts of the operations to implement security as part of a secure transaction that uses modular elements to add to the security of larger systems.
- Merchant system verification 210 interacts with merchant systems such as merchant system 108 to authenticate that the merchant is safe for a user to perform a transaction with. This verification can be done using security measures such as using security keys, transaction history data, merchant registration, and other verification tools. Merchant system verification 210 can create tokens that can be used as part of a secure transaction to allow participants in the transaction to confirm that they are interacting with verified participants that have met security standards and have access to the token generated by merchant system verification 210 for a specific transaction.
- Client device verification 220 can include security operations to check for issues with a client's device, such as malicious software installed on a client device, a history of questionable transactions or fraud associated with a specific device, or other operations. This verification can be implemented via communication with a specific client device, accessing database data with fraud history data, or requiring installation of software on a client device to check for security issues with a client device.
- merchant system verification 210 operations and client device verification 220 operations can be used as gateways for additional sub-systems, such that merchant systems and client devices are not allowed access or use of additional systems such as account number lookup 230 and account verification 240 unless the threshold requirements of merchant system verification 210 and client device verification 220 have been met.
- Account number lookup 230 and account verification 240 interact with client devices to receive client data and access sensitive client account information. These operations can, for example, include receiving information such as an address, phone number, government identifier, or other such information, and using this information to access an account number associated with a client credit account.
- the client credit account number can then be provided to the client device or tokenization 260 element with an authorization to use the credit account with a specific secure transaction (e.g. a transaction associated with a client token generated by merchant system verification 210 .)
- account verification 240 can accept a client account number associated with the client credit account, and provide information such as an available balance to allow a client to confirm that the available balance is sufficient for a current secure transaction.
- the operations of account verification 240 and account number lookup 230 can be associated with a particular transaction, and used to trigger generation of tokenized client data by tokenization 260 element.
- This tokenization can involve generation of a one-time set of data that can be used only for a specific transaction.
- the tokenized client data is then stored until it is requested by the merchant system associated with the secure transaction, or until a deletion event occurs.
- deletion events can include a threshold amount of time, a number of incorrect requests for data associated with the client device or the client account, or other such events. If a deletion event occurs, a subsequent request for the data by the verified merchant can be met with a response indicating that the data has expired and the secure transaction is to be restarted (e.g. a new secure transaction initiated and the original transaction abandoned.)
- fraud detection 250 can monitor data and generate alerts or halt operations for a specific transaction when a risk of fraud is identified.
- FIGS. 3 - 5 then describe an implementation of a secure transaction with data securing and a modular website implementation in accordance with some examples.
- FIGS. 4 and 5 illustrate aspects a modular website with an interface that can be displayed on a client device (e.g. client device 124 ) as part of data security operations for aspects of a secure transaction illustrated by FIG. 3 .
- client device e.g. client device 124
- FIG. 4 illustrates a user interface 400 with a transaction flow indicator 410 , and product data 420 for a product (e.g. product 128 ) that has been selected for purchase using a merchant website (e.g. as part of merchant system 108 of merchant 102 ).
- the user interface 400 includes a general checkout 430 interface element that can initiate payment operations using a general settlement system, or can used directed account security checkout 440 element.
- the directed account security checkout 440 interface element is a modular interface element that can be added to a website of a merchant in order to initiate data securing operations via an account security system in accordance with examples described herein.
- a selection 450 of directed account security checkout 440 element occurs, a modal is launched to initiate a communication channel with an account security system (e.g. account security system 140 ), as illustrated by FIG. 5 .
- an account security system e.g. account security system 140
- FIG. 5 shows a user interface 500 with modal 510 overlaying user interface 400 .
- User interface 400 can be communicated to a client device from a merchant system, with various interactions with a merchant website leading to interface 400 being displayed on a screen of the user device.
- the modal 510 does not communicate via a merchant system, but establishes a communication channel with an account security system to keep sensitive client data separate from the merchant system.
- the modal 510 can then accept sensitive client data such as phone numbers, addresses, client identifiers, account numbers, and other such information. This information is kept separate from the merchant system, while the modal 510 allows modular integration of this independent data security structure (e.g. communications with data security system) within the context and user interface flow of the merchant website. Additional aspects of such interfaces are described below in the context of the examples shown in FIGS. 3 and 6 .
- FIG. 3 illustrates system operations and communications for data security as part of a secure transaction involving client device 124 , account security system 140 , and merchant system 108 .
- client device selects products for purchase as part of a secure transaction, and initiates the secure transaction (e.g. via a process to checkout selection of a user interface).
- Communication 304 informs merchant system 108 of the client device 124 selection, and in response, merchant system generates a checkout interface (e.g. interface 400 ) in operation 306 .
- the checkout interface includes a modular button, such as directed account security checkout 440 element of FIG. 4 , and the data for the user interface is communicated from merchant system 108 to client device 124 in communication 308 .
- the client device receives a selection for the account security system (e.g. selection 450 ), and this selection is communicated to merchant system 108 in communication 312 .
- a selection for the account security system e.g. selection 450
- the merchant system 108 receives an indication of the selection for the account security system in operation 314 , and generates a checkout communication in operation 314 , that is sent to account security system 140 in communication 316 .
- account security system operation 318 authenticates merchant system 108 to confirm that the merchant system is secure and has been validated.
- the account security system generates a client token when the authentication is confirmed, and communicates the client token to merchant system 108 in communication 320 .
- the client token can be communicated with a postback identifier to allow tracking of the communications for the secure transaction, and to allow management of different transactions with different client devices and merchant systems that can continuously be interacting with account security system 140 to provide data security for secure transactions.
- Processing of the checkout communication and associated generation of the tokens and additional communications to facilitate modal presentation can occur in real-time or near real-time (e.g., limited by processing and network speeds and latency), such that computing devices facilitating communications and security operations automatically perform operations and provide information within a transaction that occurs within a brief time period (e.g., less than 0.1 seconds in some environments, less than 1 second in some environments, or less than 3 seconds in some environments).
- the near real-time operations and communications allows an account security system 140 to operate between a merchant system 108 and a client device 124 while minimally degrading the near real-time nature of communications for a transaction between client device 124 and merchant system 108 , and improving device and system operation with added privacy and security.
- Merchant system 108 uses the client token from account security system to initiate the account security modal in operation 322 with communication 324 , which can include the use of the client token in communication 324 that, when received by client device 124 , allows the client device to perform security measures to confirm that merchant system 108 is a secure system and can safely perform the secure transaction.
- client device 124 opens a modal (e.g. modal 510 of user interface 500 . From a client perspective, the modal opens in response to a user interface selection (e.g. selection 450 ), and appears as part of an interface for the merchant system 108 website. As described above, the modal opened in operation 326 is used with a communication channel established between client device 124 and account security system 140 for communications 328 .
- Communications 328 for operations 326 and 330 can operate for various security operations, which can include operations to confirm that client device 124 is not presenting indications of a virus or security compromises, and can also include other fraud detection operations.
- the client device 124 can further provide sensitive client data to account security system 140 to perform operations in a secure environment as part of operations 326 and 330 , including account number lookup and account verification operations.
- tokenized client data can be generated in response to data and interface selections provided via the modal on client device 124 .
- the tokenized client data can be stored at account security system 140 until requested by the merchant system in operations 334 .
- Communications between client device 124 and account security system 140 can also occur in real-time or near real-time (e.g., as limited by processing speeds and latency in the devices and network) to provide a seamless user interface presentation as part of a transaction with merchant system 108 .
- the modal of operations 326 can, in some examples, close without the client device providing adequate information for the client to access account data or for tokenized client data to be generated.
- the client device can proceed with the transaction using a separate system (e.g. returning to interface 400 and selecting the general checkout 430 user interface element). Data associated with this failure can be logged and used to check against future fraud indications.
- closure of the modal on client device 124 can be considered the end of operations 326 , and this closure can be communicated to merchant system 108 in communication 332 .
- the closure causes merchant system 108 to request the security results from account security system in operation 334 using communications 336 , which result in account security system responding with the tokenized client data in operations 338 and responsive communications 336 .
- multiple instances of operations described above can occur simultaneously. For example, operation 306 for one transaction can occur simultaneously with any or every other operation of FIG. 3 for other transactions.
- a single device implementing an account security system 140 can automatically perform multiple instances of each of operations 318 , 330 , and 338 for different transactions at the same time.
- the independent modular data security operations provided by account security system 140 can be considered complete. Remaining payment and settlement operations can then be performed with a separate settlement system 130 , as illustrated by FIG. 6 .
- FIG. 6 includes not only client device 124 , merchant system 108 , and account security system 140 , but also includes authorization and payment settlement system 130 . As illustrated in FIG. 6 , the tokenized client data stored in account security system 140 after successful account access in operations 326 and 330 can then be accessed by merchant system 108 in operations 334 and 338 .
- the client device can confirm the use of the account associated with the tokenized client data for payment as part of the secure transaction, and in operations 608 , 612 , and 618 .
- the client device 124 selects an interface to initiate payment with communication 610 , and merchant system 108 then interacts system 130 for payment authorization in operations 612 and 618 with communication(s) 616 .
- the system 130 , merchant system 108 , and client device 124 can then later proceed with settlement operations 620 using communications 622 , including payments to the merchant, and client payment or reconciliation of any credit payment or account balance data between the client and the settlement system, without further involvement of account security system 140 . Similar to FIG. 3 above, FIG.
- FIG. 6 illustrates operations that can be implemented as real-time automatic operations, where multiple instances of operations described above can occur simultaneously.
- a single device implementing merchant system 108 can automatically perform multiple (e.g., thousands of simultaneous) instances of each of operations 334 , 602 , 612 , and 620 for different transactions at the same time.
- FIG. 7 further illustrates aspects of data security in example systems, particularly showing how sensitive client data is isolated from merchant systems.
- client device 124 can include client data 710 provided by a client or user of the client device 124 .
- communication of client data in communications 740 occurs with account security system 140 and may occur with authorization and payment settlement system 130 , so that systems 130 and 140 can both have access to sensitive client data 710 .
- the merchant system 108 is isolated from this client data 710 , so that merchant system 108 only receives tokenized client data 720 in communication(s) 760 .
- This tokenized data received by merchant system 108 is secure, so that the tokenized data does not allow merchant system 108 access to or sensitive information associated with the client data used to generate the tokenized data.
- the tokenized client data 720 is generated in system 140 , and is generated to obscure the actual client data, while allowing the merchant system to interact with systems 130 and 140 to facilitate payment.
- Various data can be shared with an authorization and payment settlement system 130 in communications 750 to allow the use of the tokenized client data in authorizing payments for the secure transaction.
- communications 750 do not include specific tokenized client data, but other data can be shared that facilitates system 130 accepting the tokenized client data 720 from merchant system 108 as part of a secure transaction.
- account security system 140 in addition to authorization and payment settlement system 130 provides benefits to a system in which merchant system 108 and system 130 have fixed structures or implementations that would require significant resources or changes to implement the account lookup and account verification features between merchant system 108 and system 130 .
- the use of account security system 140 enables such functionality with minor modular user interface changes by merchant system 108 website implementations, so that the security of the system 130 and merchant system 108 communications is improved without these systems needing to be replaced.
- FIG. 8 is a flow diagram illustrating an example method 800 .
- Method 800 can be performed by one or more processors of a server computer or server system as part of an account security system (e.g. account security system 140 ).
- Method 800 can, in some examples, be implemented as computer readable instructions that, when executed by processing circuitry of a device, cause the device to perform steps of method 800 .
- Method 800 includes operation 805 to receive, at an account security system comprising one or more processors, a checkout communication associated with a secure transaction.
- this checkout communication can be received from a merchant system, either directly through a wide area network (e.g. the Internet), or via additional systems.
- the checkout communication includes data describing a validated checkout system (e.g. the merchant system) sufficient to allow the account security system to analyze the security of the merchant system.
- the checkout communication when the checkout communication is received from a merchant system, the checkout communication does not include client information, as the merchant system is isolated from sensitive client information.
- the checkout communication is processed to authenticate that the checkout communication is from the validated checkout system (e.g. the merchant system).
- This authentication can include operations performed directly at an account security device, as well as additional communications with the merchant system or independent third party systems and devices (e.g. as part of fraud detection system(s) 150 ).
- Method 800 then includes operation 815 where a client token is generated in response to an authentication that the checkout communication is from the validated checkout system.
- the client token is generated with a postback identifier.
- the postback identifier can be used by the merchant system and the account security system to track a status of a particular secure transaction, and to associated data and specific communications with the particular secure transaction.
- the checkout communication can be automatically processed in real-time to improve the security of the system while maintaining quality of service (e.g., overall system responsiveness to client device 124 communications).
- An account security system 140 can perform automatic real-time processing of checkout communications for many customers simultaneously (e.g., thousands of checkout communications per minute, thousands of checkout communications per second, or more depending on system configurations).
- the account security system transmits the client token.
- the client token can be communicated to a client device via merchant system, so that when the client token is received at the client device, the client token is used to verify the merchant system.
- an account communication is received that is associated with the client token and includes client information.
- the account communication can be received directly from the client device, and can include the client token as received at the client device from the merchant system. As described above, since the client information is kept isolated from the merchant system, the client information is not received from the merchant system.
- the account communication includes an account lookup request without an account number associated with the tokenized client account number. This communication can allow a client who does not have access to an account number to securely access the account number via the account security system to use an account with the secure transaction.
- the account communication includes an account verification request and an account number associated with the tokenized client account number. This communication can also allow a client to access additional account information, such as an available balance, in a secure fashion, and to authenticate the account, as part of use of the account for the secure transaction.
- the client information is processed to confirm that the account communication is from a secure client device.
- additional communications and operations are performed to confirm that the client device is not compromised by malicious software, and there is no history of the client device being involved in fraudulent transactions. This confirmation can be done using various security database data and fraud detection tools as described herein.
- Some such examples can operate with the account security system opening a secure channel with a client device so that the account communication is received from the client device via a modal on the client device generated as part of the secure channel.
- the account security system can then generate and store the tokenized account number so that when a request is received for the tokenized client account number from a merchant device in response to closure of the modal on the client device, and the tokenized client account number is transmitted to the merchant device in response to the request.
- Some such examples can operate where the checkout communication is received as using a secured post channel, where the client token is transmitted to the merchant device with a postback identifier using the secured post channel, and where the modal is opened on the client device and the secure channel is established between the account security system and the client device in response to the client token as communicated to the client device from the merchant device.
- Such examples can further process communications automatically (e.g., without human intervention) at high volume in real-time or near real-time (e.g., thousands of communications per second or per fraction of a second in some implementations).
- Method 800 then includes operation 830 where a tokenized client account number is generated in response to the account communication.
- the tokenized client account number can be automatically generated in real-time or near real-time, and such automatic operations can be performed thousands of times per second or more in accordance with examples described herein.
- the tokenized client account number can include embedded information about a client or client account in such a way that tokenized client data is included as part of the tokenized client account number, but the client data is secure and not available to the merchant system, as the tokenization obscures the details of the client data from the merchant system.
- the merchant system can provide this information to a separate payment authorization and/or settlement system, which is able to use this tokenized client data to facilitate the secure transaction.
- Data for thousands or tens of thousands of transactions can be stored in a memory or associated database of a device and available for real-time access.
- the tokenized data is transmitted in operation 835 , so that the tokenized client account number allows the merchant system to process the secure transaction without access to the client information.
- the merchant system can, in some examples, then authorize payment with a separate system independent of the account security system as part of the secure transaction.
- the account security system can perform operations for facilitating the secure transaction by sharing (e.g. transmitting) the tokenized client account number with the separate system to allow the merchant system to settle payment for the secure transaction with the separate system without the merchant system having access to the client information.
- FIG. 9 depicts aspects of a system and system operations for data security in accordance with some examples.
- FIG. 9 describes a find status system that can be used to allow a merchant (e.g. merchant system 108 ) to access a status associated with an account security system (e.g. account security system 140 ) and a particular secure transaction.
- a merchant e.g. merchant system 108
- an account security system e.g. account security system 140
- FIG. 9 illustrates details of an implementation of communications 336 of FIG. 3 .
- FIG. 9 can be integrated with other operations.
- FIG. 9 includes a merchant system 908 that is requesting a status associated with a secure transaction, which involves a check for data in database 940 .
- database 940 includes postback data including client tokens and tokenized client account numbers associated with particular secure transactions.
- FIG. 9 describes a pull system, where merchant system 908 pulls data associated with a secure transaction. In other examples, the pull system of FIG. 9 can also be implemented in conjunction with a push system to support different merchants, as described below with respect to FIG. 12 . As described in FIG.
- merchant system 908 can be part of one system, and all other components of FIG. 9 can be part of an account security system. In other examples, a merchant system 908 can access data via an account security system, but various elements of FIG. 9 can be independent systems accessed via an account security system.
- FIG. 9 includes status inquiry sub-system 910 , access sub-system 920 , and data access object (DAO) sub-system 930 .
- these systems can be integrated as part of an account security system and used to access the other systems of FIG. 9 .
- these systems are integrated in various different ways with each other and the other systems. In different examples, any such combination or structure of these elements can be used.
- Status inquiry sub-system 910 processes incoming status inquiry communications from different sources including merchant system 908 .
- status inquiry sub-system 910 routes the inquiry to an initial gating security check of input validation sub-system 912 .
- Input validation sub-system 912 can check a format of the status inquiry as well as credentials or data formats for the status inquiry to prevent improper requests from overwhelming other aspects of the account security system. Additional examples of such checks and an example implementation are described below with respect to FIG. 11 , FIG. 12 , and FIG. 13 .
- the status inquiry proceeds to access sub-system 920 , which can manage a next tier of data securing operations.
- This next tier can include authentication of merchant system 908 using authentication sub-system 922 and any necessary decryption in decryption sub-system 924 .
- Decryption sub-system 924 can perform both decryption of data in a status inquiry, as well as decryption or encryption of data from database 940 being returned to merchant system 908 .
- authentication sub-system 922 is a same system that authenticates a merchant when a client token is generated (e.g. merchant system verification 210 ), and a portion of the verification can be done using the client token previously generated by the account security system which can be received with the status inquiry.
- any other merchant verification operations can be used, including the same merchant verification operations described above for authentication in operation 318 .
- DAO sub-system 930 uses DAO sub-system 930 to request postback data including a tokenized account number from database 940 . If the data is not present in the databased, a response indicating the absence of the data can be generated. If the data is present, then the postback data including the tokenized account number is communicated back to merchant system 908 to facilitate the secure transaction.
- FIG. 10 illustrates details of an example implementation, with communications between merchant system 908 and components of an account security system, and possibly peripheral sub-systems in a chain of communications, to perform a status check associated with a secure transaction.
- FIG. 10 shows communications between and operations by a merchant system 908 and elements which are part of or connect by an account security system, including status inquiry sub-system 910 , input validation sub-system 912 , access sub-system 920 , authentication sub-system 922 , decryption sub-system 924 , DAO sub-system 930 , and database 940 .
- the sequence described in FIG. 10 begins with a status inquiry communication 1002 from merchant system 908 to status inquiry sub-system 910 .
- This status inquiry communication is processed, and field validation communication 1004 is processed by input validation sub-system 912 .
- field validation communication 1004 is processed by input validation sub-system 912 .
- the fields present and any other data present from the status inquiry are processed and validated to confirm that the status inquiry includes valid field data as a valid request.
- a response communication 1008 is returned.
- the sequence of FIG. 10 assumes valid field data and successful requests throughout the operations of FIG. 10 , unsuccessful requests or data error flow is described below with respect to FIG. 11 .
- status inquiry sub-system 910 When status inquiry sub-system 910 receives confirmation that the status inquiry has been validated, the status inquiry sub-system 910 generates a request to retrieve postback data associated with the status inquiry as communication 1010 .
- This postback data can include a client token associated with a secure transaction, as well as tokenized client data such as a tokenized client account number.
- Access sub-system 920 accepts the communication 1010 , and then manages merchant authentication and decryption associated with accessing the postback data and making the relevant portions of the postback data available to merchant system 908 .
- Access sub-system 920 initially responds to the postback data request of communication 1010 by generating an authentication communication 1012 . After authentication sub-system 922 has authenticated the merchant system 908 (e.g.
- a return communication 1014 is sent to initiate the retrieval of the data.
- Communication 1016 requests the data, and DAO sub-system 930 then selects the identified data from database 940 with communication 1018 .
- Communication 1020 and communication 1022 return the data to the service sub-system 920 .
- the postback data is stored in database 940 as a JavaScript Object Notation (JSON) web token (JWT).
- JSON JavaScript Object Notation
- JWT can store data as an encoded string which can include cryptographically signed and secured data that is safe for use in a uniform resource locator (URL).
- a previously generated client token associated with the JWT can be used to verify the merchant system 908 and allow decryption of the JWT data in operation 1024 .
- the decrypted data can then be returned to the status inquiry sub-system 910 in communication 1026 , and the responsive data (e.g. including a tokenized account number) can be returned to the merchant system 908 in communication 1028 .
- Such an implementation storing postback data as a JWT can function in the context of systems described herein to integrate data security as part of a modular integration with a merchant web site.
- This implementation improves the operation of the merchant computing systems and associated network communication and transaction systems by improving data security while providing functionality and data assess associated with secure client data.
- Various steps in the sequence described above add security on top of the cryptographically signed JWT to prevent direct attacks (e.g. unauthorized decryption attempts from unauthenticated sources) on the JWT for a particular secure transaction.
- additional mechanisms associated with token expiration can provide additional security. For example, if a time limit is associated with the JWT, then identification of the expired token can result in the status inquiry being given an associated rejection message.
- FIG. 11 then further describes operations for a merchant system to access data associated with a secure transaction (e.g. tokenized client data) while maintaining data security for sensitive client data.
- FIG. 11 includes a description of failure actions throughout a status inquiry processing by an account security system.
- a request for postback data e.g. a status inquiry
- the postback request is processed to validate the inputs in the postback request (e.g. to confirm the request includes recognizable and valid inputs) in operation 1104 . If the postback request fails the input validation in operation 1104 , then a failure message is returned to the requesting merchant system in operation 1106 .
- this message can be a return communication in the form of an HTTP status code and response code with a description indicating that the postback request was a bad request (e.g. in an unacceptable form).
- Each return message throughout the flow described in FIG. 11 can be reported to service activity operations 1134 , which can keep a record of status inquiry requests and the resulting return communications.
- repeated status inquiries for a single transaction can result in a flag or a report from service activity operations 1134 flagging the secure transaction as possibly associated with malicious activity. In some examples, this flagging can occur with a threshold number of status inquiries or a threshold number of failures (e.g. return communications without tokenized account data).
- history data recorded via service activity operations 1134 can be analyzed and used with machine learning and fraud data to generate fraud alerts when certain patterns are identified for current transactions and status inquiries by service activity operations 1134 .
- the data from the postback request is processed for authentication in operation 1108 .
- this data processing involves preparing communications to an independent authentication service independent from an account security system.
- this data processing involves preparing and queuing data from the postback request for an internal analysis and authentication process within the account security system.
- an independent service is contacted in operation 1110 . If the account security system fails to connect with the authorization system in operation 1110 , a service unavailable return communication is generated and transmitted in operation 1112 , indicating that the authorization service is unavailable. If the account security system successfully connects in operation 1110 , the flow then proceeds to operation 1114 . Operation 1114 authenticates data for the requesting merchant system.
- This authentication can, for example, be based on matching merchant security codes from previous merchant validation processes, or token data associated with a current transaction (e.g. to confirm that the transaction is still valid and in process or expired). If the authentication fails in operation 1114 , then a response code operation 1116 is performed. If the response code operation fails (e.g. no response code is received), then the same service unavailable return communication from operation 1112 is generated in response to the failure in operation 1116 .
- a response code is generated in operation 1116
- data detailing the nature of the failure to authorize the access can be generated and communicated in return operation 1118 .
- This return can, for example, indicate a valid access for an expired transaction, an invalid token or code for a merchant or user, or any other such indication that the request to access the postback information is not authorized.
- the merchant system is not provided the postback data, and service activity operation 1134 is updated with details of the failure to provide postback data in response to the postback request from operation 1102 .
- connection operation 1120 attempts to connect to a database (e.g. database 940 ) to access the requested postback data. If this connection fails, then return operation 1122 generates and transmits a service unavailable return, similar to operation 1112 . If the database connection succeeds, then data check operation 1124 generates a response to the data request. If the record requested by the postback request is not found in the database, then in operation 1126 a return communication is generated and transmitted indicating that the requested postback data was not found. If the record is found, then the associated data is returned and received at the account security system in operation 1128 . When the data from the database is received, any decryption is performed in operation 1128 (e.g.
- a status inquiry response is generated in operation 1130 , which can include filtering any sensitive client data from the decrypted data accessed from the database, so that only secure tokenized data and/or authorized non-sensitive data is prepared for return to the merchant system.
- a return communication is transmitted to the merchant system with the data prepared in operation 1130 .
- the service activity operation 1134 then updates any data associated with the successful response.
- the service activity operation 1134 can result in various updates.
- a record of the successful response is recorded, and authentication data is updated to prevent additional requests for the same data (e.g. to result in failures at future authentication operations for the same data).
- service activity operations 1134 can result in data being removed from the database, or in flagging data for future removal from the database after a threshold time (e.g. time associated with a return period, a fraud period, a transaction dispute period, or other such thresholds).
- elements of the data can be anonymized and stored in a record for future fraud analysis (e.g. by removing all client data, tokenized or otherwise, while retaining generic information such as a transaction data and time, transaction amounts, purchase categories associated with the secure transaction, or other general information.
- FIG. 9 , FIG. 10 , and FIG. 11 all illustrate implementations of a pull system, where after tokenized client data has been generated by an account security system and stored in a database, a merchant system requests (e.g. attempts to pull) the data.
- a pull system can function alongside a push system, where the tokenized client data is pushed to a merchant system when it is generated.
- FIG. 12 describes aspects of such a system.
- FIG. 12 includes account security system 140 and two different merchant systems, shown as merchant system 108 and merchant system 109 .
- Merchant system 108 operates with a pull system for accessing tokenized client data
- merchant system 109 operates with a push system for accessing similar tokenized client data.
- merchant system 108 can operate as described above in FIG. 3 .
- client data is provided to account security system 140 and account security system 140 generates and stores tokenized client data in operation(s) 330 .
- the merchant system can then request this tokenized client data in communications 336 , which can be implemented, in some examples, as described above in FIG. 9 , FIG. 10 , and/or FIG. 11 .
- Merchant system 109 can operate in communication with an account security system 140 and a client device 124 with operations similar to operations 302 , 306 , 310 , 314 , 318 , and 322 .
- account security system 140 performs for a push system, rather than the illustrated operations for a pull system discussed above.
- merchant system 109 includes ongoing listening operations 1216 , where the merchant system is prepared to accept postback data pushed from account security system 140 .
- the push system transmits postback data to a merchant uniform resource locator in communication 1220 which results from authentication and token generation operations 1218 .
- This push system operation contrasts with the corresponding operations of a pull system, which would simply store the postback data in a database and then make the postback data available in response to a status inquiry, as described above.
- the merchant system accepts the postback data using listening operations 1216 , and then stores the postback data in operation 1222 .
- the merchant system 109 can then perform operations 1224 B to access the postback data and use that data to authorize and settle the secure transaction in communication with a separate system.
- Such a pull operation can be implemented in legacy systems due to merchant preferences, but can include certain issues.
- a postback access operation 1224 A can sometimes occur before the corresponding postback data operation 1222 stores the data in merchant system 109 .
- the merchant system 109 can fail to receive an authorization for payment due to the timing mismatch of the postback access operation 1224 A and the postback data storage operation 1222 , which can cause the transaction to fail due to the performance problem with the system and cause additional problems for the merchant system.
- Similar authentication and token generation operations 1238 for merchant system 108 result in storing postback data in database operation 1240 . If timing issues occur with merchant system 108 postback access operations 1242 , then as described above, communications 1244 with provide a return communication indicating that the service is unavailable, the data is not found, or some other specific error that allows the merchant system to respond and recover (e.g.
- implementations can perform operations for multiple operations simultaneously, such that a device can process certain operations while simultaneously receive and transmitting data.
- a device or system can additionally be implemented to perform operations of the different figures simultaneously (e.g., simultaneous push and pull operations for different system elements).
- all systems described above can be configured to prevent merchant systems from receiving certain sensitive client information, where a transaction between a client device 124 and a merchant system 108 or 109 can be facilitated while merchant systems do not receive client account numbers.
- Some such merchant systems can be configured to offer certain client systems security, where the merchant system does not receive or store the clients account numbers (e.g., but receives tokenized numbers instead) while other client devices communicate account numbers to the merchant system, and where the merchant system can directly store the account numbers.
- the merchant system does not receive or store the clients account numbers (e.g., but receives tokenized numbers instead) while other client devices communicate account numbers to the merchant system, and where the merchant system can directly store the account numbers.
- FIG. 13 is a flow diagram illustrating an example method 1300 .
- Method 1300 can be performed by one or more processors of a server computer or server system as part of an account security system (e.g. account security system 140 ).
- Method 1300 can, in some examples, be implemented as computer readable instructions that, when executed by processing circuitry of a device, cause the device to perform steps of method 1300 .
- Method 1300 can, in some examples, be implemented in the context of method 800 (e.g. as additional operations to provide security prior to transmission of a tokenized client account number in response to a request for the tokenized client account number in a status query from a merchant system).
- Method 1300 includes operation 1305 to receive, at an account security system with one or more processors, a status inquiry associated with a secure transaction and with a merchant system and a client device involved in the secure transaction.
- This status inquiry can include identifying codes or passwords associated with parties to the transaction, and can also include information identifying the secure transaction (e.g. a client token previously generated by the account security system).
- Operation 1310 of method 1300 then involves the processors processing the status inquiry to determine that the merchant system associated with the status inquiry has been previously validated and that the status inquiry is from the merchant system.
- this status inquiry processing can include accessing an independent system to process data from the status inquiry.
- the analysis of status inquiry data can be performed within the account security system.
- additional security operations can be performed with this authentication, such as operations for a status inquiry to confirm that the status inquiry includes a valid input, operations to confirm that a client device is not compromised, or other such security operations.
- operation 1315 of method 1300 involves accessing postback data including a tokenized client account number associated with client information.
- this postback data can be generated by the account security system using data from a modal presented on a client device as part of a merchant system website. Generating the tokenized client account number this way allows the merchant system to be isolated from the sensitive client information used to generate the tokenized client account number.
- the operations of method 1300 allow the merchant system to pull the tokenized client account number from the account security system without the merchant system having access to secure client data. Instead, the merchant system can use tokens or other data for a specific secure transaction to pull the tokenized data.
- the in operation 1320 the tokenized client account number is transmitted.
- the merchant system can then use the tokenized client account number to facilitate processing the secure transaction without the merchant system having access to the client information.
- some or all of the operations can be performed in real-time or near real-time.
- the real-time operations can include some or all of the processing of operation 1310 , the accessing of operation 1315 , and the transmitting of operation 1320 .
- Such automatic operations improve a system by enabling real-time or near real-time transactions with latencies and responsiveness in automatic operations not possible when operations involve human interaction (e.g., non-automatic operation).
- such a method can operate by further generating a client token for the secure transaction in response to a checkout communication and storing the client token in a database with initial postback data including the client token for the secure transaction.
- Such operations can be used to track a secure transaction status, and to match tokenized data to a transaction.
- some such examples can operate in a system that also supports pushing tokenized client data.
- a second account communication associated with a second secure transaction and a second merchant system can be received, with the second account communication including a second client token and the client information, and where the client information is not received from the second merchant system.
- Such an example can then include operations for generating a second tokenized client account number in response to the second account communication and transmitting the second tokenized client account number with second postback data to a uniform resource locator address associated with the second merchant system.
- the tokenized client data can be using a secure channel with the client device where the client information is received from the client device via a modal on the client device generated as part of the secure channel.
- the status inquiry can then be generated by the merchant system in response to closure of the modal on the client device, where the tokenized client account number is generated using the client information, and where the tokenized client account number is transmitted to the merchant system in response to the status inquiry.
- the secure transaction can be facilitated by sharing the tokenized client account number with a separate system to allow the merchant system to settle payment for the secure transaction with the separate system without the merchant system having access to the client information.
- the operations described above can be performed automatically by an account security system 140 in a network, without human interaction as part of the account security system 140 operations.
- merchant system 108 and client device 124 can perform certain operations automatically (e.g., without human interaction or involvement).
- a client device 124 can receive a non-automatic input (e.g., involving a human interaction with client device 124 ), which initiates a chain of automatic operations at merchant system 108 , account security system 140 , and client device 124 without further human involvement (e.g., automatic operations flowing from an initial non-automatic operation triggered by a human input at an interface of client device 124 ).
- Such automatic operations improve a system by enabling real-time or near real-time transactions with latencies and responsiveness in automatic operations not possible when operations involve human interaction (e.g., non-automatic operation).
- the memory 1420 can include multiple different types of memory with different performance characteristics.
- the processor 1404 can include any general purpose processor and a hardware or software service, such as service 1 1410 , service 2 1412 , and service 3 1414 stored in storage device 1408 , configured to control the processor 1404 as well as a special-purpose processor where software instructions are incorporated into the actual processor design.
- the processor 1404 may be a completely self-contained computing system, containing multiple cores or processors, a bus, memory controller, cache, etc.
- a multi-core processor may be symmetric or asymmetric.
- an input device 1422 can represent any number of input mechanisms, such as a microphone for speech, a touch-sensitive screen for gesture or graphical input, keyboard, mouse, motion input, speech and so forth.
- An output device 1424 can also be one or more of a number of output mechanisms known to those of skill in the art.
- multimodal systems can enable a user to provide multiple types of input to communicate with the computing system architecture 1400 .
- the communications interface 1426 can generally govern and manage the user input and system output. There is no restriction on operating on any particular hardware arrangement and therefore the basic features here may easily be substituted for improved hardware or firmware arrangements as they are developed.
- Storage device 1408 is a non-volatile memory and can be a hard disk or other types of computer readable media which can store data that are accessible by a computer, such as magnetic cassettes, flash memory cards, solid state memory devices, digital versatile disks, cartridges, RAMs 1416 , ROM 1418 , and hybrids thereof.
- the disclosed gift selection, attribution, and distribution system can be performed using a computing system.
- An example computing system can include a processor (e.g., a central processing unit), memory, non-volatile memory, and an interface device.
- the memory may store data and/or and one or more code sets, software, scripts, etc.
- the components of the computer system can be coupled together via a bus or through some other known or convenient device.
- the processor may be configured to carry out all or part of methods described herein for example by executing code for example stored in memory.
- One or more of a user device or computer, a provider server or system, or a suspended database update system may include the components of the computing system or variations on such a system.
- the computer system may be an embedded computer system, a system-on-chip (SOC), a single-board computer system (SBC) (such as, for example, a computer-on-module (COM) or system-on-module (SOM)), a desktop computer system, a laptop or notebook computer system, an interactive kiosk, a mainframe, a mesh of computer systems, a mobile telephone, a personal digital assistant (PDA), a server, or a combination of two or more of these.
- SOC system-on-chip
- SBC single-board computer system
- COM computer-on-module
- SOM system-on-module
- desktop computer system such as, for example, a computer-on-module (COM) or system-on-module (SOM)
- COM computer-on-module
- SOM system-on-module
- desktop computer system such as, for example, a computer-on-module (COM) or system-on-module (SOM)
- laptop or notebook computer system such
- the computer system may include one or more computer systems; be unitary or distributed; span multiple locations; span multiple machines; and/or reside in a cloud, which may include one or more cloud components in one or more networks.
- one or more computer systems may perform without substantial spatial or temporal limitation one or more steps of one or more methods described or illustrated herein.
- one or more computer systems may perform in real time or in batch mode one or more steps of one or more methods described or illustrated herein.
- One or more computer systems may perform at different times or at different locations one or more steps of one or more methods described or illustrated herein, where appropriate.
- the processor may be, for example, be a conventional microprocessor such as an Intel Pentium microprocessor or Motorola power PC microprocessor.
- machine-readable (storage) medium or “computer-readable (storage) medium” include any type of device that is accessible by the processor.
- the memory can be coupled to the processor by, for example, a bus.
- the memory can include, by way of example but not limitation, random access memory (RAM), such as dynamic RAM (DRAM) and static RAM (SRAM).
- RAM random access memory
- DRAM dynamic RAM
- SRAM static RAM
- the memory can be local, remote, or distributed.
- the bus can also couple the processor to the non-volatile memory and drive unit.
- the non-volatile memory is often a magnetic floppy or hard disk, a magnetic-optical disk, an optical disk, a read-only memory (ROM), such as a CD-ROM, EPROM, or EEPROM, a magnetic or optical card, or another form of storage for large amounts of data. Some of this data is often written, by a direct memory access process, into memory during execution of software in the computer.
- the non-volatile storage can be local, remote, or distributed.
- the non-volatile memory is optional because systems can be created with all applicable data available in memory.
- a typical computer system will usually include at least a processor, memory, and a device (e.g., a bus) coupling the memory to the processor.
- Software can be stored in the non-volatile memory and/or the drive unit. Indeed, for large programs, it may not even be possible to store the entire program in the memory. Nevertheless, it should be understood that for software to run, if necessary, it is moved to a computer readable location appropriate for processing, and for illustrative purposes, that location is referred to as the memory herein. Even when software is moved to the memory for execution, the processor can make use of hardware registers to store values associated with the software, and local cache that, ideally, serves to speed up execution.
- a software program is assumed to be stored at any known or convenient location (from non-volatile storage to hardware registers), when the software program is referred to as “implemented in a computer-readable medium.”
- a processor is considered to be “configured to execute a program” when at least one value associated with the program is stored in a register readable by the processor.
- the bus can also couple the processor to the network interface device.
- the interface can include one or more of a modem or network interface. It will be appreciated that a modem or network interface can be considered to be part of the computer system.
- the interface can include an analog modem, Integrated Services Digital network (ISDNO modem, cable modem, token ring interface, satellite transmission interface (e.g., “direct PC”), or other interfaces for coupling a computer system to other computer systems.
- the interface can include one or more input and/or output (I/O) devices.
- the I/O devices can include, by way of example but not limitation, a keyboard, a mouse or other pointing device, disk drives, printers, a scanner, and other input and/or output devices, including a display device.
- the display device can include, by way of example but not limitation, a cathode ray tube (CRT), liquid crystal display (LCD), or some other applicable known or convenient display device.
- CTR cathode ray tube
- LCD liquid
- the computer system can be controlled by operating system software that includes a file management system, such as a disk operating system.
- a file management system such as a disk operating system.
- operating system software with associated file management system software is the family of operating systems known as Windows® from Microsoft Corporation of Redmond, WA, and their associated file management systems.
- WindowsTM Windows® from Microsoft Corporation of Redmond, WA
- LinuxTM LinuxTM operating system and its associated file management system.
- the file management system can be stored in the non-volatile memory and/or drive unit and can cause the processor to execute the various acts required by the operating system to input and output data and to store data in the memory, including storing files on the non-volatile memory and/or drive unit.
- the system operates as a standalone device or may be connected (e.g., networked) to other systems.
- the system may operate in the capacity of a server or a client system in a client-server network environment, or as a peer system in a peer-to-peer (or distributed) network environment.
- the system may be a server computer, a client computer, a personal computer (PC), a tablet PC, a laptop computer, a set-top box (STB), a personal digital assistant (PDA), a cellular telephone, an iPhone, a Blackberry, a processor, a telephone, a web appliance, a network router, switch or bridge, or any system capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that system.
- PC personal computer
- PDA personal digital assistant
- machine-readable medium or machine-readable storage medium is shown, by way of example, to be a single medium, the terms “computer readable medium”, “computer readable storage medium”, “machine-readable medium” and “machine-readable storage medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions.
- the terms “computer readable medium”, “computer readable storage medium”, “machine-readable medium” and “machine-readable storage medium” shall also be taken to include any medium that is capable of storing, encoding, or carrying a set of instructions for execution by the system and that cause the system to perform any one or more of the methodologies or modules of disclosed herein.
- routines executed to implement the implementations of the disclosure may be implemented as part of an operating system or a specific application, component, program, object, module or sequence of instructions referred to as “computer programs.”
- the computer programs typically comprise one or more instructions set at various times in various memory and storage devices in a computer, and that, when read and executed by one or more processing units or processors in a computer, cause the computer to perform operations to execute elements involving the various aspects of the disclosure.
- machine-readable storage media machine-readable media, or computer-readable (storage) media
- recordable type media such as volatile and non-volatile memory devices, floppy and other removable disks, hard disk drives, optical disks (e.g., Compact Disk Read-Only Memory (CD ROMS), Digital Versatile Disks, (DVDs), etc.), among others, and transmission type media such as digital and analog communication links.
- CD ROMS Compact Disk Read-Only Memory
- DVDs Digital Versatile Disks
- transmission type media such as digital and analog communication links.
- operation of a memory device may comprise a transformation, such as a physical transformation.
- a physical transformation may comprise a physical transformation of an article to a different state or thing.
- a change in state may involve an accumulation and storage of charge or a release of stored charge.
- a change of state may comprise a physical change or transformation in magnetic orientation or a physical change or transformation in molecular structure, such as from crystalline to amorphous or vice versa.
- a storage medium typically may be non-transitory or comprise a non-transitory device.
- a non-transitory storage medium may include a device that is tangible, meaning that the device has a concrete physical form, although the device may change its physical state.
- non-transitory refers to a device remaining tangible despite this change in state.
- connection means any connection or coupling, either direct or indirect, between two or more elements; the coupling of connection between the elements can be physical, logical, or any combination thereof.
- the words “herein,” “above,” “below,” and words of similar import when used in this application, shall refer to this application as a whole and not to any particular portions of this application. Where the context permits, words in the above Detailed Description using the singular or plural number may also include the plural or singular number respectively.
- the word “or,” in reference to a list of two or more items covers all of the following interpretations of the word: any of the items in the list, all of the items in the list, or any combination of the items in the list.
- a software module is implemented with a computer program object comprising a computer-readable medium containing computer program code, which can be executed by a computer processor for performing any or all of the steps, operations, or processes described.
- Examples may also relate to an apparatus for performing the operations herein.
- This apparatus may be specially constructed for the required purposes, and/or it may comprise a general-purpose computing device selectively activated or reconfigured by a computer program stored in the computer.
- a computer program may be stored in a non-transitory, tangible computer readable storage medium, or any type of media suitable for storing electronic instructions, which may be coupled to a computer system bus.
- any computing systems referred to in the specification may include a single processor or may be architectures employing multiple processor designs for increased computing capability.
- circuits, systems, networks, processes, and other components may be shown as components in block diagram form in order not to obscure the embodiments in unnecessary detail.
- well-known circuits, processes, algorithms, structures, and techniques may be shown without unnecessary detail in order to avoid obscuring the embodiments.
- a process is terminated when its operations are completed, but could have additional steps not included (e.g. in FIG. 8 ).
- a process may correspond to a method, a function, a procedure, a subroutine, a subprogram, etc.
- a process corresponds to a function
- its termination can correspond to a return of the function to the calling function or the main function.
- Client devices, network devices, and other devices can be computing systems that include one or more integrated circuits, input devices, output devices, data storage devices, and/or network interfaces, among other things.
- the integrated circuits can include, for example, one or more processors, volatile memory, and/or non-volatile memory, among other things.
- the input devices can include, for example, a keyboard, a mouse, a key pad, a touch interface, a microphone, a camera, and/or other types of input devices.
- the output devices can include, for example, a display screen, a speaker, a haptic feedback system, a printer, and/or other types of output devices.
- a data storage device such as a hard drive or flash memory, can enable the computing device to temporarily or permanently store data.
- a network interface such as a wireless or wired interface, can enable the computing device to communicate with a network.
- Examples of computing devices include desktop computers, laptop computers, server computers, hand-held computers, tablets, smart phones, personal digital assistants, digital home assistants, as well as machines and apparatuses in which a computing device has been incorporated.
- the various examples discussed above may further be implemented by hardware, software, firmware, middleware, microcode, hardware description languages, or any combination thereof.
- the program code or code segments to perform the necessary tasks may be stored in a computer-readable or machine-readable storage medium (e.g., a medium for storing program code or code segments).
- a processor(s), implemented in an integrated circuit, may perform the necessary tasks.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
Claims (15)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/350,415 US12293355B2 (en) | 2020-06-17 | 2021-06-17 | Status system with data security for transactions |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US202063040258P | 2020-06-17 | 2020-06-17 | |
US17/350,415 US12293355B2 (en) | 2020-06-17 | 2021-06-17 | Status system with data security for transactions |
Publications (2)
Publication Number | Publication Date |
---|---|
US20210398113A1 US20210398113A1 (en) | 2021-12-23 |
US12293355B2 true US12293355B2 (en) | 2025-05-06 |
Family
ID=79023656
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/350,415 Active 2041-10-19 US12293355B2 (en) | 2020-06-17 | 2021-06-17 | Status system with data security for transactions |
Country Status (1)
Country | Link |
---|---|
US (1) | US12293355B2 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11593800B2 (en) | 2012-03-07 | 2023-02-28 | Early Warning Services, Llc | System and method for transferring funds |
US11386410B2 (en) | 2015-07-21 | 2022-07-12 | Early Warning Services, Llc | Secure transactions with offline device |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060218091A1 (en) * | 2005-01-26 | 2006-09-28 | Choy Heng K | Fraud-free payment for Internet purchases |
US20120084693A1 (en) * | 2010-10-01 | 2012-04-05 | Imerj LLC | Modals in dual display communication devices |
US20150302404A1 (en) * | 2014-04-17 | 2015-10-22 | James F. Ruffer | Secure electronic payment system |
US20160110713A1 (en) * | 2014-10-21 | 2016-04-21 | Mastercard International Incorporated | Method and system for secure global tokenization |
US20180114203A1 (en) * | 2016-10-21 | 2018-04-26 | Mastercard International Incorporated | Systems and methods for regulating access to data stored in a data source |
US20200097928A1 (en) * | 2018-09-21 | 2020-03-26 | Jpmorgan Chase Bank, N.A. | Systems and methods for conducting account tokenized transactions |
US10996840B1 (en) * | 2019-08-26 | 2021-05-04 | Juniper Networks, Inc. | Systems and methods for providing user-friendly access to relevant help documentation for software applications |
-
2021
- 2021-06-17 US US17/350,415 patent/US12293355B2/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060218091A1 (en) * | 2005-01-26 | 2006-09-28 | Choy Heng K | Fraud-free payment for Internet purchases |
US20120084693A1 (en) * | 2010-10-01 | 2012-04-05 | Imerj LLC | Modals in dual display communication devices |
US20150302404A1 (en) * | 2014-04-17 | 2015-10-22 | James F. Ruffer | Secure electronic payment system |
US20160110713A1 (en) * | 2014-10-21 | 2016-04-21 | Mastercard International Incorporated | Method and system for secure global tokenization |
US20180114203A1 (en) * | 2016-10-21 | 2018-04-26 | Mastercard International Incorporated | Systems and methods for regulating access to data stored in a data source |
US20200097928A1 (en) * | 2018-09-21 | 2020-03-26 | Jpmorgan Chase Bank, N.A. | Systems and methods for conducting account tokenized transactions |
US10996840B1 (en) * | 2019-08-26 | 2021-05-04 | Juniper Networks, Inc. | Systems and methods for providing user-friendly access to relevant help documentation for software applications |
Also Published As
Publication number | Publication date |
---|---|
US20210398113A1 (en) | 2021-12-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10963932B2 (en) | User enhanced authentication system for online purchases | |
JP6046765B2 (en) | System and method enabling multi-party and multi-level authorization to access confidential information | |
US20210406902A1 (en) | Standardized identifiers for multiple transaction authorizations | |
US12182861B2 (en) | Secure modal based digital installments | |
US11978047B2 (en) | Network data management and data security | |
US20170278089A1 (en) | Mobile-Friendly Internet Banking Checkouts | |
US12136091B2 (en) | Systems and methods for secure transaction reversal | |
US20240420137A1 (en) | Framework free integration | |
US20220351170A1 (en) | Secure point of sale (pos) operations | |
CN109155031B (en) | Method and system for distributing payment credentials for voice authentication | |
US12293355B2 (en) | Status system with data security for transactions | |
US20250030684A1 (en) | Multi-tier tokenization with long term token | |
US20240202717A1 (en) | Data security for transactions with secure offer system | |
US20210397740A1 (en) | Systems and methods for data security with modular website integration | |
US20140149289A1 (en) | Method and Apparatus for the Restricted Transfer of Funds |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
AS | Assignment |
Owner name: SYNCHRONY BANK, CONNECTICUT Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BERNERT, DEBORAH;UPPALAPATI, ASHOK;YOUNG, TAYLOR;AND OTHERS;SIGNING DATES FROM 20210818 TO 20210922;REEL/FRAME:058348/0626 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
ZAAB | Notice of allowance mailed |
Free format text: ORIGINAL CODE: MN/=. |