Cloud-based virtual wallet NFC apparatuses, methods and systems
First Claim
Patent Images
1. A cloud-based virtual wallet secure transaction processor-implemented method, comprising:
- receiving, by a merchant computer, a purchase payment request from a consumer device in a transaction;
obtaining, by the merchant computer, transaction details including a payment amount from the purchase payment request;
determining, by the merchant computer, that a transaction bounding token is required to process the purchase payment request;
determining, by the merchant computer, a transaction bounding token type;
querying, by the merchant computer, a security digital certificate database for a token generation certificate based on the purchase payment request and the transaction bounding token type;
receiving, by the merchant computer, the token generation certificate;
transmitting, by the merchant computer, a transaction bounding token request including the token generation certificate and the transaction details to a third-party server, which determines that the token generation certificate matches a stored token generation certificate, and then generates the transaction bounding token;
receiving, by the merchant computer, the transaction bounding token from the third-party server, after the third-party server determines that the token generation certificate matches the stored token generation certificate;
providing, by the merchant computer, the transaction bounding token to a transaction security server in a transaction authorization request to process a payment for the transaction, wherein the transaction security server determines whether or not the transaction bounding token is valid for the transaction; and
receiving, by the merchant computer, a transaction authorization response indicating whether the transaction is approved or declined, wherein the methodfurther comprises;
signing, by the merchant computer, using a cryptographic key, a concatenated string comprising a merchant ID, a transaction amount, a consumer identifier, and a time of the transaction to form an encrypted string, wherein the encrypted string is included in the transaction token bounding request, and wherein the third-party server decrypts the encrypted string and generates the transaction bounding token based upon the decrypted encrypted string.
1 Assignment
0 Petitions
Accused Products
Abstract
The CLOUD-BASED VIRTUAL WALLET NFC APPARATUSES, METHODS AND SYSTEMS (“EAE”) transform user enhanced security transaction initiation requests using EAE components into time-limited, session-specific transaction bounding tokens. In some implementations, the disclosure provides a processor-implemented method of transforming a transaction bounding token request into transaction bounded tokens and purchase authorizations.
-
Citations
20 Claims
-
1. A cloud-based virtual wallet secure transaction processor-implemented method, comprising:
-
receiving, by a merchant computer, a purchase payment request from a consumer device in a transaction; obtaining, by the merchant computer, transaction details including a payment amount from the purchase payment request; determining, by the merchant computer, that a transaction bounding token is required to process the purchase payment request; determining, by the merchant computer, a transaction bounding token type; querying, by the merchant computer, a security digital certificate database for a token generation certificate based on the purchase payment request and the transaction bounding token type; receiving, by the merchant computer, the token generation certificate; transmitting, by the merchant computer, a transaction bounding token request including the token generation certificate and the transaction details to a third-party server, which determines that the token generation certificate matches a stored token generation certificate, and then generates the transaction bounding token; receiving, by the merchant computer, the transaction bounding token from the third-party server, after the third-party server determines that the token generation certificate matches the stored token generation certificate; providing, by the merchant computer, the transaction bounding token to a transaction security server in a transaction authorization request to process a payment for the transaction, wherein the transaction security server determines whether or not the transaction bounding token is valid for the transaction; and receiving, by the merchant computer, a transaction authorization response indicating whether the transaction is approved or declined, wherein the method further comprises; signing, by the merchant computer, using a cryptographic key, a concatenated string comprising a merchant ID, a transaction amount, a consumer identifier, and a time of the transaction to form an encrypted string, wherein the encrypted string is included in the transaction token bounding request, and wherein the third-party server decrypts the encrypted string and generates the transaction bounding token based upon the decrypted encrypted string. - View Dependent Claims (19, 20)
-
-
2. A cloud-based virtual wallet secure transaction processor-implemented method, comprising:
-
receiving, by a merchant computer, a purchase payment request from a consumer device in a transaction; obtaining, by the merchant computer, transaction details including a payment amount from the purchase payment request; determining, by the merchant computer, that a transaction bounding token is required to process the purchase payment request; transmitting, by the merchant computer, a transaction bounding token request including a token generation certificate to a server, which then generates the transaction bounding token; receiving, by the merchant computer, the transaction bounding token related to a payment account from the server after the server determines that the token generation certificate matches a stored token generation certificate, wherein the transaction bounding token sets boundaries for authorizing transactions on the payment account based upon transaction parameters, the boundaries associated with one or more of a certain length of time, a certain user, or a certain amount; and providing, by the merchant computer, the transaction bounding token to a transaction security server in a transaction authorization request to process the transaction, wherein the transaction security server approves the transaction after the transaction security server determines that the transaction parameters associated with the transaction satisfy the boundaries associated with the transaction bounding token; receiving, by the merchant computer, a transaction authorization response indicating whether the transaction is approved or declined, and wherein the method also comprises; querying a security digital certificate database for the token generation certificate based on the purchase payment request; and receiving the token generation certificate, wherein the token generation certificate is associated with the transaction bounding token, wherein the method further comprises; signing, by the merchant computer, using a cryptographic key, a concatenated string comprising a merchant ID, a transaction amount, a consumer identifier, and a time of the transaction to form an encrypted string, wherein the encrypted string is included in the transaction token bounding request, and wherein the third-party server decrypts the encrypted string and generates the transaction bounding token based upon the decrypted encrypted string. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 16, 17, 18)
-
-
11. A cloud-based virtual wallet secure transaction processor-implemented system, comprising:
-
a processor; and a non-transitory computer readable medium comprising code, executable by the processor, for implementing a method comprising receiving a purchase payment request from a consumer device operated by a consumer; obtaining transaction details including a payment amount from the purchase payment request; determining that a transaction bounding token is required to process the purchase payment request; transmitting a transaction bounding token request including a token generation certificate to a server, which then generates the transaction bounding token; receiving the transaction bounding token related to a payment account of the consumer, wherein the transaction bounding token sets boundaries for authorizing transactions on the payment account based upon transaction parameters, the boundaries associated with one or more of a certain length of time, a certain user, or a certain amount from the server after the server determines that the token generation certificate matches a stored token generation certificate; and providing the transaction bounding token to a transaction security server in a transaction authorization request to process a transaction, wherein the transaction security server approves the transaction after the transaction security server determines that the transaction parameters associated with the transaction satisfy the boundaries associated with the transaction bounding token; and receiving a transaction authorization response indicating whether the transaction is approved or declined, and wherein the method also comprises querying a security digital certificate database for a generation certificate based on the purchase payment request; and receiving the token generation certificate, wherein the token generation certificate is associated with the transaction bounding token, wherein the method further comprises; signing, by the merchant computer, using a cryptographic key, a concatenated string comprising a merchant ID, a transaction amount, a consumer identifier, and a time of the transaction to form an encrypted string, wherein the encrypted string is included in the transaction token bounding request, and wherein the third-party server decrypts the encrypted string and generates the transaction bounding token based upon the decrypted encrypted string. - View Dependent Claims (12, 13, 14, 15)
-
Specification