SECURE PAYMENT CARD TRANSACTIONS
First Claim
1. A non-transitory computer-readable medium having stored thereon a point-of-sale (POS) security layer that communicates with a POS application and a POS server, the POS security layer comprising executable instructions that cause a computing system to at least:
- intercept actual payment data supplied by a user for performing a payment card transaction, such that the actual payment data is not made available to the POS application;
pass the false payment data to the POS application for use in place of the actual payment data, thereby causing the POS application to transmit the false payment data to the POS server in place of the actual payment data; and
transmit the actual payment data to the POS server.
3 Assignments
0 Petitions
Accused Products
Abstract
Payment card transactions at a point of sale (POS) are secured in certain embodiments by intercepting, with a POS security layer installed on a POS terminal, payment data from the POS terminal, transmitting the payment data from the POS security layer to a server security application installed on a POS server, and providing false payment data from the POS security layer to a POS terminal application installed on the POS terminal. The false payment data in various embodiments is processed as if it were the payment data, such that the POS terminal transmits an authorization request to the POS server using the false payment data. In addition, the authorization request may be transmitted from the POS server to a payment gateway.
271 Citations
18 Claims
-
1. A non-transitory computer-readable medium having stored thereon a point-of-sale (POS) security layer that communicates with a POS application and a POS server, the POS security layer comprising executable instructions that cause a computing system to at least:
-
intercept actual payment data supplied by a user for performing a payment card transaction, such that the actual payment data is not made available to the POS application; pass the false payment data to the POS application for use in place of the actual payment data, thereby causing the POS application to transmit the false payment data to the POS server in place of the actual payment data; and transmit the actual payment data to the POS server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of securing payment transactions, the method comprising:
by a computing system comprising computer hardware; intercepting payment data supplied by a user for performing a payment card transaction, the payment data comprising actual payment data from a payment medium; accessing false payment data that does not represent valid card data; and providing the false payment data to the POS application, the false payment data configured to be processed as if it were the actual payment data, thereby causing the POS application to transmit an authorization request using the false payment data in place of the actual payment data. - View Dependent Claims (11, 12, 13, 14)
-
15. A system for securing payment transactions, the system comprising:
a computing device programmed to implement a POS security layer configured to; capture payment data intended to be provided to a POS application, the payment data comprising actual card data from a payment card; obtain false payment data that does not represent valid card data; and provide the false card data to the POS application to thereby cause the POS application to transmit an authorization request using the false card data in place of the actual card data. - View Dependent Claims (16, 17, 18)
Specification