USING STEGANOGRAPHY TO PERFORM PAYMENT TRANSACTIONS THROUGH INSECURE CHANNELS
First Claim
1. A method comprising:
- providing a first compression filter;
providing a sound, image, or video;
providing a payment account credential;
embedding, using at least one processor operatively coupled with a memory, the payment account credential in the sound, image, or video using the first compression filter;
transmitting the sound, image, or video over an insecure channel;
determining that an event has occurred related to the insecure channel;
obtaining a second compression filter based on the determination of the event occurring;
embedding the payment account credential in the sound, image, or video using the second compression filter; and
transmitting the sound, image, or video over the insecure channel.
3 Assignments
0 Petitions
Accused Products
Abstract
Steganographic techniques are used to embed financial information or authentication information within an image, audio, or video file using a quantization table and/or other filter. The file is then transmitted over an insecure network, such as a GSM cell phone network, and a server extracts the information from the image, audio, or video using the same quantization table and/or filter. Multiple sets of information, such as telephone numbers and/or payment account numbers, are extracted from the same image by those entities possessing the appropriate keys. The filters and tables used to embed financial information can be updated periodically or according to events. A video of images, some with embedded information, some with ‘dummy’ data, can be used to hide information over insecure networks for payment transactions.
-
Citations
22 Claims
-
1. A method comprising:
-
providing a first compression filter; providing a sound, image, or video; providing a payment account credential; embedding, using at least one processor operatively coupled with a memory, the payment account credential in the sound, image, or video using the first compression filter; transmitting the sound, image, or video over an insecure channel; determining that an event has occurred related to the insecure channel; obtaining a second compression filter based on the determination of the event occurring; embedding the payment account credential in the sound, image, or video using the second compression filter; and transmitting the sound, image, or video over the insecure channel. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer system executing instructions in a computer program, the computer program instructions comprising:
-
program code for providing a first compression filter; program code for providing a sound, image, or video; program code for providing a payment account credential; program code for embedding the payment account credential in the sound, image, or video using the first compression filter; program code for transmitting the sound, image, or video over an insecure channel; program code for determining that an event has occurred related to the insecure channel; program code for obtaining a second compression filter based on the determination of the event occurring; program code for embedding the payment account credential in the sound, image, or video using the second compression filter; and program code for transmitting the sound, image, or video over the insecure channel.
-
-
11. A method comprising:
-
receiving a first payment account credential; receiving a second payment account credential; receiving a sound, image, or video; selecting a first compression filter; selecting a second compression filter; embedding, using at least one processor operatively coupled with a memory, the first payment account credential in the sound, image, or video, using the first compression filter, and embedding the second payment account credential in the sound, image, or video, using the second compression filter to create a second sound, second image, or second video; transmitting the second sound, second image, or second video over an insecure channel to a trusted payment network; transmitting the second sound, second image, or second video over an insecure channel to a telephony service provider; extracting the first payment account credential from the second sound, second image, or second video using a copy of the first compression filter at the trusted payment network; sending an authorization request message through the trusted payment network based on the first payment account credential, thereby initiating a payment transaction; receiving an authorization response message from the trusted payment network; extracting the second payment account credential from the second sound, second image, or second video using a copy of the second compression filter at the telephony service provider; sending an authorization request message through the telephony service provider based on the second payment account credential, thereby initiating a payment transaction; and receiving an authorization response message from the telephony service provider in response to the authorization request message. - View Dependent Claims (12, 13, 14)
-
-
15. A computer system executing instructions in a computer program, the computer program instructions comprising:
-
program code for receiving a first payment account credential; program code for receiving a second payment account credential; program code for receiving a sound, image, or video; program code for selecting a first compression filter; program code for selecting a second compression filter; program code for embedding the first payment account credential in the sound, image, or video, using the first compression filter, and embedding the second payment account credential in the sound, image, or video, using the second compression filter to create a second sound, second image, or second video; program code for transmitting the second sound, second image, or second video over an insecure channel to a trusted payment network; program code for transmitting the second sound, second image, or second video over an insecure channel to a telephony service provider; program code for extracting the first payment account credential from the second sound, second image, or second video using a copy of the first compression filter at the trusted payment network; program code for sending an authorization request message through the trusted payment network based on the first payment account credential, thereby initiating a payment transaction; program code for receiving an authorization response message from the trusted payment network; program code for extracting the second payment account credential from the second sound, second image, or second video using a copy of the second compression filter at the telephony service provider; program code for sending an authorization request message through the telephony service provider based on the second payment account credential, thereby initiating a payment transaction; and program code for receiving an authorization response message from the telephony service provider in response to the authorization request message.
-
-
16. A method comprising:
-
receiving a payment account credential; receiving a sound, image, or video; selecting a compression filter; embedding, using at least one processor operatively coupled with a memory, the payment account credential in the sound, image, or video, using the compression filter create a second sound, second image, or second video; transmitting the second sound, second image, or second video over an insecure channel to a trusted payment network; extracting the payment account credential from the second sound, second image, or second video using a copy of the compression filter at the trusted payment network; sending an authorization request message through the trusted payment network based on the payment account credential, thereby initiating a payment transaction; receiving an authorization response message from the trusted payment network in response to the authorization request message.
-
-
17. A method of sending payment information through a video, the method comprising:
-
encoding, using at least one processor operatively coupled with a memory, a machine-readable image code with payment information in a first image; providing a set of other images, the set of other images including a trigger image; randomly selecting an order of the first image within the set of other images; sending to a trusted payment network the images in the selected order to form a video payment message, the trigger image signaling the position of the first image. - View Dependent Claims (18, 19, 20, 21, 22)
-
Specification