SECURE MANAGEMENT OF TRANSACTIONS USING A SMART/VIRTUAL CARD
First Claim
1. A method of securely managing smart card transactions, the method comprising:
- receiving, by a processing entity, a smart card identifier from a smart card, wherein the smart card identifier is a transaction-specific identifier for a transaction, wherein the smart card identifier contains no financial data about a holder of the smart card, wherein the holder of the smart card is a first party to the transaction, and wherein the smart card identifier is hidden from a second party to the transaction;
receiving, by the processing entity, transaction data for the transaction from the second party, wherein the transaction data is blocked from the smart card;
associating, by the processing entity, the smart card identifier with account data for an account assigned to the holder of the smart card;
associating, by the processing entity, the transaction data with the account to determine if the transaction is valid according to information located in the account data; and
in response to determining that the transaction is valid, issuing, by the processing entity, a transaction confirmation to the smart card and a transaction approval to the second party to the transaction.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, system, and/or computer program product securely manages smart card transactions. A processing entity receives a smart card identifier from a smart card. The smart card identifier is a transaction-specific identifier for a transaction, and contains no financial data about a holder of the smart card. The smart card identifier is hidden from a second party to the transaction. The processing entity receives transaction data for the transaction from the second party, where the transaction data is blocked from the smart card. In response to determining that the transaction is valid, the processing entity issues a transaction confirmation to the smart card and a transaction approval to the second party to the transaction.
163 Citations
20 Claims
-
1. A method of securely managing smart card transactions, the method comprising:
-
receiving, by a processing entity, a smart card identifier from a smart card, wherein the smart card identifier is a transaction-specific identifier for a transaction, wherein the smart card identifier contains no financial data about a holder of the smart card, wherein the holder of the smart card is a first party to the transaction, and wherein the smart card identifier is hidden from a second party to the transaction; receiving, by the processing entity, transaction data for the transaction from the second party, wherein the transaction data is blocked from the smart card; associating, by the processing entity, the smart card identifier with account data for an account assigned to the holder of the smart card; associating, by the processing entity, the transaction data with the account to determine if the transaction is valid according to information located in the account data; and in response to determining that the transaction is valid, issuing, by the processing entity, a transaction confirmation to the smart card and a transaction approval to the second party to the transaction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer program product for managing smart card transactions, the computer program product comprising a computer readable storage medium having program code embodied therewith, the program code readable and executable by one or more processors to perform a method comprising:
-
receiving a smart card identifier from a smart card, wherein the smart card identifier is a transaction-specific identifier for a transaction, wherein the smart card identifier contains no financial data for a holder of the smart card, wherein the holder of the smart card is a first party to the transaction, and wherein the smart card identifier is hidden from a second party to the transaction; receiving transaction data for the transaction from the second party, wherein the transaction data is blocked from the smart card; associating the smart card identifier with account data for an account assigned to the holder of the smart card; associating the transaction data with the account to determine if the transaction is valid according to information located in the account data; and in response to determining that the transaction is valid, issuing a transaction confirmation to the smart card and a transaction approval to the second party to the transaction.
-
-
20. A computer system comprising:
-
a processor, a computer readable memory, and a computer readable storage medium; first program instructions to receive a smart card identifier from a smart card, wherein the smart card identifier is a transaction-specific identifier for a transaction, wherein the smart card identifier contains no financial data for a holder of the smart card, wherein the holder of the smart card is a first party to the transaction, and wherein the smart card identifier is hidden from a second party to the transaction; second program instructions to receive transaction data for the transaction from the second party, wherein the transaction data is blocked from the smart card; third program instructions to associate the smart card identifier with account data for an account assigned to the holder of the smart card; fourth program instructions to associate the transaction data with the account to determine if the transaction is valid according to information located in the account data; and fifth program instructions to, in response to determining that the transaction is valid, issue a transaction confirmation to the smart card and a transaction approval to the second party to the transaction; and
whereinthe first, second, third, fourth, and fifth program instructions are stored on the computer readable storage medium and executed by the processor via the computer readable memory.
-
Specification