×

Methods and systems for electromagnetic initiation of secure transactions

  • US 7,831,519 B2
  • Filed: 11/23/2004
  • Issued: 11/09/2010
  • Est. Priority Date: 12/17/2003
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for processing a secure transaction between a customer and a merchant, the method comprising:

  • receiving, at a merchant processing device, an electromagnetic transmission packet from a customer portable device, wherein the electromagnetic transmission packet includes an encrypted magnetic-stripe image and an encrypted version of an alphanumerical identifier;

    transmitting an identification of the merchant processing device and a transaction identifier to the customer portable device, wherein the electromagnetic transmission packet received from the customer portable device further includes an encryption of the transaction identifier and the identification of the merchant processing device;

    comparing, at the merchant processing device, the identification of the merchant processing device and transaction identifier received from the customer portable device with those transmitted to the customer portable device;

    receiving a keyed nonencrypted version of the alphanumerical identifier at the merchant processing device;

    decrypting, with the merchant processing device, the encrypted version of the alphanumerical identifier;

    comparing, with the merchant processing device, the decryption of the encrypted version of the alphanumerical identifier with the nonencrypted version of the alphanumerical identifier; and

    thereafter, transmitting a decryption of the encrypted magnetic-stripe image from the merchant processing device to a host system for executing the secure transaction with the host system using an account identified by the decryption of the magnetic-stripe image;

    wherein the comparing steps are performed offline by the merchant processing system before transaction approval is requested from the remote host system, and is performed without involvement from the host system.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×