Portable consumer device verification system
First Claim
1. A computer-implemented method comprising:
- receiving an authorization request message associated with a payment transaction, by a server computer, wherein the authorization request message is generated after an interaction between a portable consumer device and an access device, wherein as a result of the interaction, the access device reads an account number and an expiration date associated with the portable consumer device;
after receiving the authorization request message, selecting an algorithm from among a plurality of algorithms associated with different types of portable consumer device fingerprinting systems using an algorithm identifier stored on a non-transitory computer readable medium of the server computer, wherein different types of portable consumer device fingerprinting systems are associated with different companies that each use their own proprietary algorithm in the access device to alter a fingerprint of a portable consumer device;
analyzing the authorization request message, using the server computer, for one or more characteristics of the portable consumer device or the access device to determine when a confidence threshold associated with the payment transaction is met or exceeded; and
when the confidence threshold is not exceeded, performing additional authentication processing, by the server computer, to authenticate the portable consumer device for the payment transaction.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for verifying a portable consumer device. The method includes receiving an authorization request message associated with a transaction conducted using a portable consumer device. The portable consumer device includes a portable consumer device fingerprint. The authorization request message includes an altered portable consumer device fingerprint and an algorithm identifier. The method also includes selecting an algorithm from among a plurality of algorithms using the algorithm identifier, determining the portable consumer device fingerprint using selected algorithm and the altered portable consumer device fingerprint, determining if the portable consumer device fingerprint matches a stored portable consumer device fingerprint, and sending an authorization response message after determining if the portable consumer device fingerprint matches the stored portable consumer device fingerprint.
263 Citations
26 Claims
-
1. A computer-implemented method comprising:
-
receiving an authorization request message associated with a payment transaction, by a server computer, wherein the authorization request message is generated after an interaction between a portable consumer device and an access device, wherein as a result of the interaction, the access device reads an account number and an expiration date associated with the portable consumer device; after receiving the authorization request message, selecting an algorithm from among a plurality of algorithms associated with different types of portable consumer device fingerprinting systems using an algorithm identifier stored on a non-transitory computer readable medium of the server computer, wherein different types of portable consumer device fingerprinting systems are associated with different companies that each use their own proprietary algorithm in the access device to alter a fingerprint of a portable consumer device; analyzing the authorization request message, using the server computer, for one or more characteristics of the portable consumer device or the access device to determine when a confidence threshold associated with the payment transaction is met or exceeded; and when the confidence threshold is not exceeded, performing additional authentication processing, by the server computer, to authenticate the portable consumer device for the payment transaction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system comprising:
-
means for receiving an authorization request message associated with a payment transaction, wherein the authorization request message is generated after an interaction between a portable consumer device and an access device, wherein as a result of the interaction, the access device reads an account number and an expiration date associated with the portable consumer device; means for selecting an algorithm, after receiving the authorization request message, from among a plurality of algorithms associated with different types of portable consumer device fingerprinting systems using an algorithm identifier, wherein different types of portable consumer device fingerprinting systems are associated with different companies that each use their own proprietary algorithm in the access device to alter a portable consumer device fingerprint; means for analyzing the authorization request message for one or more characteristics of the portable consumer device or the access device to determine when a confidence threshold associated with the payment transaction is met or exceeded; and means for performing additional authentication processing when the confidence threshold is not exceeded to authenticate the portable consumer device for the payment transaction. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A system comprising:
-
a server computer comprising a processor; and a non-transitory computer readable medium coupled to the non-transitory computer readable medium, the non-transitory computer readable medium having computer readable program codes embodies therein for; receiving an authorization request message associated with a payment transaction, wherein the authorization request message is generated after an interaction between a portable consumer device and an access device; wherein as a result of the interaction, the access device reads an account number and an expiration date associated with the portable consumer device; after receiving the authorization request message, selecting an algorithm from among a plurality of algorithms associated with different types of portable consumer device fingerprinting systems using an algorithm identifier, wherein different types of portable consumer device fingerprinting systems are associated with different companies that each use their own proprietary algorithm in the access device to alter a fingerprint of a portable consumer device; analyzing the authentication request message for one or more characteristics of the portable consumer device or the access device to determine when a confidence threshold associated with the payment transaction is met or exceeded, and performing additional authentication processing when the confidence threshold is not exceeded to authenticate the portable consumer device for the payment transaction. - View Dependent Claims (22, 23, 24, 25, 26)
-
Specification