End-to-end secure payment processes
First Claim
Patent Images
1. A method for a merchant to perform a payment processing transaction, the method comprising:
- at a merchant payment system,identifying customer identification data and unencrypted payment device data;
encrypting the unencrypted payment device data, wherein identifying customer identification data and unencrypted payment device data and encrypting the unencrypted payment device data includes, at a secure storage device, capturing at least the unencrypted payment device data and encrypting the unencrypted payment device data, andstoring the encrypted payment device data while the secure storage device does not have an active connection to a secure payment system;
submitting a first payment processing request to the secure payment system, wherein the payment processing request includes the customer identification data and the encrypted payment device data, wherein submitting a first payment processing request to a secure payment system further includes establishing a connection between the secure storage device and the secure payment system and using a client application on the merchant payment system to read the stored encrypted payment device data to generate the first payment processing request without storing the encrypted payment device data at the merchant payment system such that the encrypted payment device data is not visible to the merchant;
receiving a unique identifier associated with a customer account that was generated in response to the first payment processing request;
submitting a second payment processing request to the secure payment system such that the merchant is only required to identify the unique identifier of the customer account and not unencrypted payment device data or encrypted payment device data of the at least one payment device;
receiving a status from the secure payment system that the second payment processing request is approved, declined, or has experienced an instance of process failure; and
after receiving the status from the secure payment system that the second payment processing request is approved, declined, or has experienced an instance of process failure, deleting the stored encrypted payment device data from the secure storage device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of calculating the quality of a data record having a plurality of data fields involves indentifying individual fields in the data record that are incorrect and scoring those fields accordingly. Further fields are identified where any one or more of those fields may be incorrect, but it is not immediately possible to determine which one or ones. These further fields are also scored accordingly. A score for the data records as a whole is then calculated based on the scores assigned to individual fields. Different fields may be weighted according to their importance to the data record as a whole.
63 Citations
2 Claims
-
1. A method for a merchant to perform a payment processing transaction, the method comprising:
at a merchant payment system, identifying customer identification data and unencrypted payment device data; encrypting the unencrypted payment device data, wherein identifying customer identification data and unencrypted payment device data and encrypting the unencrypted payment device data includes, at a secure storage device, capturing at least the unencrypted payment device data and encrypting the unencrypted payment device data, and storing the encrypted payment device data while the secure storage device does not have an active connection to a secure payment system; submitting a first payment processing request to the secure payment system, wherein the payment processing request includes the customer identification data and the encrypted payment device data, wherein submitting a first payment processing request to a secure payment system further includes establishing a connection between the secure storage device and the secure payment system and using a client application on the merchant payment system to read the stored encrypted payment device data to generate the first payment processing request without storing the encrypted payment device data at the merchant payment system such that the encrypted payment device data is not visible to the merchant; receiving a unique identifier associated with a customer account that was generated in response to the first payment processing request; submitting a second payment processing request to the secure payment system such that the merchant is only required to identify the unique identifier of the customer account and not unencrypted payment device data or encrypted payment device data of the at least one payment device; receiving a status from the secure payment system that the second payment processing request is approved, declined, or has experienced an instance of process failure; and after receiving the status from the secure payment system that the second payment processing request is approved, declined, or has experienced an instance of process failure, deleting the stored encrypted payment device data from the secure storage device. - View Dependent Claims (2)
Specification