Sélection de la langue

Search

Sommaire du brevet 2554173 

Énoncé de désistement de responsabilité concernant l'information provenant de tiers

Une partie des informations de ce site Web a été fournie par des sources externes. Le gouvernement du Canada n'assume aucune responsabilité concernant la précision, l'actualité ou la fiabilité des informations fournies par les sources externes. Les utilisateurs qui désirent employer cette information devraient consulter directement la source des informations. Le contenu fourni par les sources externes n'est pas assujetti aux exigences sur les langues officielles, la protection des renseignements personnels et l'accessibilité.

Disponibilité de l'Abrégé et des Revendications

L'apparition de différences dans le texte et l'image des Revendications et de l'Abrégé dépend du moment auquel le document est publié. Les textes des Revendications et de l'Abrégé sont affichés :

  • lorsque la demande peut être examinée par le public;
  • lorsque le brevet est émis (délivrance).
(12) Demande de brevet: (11) CA 2554173
(54) Titre français: SYSTEME ET PROCEDE PERMETTANT D'EXECUTER DES TRANSACTIONS TELEPHONIQUES ET INFORMATIQUES SECURISEES
(54) Titre anglais: SYSTEM AND METHOD FOR SECURE TELEPHONE AND COMPUTER TRANSACTIONS
Statut: Réputée abandonnée et au-delà du délai pour le rétablissement - en attente de la réponse à l’avis de communication rejetée
Données bibliographiques
(51) Classification internationale des brevets (CIB):
  • G6K 5/00 (2006.01)
(72) Inventeurs :
  • WANKMUELLER, JOHN (Etats-Unis d'Amérique)
(73) Titulaires :
  • MASTERCARD INTERNATIONAL INCORPORATED
(71) Demandeurs :
  • MASTERCARD INTERNATIONAL INCORPORATED (Etats-Unis d'Amérique)
(74) Agent: SMART & BIGGAR LP
(74) Co-agent:
(45) Délivré:
(86) Date de dépôt PCT: 2005-01-24
(87) Mise à la disponibilité du public: 2005-08-11
Requête d'examen: 2010-01-13
Licence disponible: S.O.
Cédé au domaine public: S.O.
(25) Langue des documents déposés: Anglais

Traité de coopération en matière de brevets (PCT): Oui
(86) Numéro de la demande PCT: PCT/US2005/002591
(87) Numéro de publication internationale PCT: US2005002591
(85) Entrée nationale: 2006-07-20

(30) Données de priorité de la demande:
Numéro de la demande Pays / territoire Date
10/764,099 (Etats-Unis d'Amérique) 2004-01-23
60/538,761 (Etats-Unis d'Amérique) 2004-01-23

Abrégés

Abrégé français

La présente invention se rapporte à un système et à un procédé de paiement électronique sécurisé permettant d'effectuer une transaction sécurisée au moyen d'une authentification. Un ordinateur de commerçant émet une demande d'autorisation à un serveur de commande d'accès. Ledit serveur de commande d'accès obtient l'authentification permettant de confirmer l'identité de l'acheteur, par exemple, par l'intermédiaire d'un formule électronique ou d'un système à réponse vocale interactif. Le serveur de commande d'accès émet ensuite une réponse à destination de l'ordinateur du commerçant. Si l'acheteur est autorisé à accéder aux comptes, le paiement est effectué par le commerçant et la transaction est menée à bien.


Abrégé anglais


A secure electronic payment system and method for conducting a secure
transaction (120) using authentication is provided. A merchant's computer
(104) transmits an authorization request to an access control server (112).
The access control (112) obtains authentication (130) to confirm the identity
of the purchaser (102), via e.g., an electronic form or interactive voice
response system. The access control server (112) then transmits a response to
the merchant's computer. If the purchaser (102) is authorized to access the
account, payment is processed by the merchant (104) and the transaction (102)
is completed.

Revendications

Note : Les revendications sont présentées dans la langue officielle dans laquelle elles ont été soumises.


I CLAIM:
1. A method for conducting a secure transaction between a merchant and
a customer wherein payment is processed from a payment account comprising:
providing a database comprising first authentication information associated
with a holder of said payment account;
providing payment account information associated with said payment account,
said payment account information to be used for conducting said transaction;
transmitting an authentication request including said payment account
information to an access control server;
receiving by a merchant information comprising authentication instructions;
receiving second authentication information from the customer;
comparing said first and said second authentication information to determine
whether said transaction is authorized by said holder of said payment account.
2. The method of claim 1 further comprising the step of transmitting an
authentication response responsive to said authentication request.
3. The method of claim 2 further comprising the steps of processing
payment from said paylnent account to complete the transaction as a function
of said
authentication response.
4. The method of claim 1 wherein said payment account information is
provided via telephone.
5. The method of claim 1 wherein said payment account information is
provided via computer network.
6. The method of claim 2 wherein said authentication request and said
authentication response are formatted according to the 3-D Secure
authentication
protocol.
7. The method of claim 1 wherein said authentication instructions
comprise information relating to IVR authentication.
8. The method of claim 1 wherein said authentication instructions
comprise information relating to MOBO authentication.
9. A method for conducting a secure transaction using authentication
wherein payment is processed from a holder's payment account comprising:
-15-

receiving payment account information associated with said payment account,
said payment account information to be used for conducting said transaction;
transmitting an authentication request including said payment account
information to an access control server, said authentication request
triggering
automatically by said server the transmission of data used to display an
electronic
form;
receiving via said electronic form authentication information from said
holder;
authenticating said holder for purposes of authorizing said transaction; and
authorizing said transaction.
10. The method of claim 9 further comprising the step of receiving an
authentication response responsive to said authentication request.
11. The method of claim 10 further comprising the steps of processing
payment from said payment account to complete the transaction as a function of
said
authentication response.
12. The method of claim 9 wherein said payment account information is
provided via telephone.
13. The method of claim 9 wherein said payment account information is
provided via computer network.
14. The method of claim 10 wherein said authentication request and said
authentication response are formatted according to the 3-D Secure
authentication
protocol.
15. The method of claim 9 wherein said authentication instructions
comprise information relating to IVR authentication.
16. The method of claim 9 wherein said authentication instructions
comprise information relating to MOBO authentication.
17. A method for conducting a secure transaction using authentication
wherein payment is processed from a payment account comprising:
providing a database comprising at least a first set of authentication
information associated with a holder of said payment account;
receiving payment account information associated with said payment account,
said payment account information to be used for conducting said transaction;
receiving an authentication request including at least said payment account
information in connection with conducting said transaction;
triggering automatically the display of an electronic form;
-16-

receiving a second set of authentication information from said holder of said
payment account;
inputting said second set of authentication information into said electronic
form; and
comparing said first set of authentication information to said second set of
authentication information to determine whether said transaction is authorized
by said
holder of said payment account.
18. The method of claim 17 further comprising the step of providing an
authentication response responsive to said authentication request.
19. The method of claim 18 further comprising the steps of processing
payment from said payment account to complete the transaction as a function of
said
authentication response.
20. The method of claim 17 wherein said payment account information is
provided via telephone.
21. The method of claim 17 wherein said payment account information is
provided via computer network.
22. The method of claim 18 wherein said authentication request and said
authentication response are formatted according to the 3-D Secure
authentication
protocol.
23. A system for conducting a secure transaction comprising:
a server computer subsystem, said server computer subsystem comprising
information relating to at least one payment account including at least a
first set of
authentication information relating to an account holder of said payment
account;
an automated voice response subsystem; and
an authentication subsystem,
wherein said automated voice response subsystem connects a call to said
account holder to obtain a second set of authentication information, and
further
wherein said authentication subsystem compares said first set of
authentication
information to said second set of authentication information to determine
whether the
transaction is authorized by said account holder.
24. The system of claim 23 wherein the transaction is conducted in
accordance with the 3-D Secure protocol.
25. A system for conducting a secure transaction between a merchant and
an account holder, comprising:
-17-

a server computer subsystem, said server computer subsystem comprising
information relating to at least one payment account including at least a
first set of
authentication information relating to an account holder of said payment
account; and
a virtual electronic form subsystem;
wherein said virtual electronic form subsystem provides an electronic form to
said merchant, said electronic form receiving a second set of authentication
information from said merchant, and further wherein said server computer
subsystem
compares said first set of authentication information to said second set of
authentication information to determine whether the transaction is authorized
by said
account holder.
26. The system of claim 25 wherein the transaction is conducted in
accordance with the 3-D Secure protocol.
-18-

Description

Note : Les descriptions sont présentées dans la langue officielle dans laquelle elles ont été soumises.


CA 02554173 2006-07-20
WO 2005/072382 PCT/US2005/002591
SYSTEM AND METHOD FOR SECURE TELEPHONE
AND COMPUTER TRANSACTIONS
SPECIFICATION
CROSS-REFERENCE TO RELATED APPLICATIONS
This application is a continuation-in-part of U.S. Patent Application
No. 10/764,099, entitled "System and Method for Secure Telephone And Computer
Transactions Using Voice Authentication," filed on January 23, 2004 (claiming
priority to U.S. Provisional Patent Application No. 60/442,143, filed January
23,
2003), which is fully incorporated herein by reference. This application also
claims
priority to U.S. Provisional Patent Application No. 60/538,761, filed January
23,
2004, which is fully incorporated herein by reference.
BACKGROUND OF THE INVENTION
Credit cards and other forms of payment cards were originally
designed for use during in-person transactions, during which the card may
provide
both a means for payment and a means for authentication of the cardholder. In
addition to having actual possession of the card, the purchaser must also
provide a
signature which may be compared with the signature on the back of the card.
The major drawback in telephone order transactions is that the vast
majority are not authenticated in the manner described above. Accordingly, the
number of fraudulent transactions and chargebaclcs associated with
credit/payment
cards are increased as a result. Additionally, consumers may be concerned
about the
potential hazards of providing personal payment information over a telephone
to a
possibly unknown and unidentifiable individual.
On-line shopping, or e-commerce, suffers many of the same problems.
On-line shopping offers unprecedented ease and convenience for consumers,
while
enabling merchants to reduce costs and obtain new customers. However, many
consumers have been reluctant to take advantage of these benefits due to fear
of theft
of sensitive information such as credit card numbers. Efforts have been made
to
increase the security of such information transmitted across the Internet. For
example,
in the secure socket layer (SSL) technique, messages sent between the consumer
and
the merchant are encrypted, thereby making it more difficult for a third party
to
intercept and use the information. ~ However, this method does not provide the

CA 02554173 2006-07-20
WO 2005/072382 PCT/US2005/002591
merchant with any verification of the identity of the consumer. Accordingly,
if a third
party were to obtain a credit card number by other fraudulent means such as
theft of
physical credit card,, the SSL method would not prevent the third party from
fraudulently using the stolen information.
Secure Electronic Transaction (SETTM) techniques attempt to solve the
foregoing problems by using digital certificates to authenticate the
consumer/account
holder, the merchant, and the credit card issuer. Each certificate is issued
by a trusted
certificate authority. While SETTM is currently the most secure way to handle
payments over the W ternet, it requires digital certificates and cryptographic
software
to be installed and operated on the account holder's computer.
In fact, most prior art secure electronic commerce systems require
consumers to install special software on their computers. Yet, many consumers
are
reluctant to install such software and, in any case, a specialized account
holder
application may not be compatible with a wide variety of account holder access
devices - e.g., personal computers, personal digital assistants, and mobile
communication devices such as mobile telephones. As a result, it has been
difficult
for some secure electronic commerce systems to gain widespread acceptance
among
consumers.
Accordingly, there exists a need in the art for a system and method for
confirming the identity of a customer in conjunction with a telephone or on-
line
purchase in order to facilitate a more secure transaction.
SUMMARY OF THE INVENTTON
It is therefore an object of the present invention to provide a method of
conducting secure telephone and on-line transactions.
This and other objects are accomplished by a system and method for
conducting a secure transaction which preferably includes the steps of
providing a
database including first authentication information associated with a holder
of the
payment account, providing payment account information associated with the
payment account, the payment account information to be used for conducting the
transaction, transmitting an authentication request including the payment
account
information to an access control server, receiving by a merchant information
including authentication instructions, receiving second authentication
information
from the customer, and comparing the first and the second authentication
information
_2_

CA 02554173 2006-07-20
WO 2005/072382 PCT/US2005/002591
to determine whether the transaction is authorized by the holder of the
payment
account.
The objects of the invention are further accomplished by a system and
method for conducting a secure transaction which preferably includes the steps
of
receiving payment account information associated with the payment account, the
payment account information to be used for conducting the transaction,
transmitting
an authentication request including the payment account information to an
access
control server, the authentication request triggering automatically by the
server the
transmission of data used to display an electronic form, receiving via the
electronic
form authentication information from the holder, authenticating the holder for
purposes of authorizing the transaction, and authorizing said transaction.
The objects of the invention are further still accomplished by a method
for conducting a secure transaction which preferably includes the steps of
providing a
database including at least a first set of authentication information
associated with a
holder of said payment account, receiving payment account information
associated
with the payment account, the payment account information to be used for
conducting
the transaction, receiving an authentication request including at least the
paynent
account information in comlection with conducting the transaction, triggering
automatically the display of an electronc form, receiving a second set of
authentication information from the holder of the payment account, inputting
the
second set of authentication information into the electronic form, and
comparing the
first set of authentication information to the second set of authentication
information
to determine whether the transaction is authorized by the holder of the
payment
account.
The obj ects of the invention are further accomplished by a system for
conducting a secure transaction which preferably includes a server computer
subsystem, the server computer subsystem including information relating to at
least
one payment account including at least a first set of authentication
information
relating to an account holder of the payment account, an automated voice
response
subsystem, and an authentication subsystem, wherein the automated voice
response
subsystem connects a call to the account holder to obtain a second set of
authentication information, and further wherein the authentication subsystem
compares the first set of authentication information to the second set of
authentication
information to determine whether the transaction is authorized by the account
holder.
-3-

CA 02554173 2006-07-20
WO 2005/072382 PCT/US2005/002591
The obj ects of the invention are further accomplished by a system for
conducting a secure transaction which preferably includes a server computer
subsystem, the server computer subsystem including information relating to at
least
one payment account including at least a first set of authentication
information
relating to an account holder of the payment account, and a virtual electronic
form
subsystem, wherein the virtual electronic form subsystem provides an
electronic form
to the merchant, the electronic form receiving a second set of authentication
information from the merchant, and further wherein the server computer
subsystem
compares the first set of authentication information to the second set of
authentication
information to determine whether the transaction is authorized by the account
holder.
BRIEF DESCRIPTION OF THE DRAWINGS
Further obj ects, features, and advantages of the present invention will
become apparent from the following detailed description taken in conjunction
with
the accompanying figures showing illustrative embodiments of the invention, in
which:
Fig. 1 is a block diagram illustrating an additional exemplary system
for conducting a payment transaction in accordance with the present invention;
Fig. 2A is a flow diagram illustrating an exemplary procedure for
conducting a payment transaction in accordance with the present invention;
Fig. 2B is a flow diagram illustrating an exemplary procedure for
conducting a payment transaction in accordance with the present invention;
Fig. 3A is a flow diagram illustrating an exemplary procedure for
conducting a payment transaction in accordance with the present invention;
Fig. 3B is a flow diagram illustrating an exemplary procedure for
conducting a payment transaction in accordance with the present invention;
Fig. 4 is a block diagram illustrating an exemplary system for
conducting a payment transaction in accordance with the present invention; and
Fig. 5 is a bloclc diagram illustrating an exemplary system for
conducting a payment transaction in accordance with the present invention.
Throughout the figures, unless otherwise stated, the same reference
numerals and characters are used to denote like features, elements,
components, or
portions of the illustrated embodiments.
-4-

CA 02554173 2006-07-20
WO 2005/072382 PCT/US2005/002591
DETAILED DESCRIPTION OF THE INVENTION
Fig. 1 illustrates an exemplary method for performing secure paynent
transactions in accordance with the present invention. The system includes a
consumer 102, a merchant 104 selling goods and/or services, an acquirer 106 -
typically the merchant's acquiring bank - and an issuer 108 - typically a
financial
institution such as a bank - that has issued a payment account being used to
conduct
a transaction with the merchant. The system may also include a cardholder
directory/database 110 which stores information regarding the cardholder's
account.
The database 110 is operated by a payment organization such as the MasterCard~
payment organization and is preferably a server computer connected to a
network
such as the Internet. The system preferably further includes, as part of the
issuer
system 108, an issuer access control server 112 which is mated to an issuer
virtual
authentication service 114, in accordance with an exemplary embodiment of the
present invention.
The consumer 102 may be conducting the transaction 120 with the
merchant 104 via telephone. The system and method of the present invention may
be
implemented regardless of the means by which the transaction between the user
and
merchant is conducted, and the present invention accordingly shall not be
limited to
telephone transactions. The payment account used to pay for the goods or
services
rendered by merchant 104 is typically a credit card account, a debit card
account,
and/or any other type of payment card account. The account can, but need not
be,
associated with a physical card. For example, the payment account can be
associated
with a virtual card which can be stored electronically on a computing device
used by
consumer 102. The consumer can, but need not be, the account holder, and as
used
herein the term "holder" includes one or more individuals associated with and
authorized to use a payment account or payment card.
In one exemplary embodiment of a method according to the present
invention, transaction 120 is conducted between a consumer 102 and a merchant
104,
using a payment card such as a MasterCard° credit card. Consumer 102
selects the
goods/services to purchase, and places an order with merchant 104, thereby
providing
merchant 104 with payment account information, including MasterCard't credit
card
information such as account number, expiration date, and name of the
cardholder.
Merchant 104, using a computer system connected to a network, may transmit a
query
-5-

CA 02554173 2006-07-20
WO 2005/072382 PCT/US2005/002591
122 to a directory 110 such as a MasterCard~ directory to determine the
cardholder's
participation in authentication services.
The directory 110 then preferably communicates 124 with the issuer
108 to verify cardholder participation. This verification 124 may be conducted
with
an issuer access control server 112, which preferably is part of an issuer
system 108.
Assuming the cardholder is verified as utilizing authentication services such
as those
described in accordance with the present invention, directory 110 may transmit
to the
merchant 104 an enrollment verification message 126 verifying the cardholder's
enrollment for authentication services. After the merchant 104 receives the
enrollment verification message from the directory 110, the merchant 104 may
inform
the consumer 102 that authentication will be performed, and that the
transaction will
be completed upon receipt of authorization. The merchant 104 preferably then
transmits to issuer access control server 112 via issuer authentication
service 114 a
request for authentication 130.
Authentication may now be performed by one of several methods
depending upon the speciFc implementation of the present invention. For
example, in
the context of a telephone order authentication system, the merchant 104 may
prompt
the cardholder for data over the telephone line (or via Internet, in the case
of ail on-
line transaction), which data may be used to perform authentication. However,
several other procedures for authentication may also be implemented within the
scope
of the present invention.
For example, in one exemplary embodiment, extensions to the
transaction's core protocol (e.g., the 3-D Secure protocol, described in
greater detail
hereinafter and in related applications referenced hereinafter) may be
implemented,
and the data necessary for authentication may be carried within extension
"tags" of
the messages exchanged (such as the VEReq, VERes and PAReq messages) during
the course of an otherwise-standard 3-D Secure transaction.
In another exemplary embodiment in accordance with a system and
method of the present invention, the core protocol may be implemented without
modification. In one such embodiment, all data and tags according to the 3-D
Secure
protocol may remain unchanged. However, in order to perform the authentication
steps, a merchant may query a second directory to determine independently
whether
an issuer participates in authentication. If the issuer does participate in
authentication,
-6-

CA 02554173 2006-07-20
WO 2005/072382 PCT/US2005/002591
the merchant may direct the cardholder to call an Interactive Voice Response
("IVR")
System in order to complete authentication.
In yet another exemplary embodiment in accordance with a system and
method of the present invention, as discussed above, the core protocol may
remain
largely unchanged, with minor modification which would allow the merchant, on
behalf of the cardholder, to enter data into the authentication system. Such a
system
may be beneficial particularly for telephone transactions wherein the
cardholder may
not have access to a computer and may not wish to terminate the telephone call
with
the merchant (to provide the necessary authentication data to the issuer)
until the
transaction has been completed. In one such embodiment, modification may be
made
to the 3-D Secure protocol such that the Access Control Server URL field in
the
VERes message may be modified to prompt a merchant to enter authentication
data
on behalf of the cardholder. Notably, the cardholder may preferably be the
consumer
102 or, alternatively, the consumer may be a purchaser who is authorized by
the
cardholder to pay for the transaction with the merchant. The latter case may
apply
where, for example, an agent of the cardholder is directed to purchase goods
or
services on behalf of the cardholder. As used herein, the term "holder"
includes any
of these individuals.
Regardless of the procedure used to obtain the required information
from the cardholder, the information requested from the cardholder for
authentication
purposes may include any information on file with the issuer 108 and which may
be
used to verify the identity of the caller/purchaser, i.e., that the
caller/purchaser is the
cardholder. One such example would be to utilize an EMV Chip Card and card
reader
to provide the merchant, issuer, or an automated call center with the
Cardholder's
SecureCode.TM Other procedures for verification as would be known to those
skilled
in the art may include use of dynamic security questions, Dual Tone Multiple-
Frequency ("DTMF") user input by the caller/purchaser, voice biometrics
analysis, or
any other method for confirming that the caller/purchaser is the cardholder.
Continuing with the description of the exemplary embodiment of a
system according to the present invention, if the issuer access control server
112
determines that the transaction has been properly authenticated, the access
control
server 112 preferably transmits an authentication response message 132 through
the
issuer authentication service 114 to the merchant 104, indicating that the
transaction
has been authenticated. Thereafter, the transaction may be completed as would

CA 02554173 2006-07-20
WO 2005/072382 PCT/US2005/002591
otherwise be known in the art, e.g., through communications 134 between the
merchant 104 and an acquirer 106 and communications 136 between acquirer 106
and
issuer 108. An exemplary embodiment of the present invention may be
implemented
in conjunction with security protocols such as the 3-D (or three domain)
Secure
authentication protocol. The 3-D Secure authentication protocol is known in
the art
and has generally been adopted and implemented across the payment industry.
The
present invention may be implemented in conjunction with MasterCard°'s
implementation of 3-D Secure as described in U.S. Provisional Patent
Application No.
60/477,187, entitled "Algorithm for use in a Secure Payment Application,"
filed on
June 10, 2003, which is incorporated herein by reference in its entirety, and
related
applications. However, it is noted that the scope of the present invention
shall not be
limited to this implementation of a system and method for secure transactions
using
the 3-D Secure protocol; the concepts described herein may be broadly applied
in
numerous ways as would be apparent to one skilled in the related art.
Additional detail regarding completion of the transaction using
MasterCard"'s implementation of the 3-D Secure protocol can be found in the
following applications, all of which are also incorporated herein by reference
in their
entirety: U.S. Patent Application No. 09/963,274, entitled "A Universal and
Interoperable System and Method Utilizing a Universal Cardholder
Authentication
Field (UCAF) For Authentication Data Collection and Validation," filed on
September 26, 2001; U.S. Provisional Patent Application No. 60/280,776,
entitled
"System and Method for Secure Payment Application (SPA) and Uiuversal
Cardholder Authentication," filed on April 2, 2001; U.S. Provisional Patent
Application No. 60/295,630, entitled "Method and Process for a Secure Payment
Application Using a Universal Cardholder Authentication Field," filed on June
4,
2001; U.S. Provisional Patent Application No. 60/307,575, entitled "Method and
System for Conducting Transactions Over a Communication Network Using a Secure
Payment Application," filed on July 24, 2001; U.S. Patent Application No.
09/886,486, entitled "Method and System for Conducting Secure Payments Over a
Computer Network Without a Pseudo or Proxy Account Number," filed on June 22,
2001; U.S. Patent Application No. 09/886,485, entitled "Method and System for
Conducting Secure Payments Over a Computer Networlc," filed on June 22, 2001;
U.S. Patent Application No. 10/096,271, entitled "System and Method for
Conducting
Secure Payment Transactions," filed on March 11, 2002; and U.S. Provisional
Patent
_g_

CA 02554173 2006-07-20
WO 2005/072382 PCT/US2005/002591
Application No. 60/352,96, entitled "MasterCard UCAF TM and SPA TM Client-
less Solution," filed on January 30, 2002.
Figs. 2A and 2B illustrate an exemplary method for operating the
payment transaction system illustrated in Fig. 1 using authentication, in
conjunction
with the 3-D Secure authentication protocol. First, a consumer selects goods
and/or
services which are the subject of the transaction (Step 202). Next, the
merchant
computer system queries a MasterCard" directory to verify cardholder
participation in
the voice authentication system (Step 204). This query may preferably be in
the form
of a 3-D Secure Verify Enrollment Request (VEReq) message, as described in
detail
in the references incorporated hereinabove. Notably, the merchant system may
be
configured with a software plug-in to facilitate compatibility and efficient
interoperability with, e.g., the issuer (e.g., via a plug-in on the issuer
side such as an
issuer virtual pop-up service) and directory systems. This plug-in may be used
to
translate data from the merchant system into a format suitable for use by the
issuer
system, and vice-versa. Such a plug-in would be useful to facilitate upgrading
a
merchant's current system for use with a system and method in accordance with
the
present invention, though such an upgrade is not necessary within the scope of
the
present invention. Additionally, the plug-in may be composed of software,
hardware,
or some combination thereof.
Next, the MasterCard° directory communicates with an Issuer Access
Control Server to verify cardholder participation (Step 206). Assuming
cardholder
participation is verified, the MasterCard° directory then transmits an
enrollment
verification message to the merchant computer system (Step 20~), indicating
that
authentication will be performed (Step 214). The enrollment verification
message
may preferably be in the form of a Verify Enrollment Response (VERes) message
in
accordance with MasterCard°'s implementation of 3-D Secure as
referenced above.
Also as described above, this message may be received by a software plug-in in
the
merchant system, which plug-in provides interoperability with the merchant's
current
system.
After the merchant receives the VERes from the MasterCard°
directory, which validated cardholder participation, the merchant may transmit
an
authentication request message (Step 210) to the issuer system. The request
message
may preferably be a 3-D Secure Payer Authorization Request (PAReq) message,
and
may be received by the Issuer's Access Control Server. The PAReq message
_9_

CA 02554173 2006-07-20
WO 2005/072382 PCT/US2005/002591
preferably includes a plurality of data fields, e.g., including information
which will
enable the issuer to perform authentication, and may also contain a "Request
Expiration" field, which may be used to indicate the date and time when the
merchant
plug-in will allow the transaction to time out if no Payer Authentication
Response
(PARes) is received from the Issuer Access Control Server by the merchant plug-
in.
After the Issuer Access Control Server receives the PAReq message,
authentication may be corninenced. In one exemplary embodiment of the present
invention, the issuer authentication service may be a "Virtual Pop-Up" Service
which
prepares an electronic form for the Cardholder (Step 212) and transmits the
form to
the Merchant for entry of the Cardholder's data. The Merchant may then request
the
caller/purchaser's pertinent data over the telephone and enter the information
into the
form and transmit the data to the issuer for authentication of the Cardholder
(Step
' 214) (this exemplary embodiment may be termed a Merchant-On-Behalf Of, or
"MOBO" approach, described more fully hereinafter in connection with Fig. 3A).
Upon completion of the authentication procedure, described more fully in
conjunction
with Figs. 3A and 3B below, an authentication response is generated by the
Issuer
Access Control Server and transmitted to the merchant (Step 222), indicating
the
result of the authentication procedure. The authentication response may be in
the
form of, e.g., a Payer Authentication Response (PARes) in accordance with the
3-D
Secure protocol.
If authentication fails or times out, the transaction may still be
corninenced depending on the reason for failure and configuration of the
particular
embodiment of the system according to the present invention. However, if
authentication fails due to an apparent authorization problem, signaling a
potential
fraudulent transaction, authentication may be declined (Step 218) and the
transaction
cancelled. In contrast, if authentication completes successfully (Step 220),
then the
Access Control Server may transmit an authentication response to the Merchant
(Step
222) and the transaction may be completed in the conventional manner in
accordance
with the 3-D Secure protocol (Step 224).
An exemplary procedure for performing authentication (Step 214 of
Fig. 2A) is illustrated in Fig. 3A. In this exemplary embodiment, a Merchant-
On-
Behalf Of ("MOBO") approach is implemented, i.e., the Merchant requests the
authentication information from a Cardholder (e.g., over the telephone during
a
telephone transaction) and enters the authentication information into the
system via an
-10-

CA 02554173 2006-07-20
WO 2005/072382 PCT/US2005/002591
electronic form or other means. Upon a Cardholder's purchase, the Merchant may
communicate via a Merchant Plug-In with the Issuer Access Control Server to
determine whether the Cardholder is enrolled in authentication services (Step
302). In
response, the Issuer may transmit a VERes message which includes a query
string
parameter "IVRNO" within the ACS (Access Control Server)~URL element (Step
304). For example, the following sample URL may be included in the VERes
message:
hops://securecode.issuer.comlauthenticate.asp?IVRNO=MOBO
This additional query string parameter appended to the ACS URL is detected by
the
Merchant Plug-In and indicates to a Merchant that the Cardholder is enrolled
for
telephone authentication and that the Merchant must perform a MOBO
authentication
using the prescribed means for authentication (e.g., SecureCodeTM)
Next, the Merchant Plug-In may generate a PAReq message and
append a name/value pair within the merchant data (such as "##authentication-
type=MOBO##") The Merchant may then transmit the merchant data to the Issuer
Access Control Server (Step 306). This name/value pair indicates to the Access
Control Server that the PAReq transmitted by the Merchant is for telephone
authentication as opposed to e-commerce/on-line transaction authentication.
The
Merchant may then follow the instructions provided on an authentication web
page
provided by the Issuer Access Control Server (Step 30S) and collect the
necessary
authentication information from the Cardholder. The Merchant may then input
the
received authentication information into the Access Control Server electronic
form
(Step 310). The electronic form (or "Virtual Pop-Up") is preferably provided
by the
Issuer Authentication Service. The electronic form may be provided via the
Internet
using a web interface, or may be provided using any software application which
would facilitate the secure transfer of data between the Merchant and Issuer.
Next, The Issuer Access Control Server preferably generates a PARes
(Step 312) and transmits the PARes to the URL defined in the TermURL element
of
the PAReq. The Merchant Plug-In may receive the encoded PARes and extract and
validate the digital signature (Step 314). In accordance with the 3-D Secure
Protocol,
the Merchant may then retrieve the Application Authentication Value (AAV) from
the PARes and pass the AAV in the authorization message (Step 316). Finally,
the
Merchant may complete the transaction in accordance with the 3-D Secure
protocol or
other known transaction protocol (Step 319).
-11-

CA 02554173 2006-07-20
WO 2005/072382 PCT/US2005/002591
Another exemplary procedure for performing authentication (Step 214
of Fig. 2A) is illustrated in Fig. 3B. In this exemplary embodiment, an
Interactive
Voice Response ("IVR") approach is implemented, i.e., wherein the Merchant
conducts a transaction over the telephone with a caller/purchaser and
transfers the
caller/purchaser for authentication purposes to an IVR system which prompts
the
purchaser for authentication information and performs the necessary
authentication
steps.
Upon a Caxdholder's purchase, the Merchant may communicate via a
Merchant Plug-In with the Access Control Server to determine whether the
Cardholder is enrolled in authentication services (Step 320). Next, the Issuer
may
transmit a VERes message which includes a query string parameter "IVRNO"
within
the ACS (Access Control Server) URL element (Step 322). For example, the
following sample URL may be included in the VERes message:
https://securecode.issuer.coxn/authenticate.asp?IVRNO=IVR
This additional query string parameter appended to the ACS URL is detected by
the
Merchant Plug-In and indicates to the Merchant that the Cardholder is enrolled
for
telephone authentication and that the Merchant must perform IVR
authentication.
Next, the Merchant Plug-In may generate a PAReq message and
append name/value pairs within the merchant data element to indicate
parameters for
authentication, for example:
"##authentication-type=IVR;caller-id=14403528444;transfer-
back=Y;transfer-number=18004681512##"
The merchant may then transmit the PAReq to the Issuer Access Control Server
(Step
324). For example, the value above may indicate to the Access Control Server
that
the PAReq transmitted by the Merchant is for telephone authentication as
opposed to
e-commerce/on-line authentication, that the authentication procedure is IVR,
and
preferably also provides information such as caller identification
information,
instructions regarding the telephone number to which the customer should be
transferred for IVR authentication, and a TransferBack flag which indicates to
the
IVR system whether or not the caller should be transferred back to the
Merchant upon
completion of IVR authentication. The Merchant may then transfer the caller to
the
phone number provided within the query string to initiate IVR authentication
(Step
326). The caller/purchaser may then be transferred to the issuer IVR for
authentication (Step 328). Authentication may be performed using numerous
-12-

CA 02554173 2006-07-20
WO 2005/072382 PCT/US2005/002591
different procedures within the scope of the present invention, and may
include, e.g.,
prompting the caller/purchaser to confirm the purchase information and
prompting the
caller/purchaser to enter/speak authentication information such as the
Cardholder's
SecureCode. Next, The Issuer Access Control Server may authenticate the
caller/purchaser, generate a PARes and transmit the PARes to the URL defined
in the
TermURL element (Step 330). The Cardholder may be transferred back to the
merchant if the TransferBack parameter in the merchant data so dictates. The
Merchant Plug-In may then receive the encoded PARes and extract/validate the
digital signature (Step 332). In accordance with the 3-D Secure Protocol, the
Merchant may then retrieve the AAV from the PARes and pass the AAV in the
authorization message (Step 334). Finally, the Merchant may complete the
transaction as normal in accordance with a 3-D Secure protocol or other known
protocol (Step 336).
It will be appreciated by those skilled in the art that the methods and
systems illustrated in Figs. 1-3 can be implemented using various standard
computer
platforms operating under the control of suitable software. In some cases,
dedicated
computer hardware, such as a peripheral card in a conventional personal
computer,
may be used to enhance the operational efficiency of the above methods.
Figs. 4 and 5 illustrate typical computer hardware suitable for
practicing the present invention. Refernng to Figure 4, the computer system
includes
a processing section 410, a display 420, a keyboard 430, and a communications
peripheral device 440 such as a modem. The system can also include a printer
460.
The computer system typically includes one or more disk drives 470 which can
read
and write to computer-readable media such as magnetic media (i.e., diskettes)
and/or
optical media (e.g., CD-ROMS or DVDs), for storing data and application
software.
The system also typically includes an internal computer-readable medium 480
such as
a hard disk drive. Other input devices, such as a digital pointer 490 (e.g., a
mouse)
and a card reader 450 for reading a payment card 400 can also be included.
Computer
hardware such as is illustrated in Figs. 4 and 5 can be used to execute the
software
illustrated in Figs. 1-3, and/or can be used to perform functions of a
computer
processors utilized by consumer 102, merchant 104 (and the related merchant
plug-in
discussed hereinabove), acquirer 106, issuer system 108, and directory system
110.
Figure 5 is a functional bloclc diagram which further illustrates the
processing section 410. The processing section 410 generally includes a
processing
-13-

CA 02554173 2006-07-20
WO 2005/072382 PCT/US2005/002591
unit 510, control logic 520 and a memory unit 550. Preferably, the processing
section
410 can also include a timer 530 and input/output ports 540. The processing
section
410 can also include a co-processor 560, depending on the microprocessor used
in the
processing unit. Control logic 520 provides, in conjunction with processing
unit 510,
the control necessary to handle corrununications between memory unit 550 and
input/output ports 540. Timer 530 provides a timing reference signal for
processing
unit 510 and control logic 520. Co-processor 560 provides an enhanced ability
to
perform complex computations in real time, such as those required by
cryptographic
algoritluns.
Memory unit 550 can include different types of memory, such as
volatile and non-volatile memory and read-only and programmable memory. For
example, as shown in Fig. 5, memory unit 550 can include read-only memory
(ROM)
552, electrically erasable programmable read-only memory (EEPROM) 554, and
random-access memory (RAM) 556. Different computer processors, memory
configurations, data structures and the like can be used to practice the
present
invention, and the invention is not limited to a specific platform. For
example,
although the processing section 410 is illustrated in Figs. 4 and 5 as part of
a
computer system, the processing section 410 and/or its components can be
incorporated into a PDA or a mobile telephone.
Although the present invention has been described in connection with
specific exemplary embodiments, it should be understood that various changes,
substitutions, and alterations apparent to those skilled in the art may be
made to the
disclosed embodiments without departing from the spirit and scope of the
invention as
set forth in the appended claims.
-14-

Dessin représentatif
Une figure unique qui représente un dessin illustrant l'invention.
États administratifs

2024-08-01 : Dans le cadre de la transition vers les Brevets de nouvelle génération (BNG), la base de données sur les brevets canadiens (BDBC) contient désormais un Historique d'événement plus détaillé, qui reproduit le Journal des événements de notre nouvelle solution interne.

Veuillez noter que les événements débutant par « Inactive : » se réfèrent à des événements qui ne sont plus utilisés dans notre nouvelle solution interne.

Pour une meilleure compréhension de l'état de la demande ou brevet qui figure sur cette page, la rubrique Mise en garde , et les descriptions de Brevet , Historique d'événement , Taxes périodiques et Historique des paiements devraient être consultées.

Historique d'événement

Description Date
Inactive : Morte - Aucune rép. dem. par.30(2) Règles 2014-07-16
Demande non rétablie avant l'échéance 2014-07-16
Réputée abandonnée - omission de répondre à un avis sur les taxes pour le maintien en état 2014-01-24
Inactive : Abandon. - Aucune rép dem par.30(2) Règles 2013-07-16
Modification reçue - modification volontaire 2013-02-20
Inactive : Dem. de l'examinateur par.30(2) Règles 2013-01-16
Lettre envoyée 2012-12-27
Exigences de rétablissement - réputé conforme pour tous les motifs d'abandon 2012-12-21
Réputée abandonnée - omission de répondre à un avis sur les taxes pour le maintien en état 2012-01-24
Modification reçue - modification volontaire 2011-08-22
Lettre envoyée 2010-02-04
Exigences pour une requête d'examen - jugée conforme 2010-01-13
Requête d'examen reçue 2010-01-13
Toutes les exigences pour l'examen - jugée conforme 2010-01-13
Lettre envoyée 2007-05-04
Exigences de rétablissement - réputé conforme pour tous les motifs d'abandon 2007-04-19
Réputée abandonnée - omission de répondre à un avis sur les taxes pour le maintien en état 2007-01-24
Inactive : Page couverture publiée 2006-09-26
Lettre envoyée 2006-09-21
Inactive : Notice - Entrée phase nat. - Pas de RE 2006-09-21
Demande reçue - PCT 2006-08-30
Exigences pour l'entrée dans la phase nationale - jugée conforme 2006-07-20
Demande publiée (accessible au public) 2005-08-11

Historique d'abandonnement

Date d'abandonnement Raison Date de rétablissement
2014-01-24
2012-01-24
2007-01-24

Taxes périodiques

Le dernier paiement a été reçu le 2012-12-21

Avis : Si le paiement en totalité n'a pas été reçu au plus tard à la date indiquée, une taxe supplémentaire peut être imposée, soit une des taxes suivantes :

  • taxe de rétablissement ;
  • taxe pour paiement en souffrance ; ou
  • taxe additionnelle pour le renversement d'une péremption réputée.

Les taxes sur les brevets sont ajustées au 1er janvier de chaque année. Les montants ci-dessus sont les montants actuels s'ils sont reçus au plus tard le 31 décembre de l'année en cours.
Veuillez vous référer à la page web des taxes sur les brevets de l'OPIC pour voir tous les montants actuels des taxes.

Historique des taxes

Type de taxes Anniversaire Échéance Date payée
Taxe nationale de base - générale 2006-07-20
Enregistrement d'un document 2006-07-20
Rétablissement 2007-04-19
TM (demande, 2e anniv.) - générale 02 2007-01-24 2007-04-19
TM (demande, 3e anniv.) - générale 03 2008-01-24 2008-01-18
TM (demande, 4e anniv.) - générale 04 2009-01-26 2009-01-26
TM (demande, 5e anniv.) - générale 05 2010-01-25 2010-01-04
Requête d'examen - générale 2010-01-13
TM (demande, 6e anniv.) - générale 06 2011-01-24 2011-01-04
Rétablissement 2012-12-21
TM (demande, 7e anniv.) - générale 07 2012-01-24 2012-12-21
TM (demande, 8e anniv.) - générale 08 2013-01-24 2012-12-21
Titulaires au dossier

Les titulaires actuels et antérieures au dossier sont affichés en ordre alphabétique.

Titulaires actuels au dossier
MASTERCARD INTERNATIONAL INCORPORATED
Titulaires antérieures au dossier
JOHN WANKMUELLER
Les propriétaires antérieurs qui ne figurent pas dans la liste des « Propriétaires au dossier » apparaîtront dans d'autres documents au dossier.
Documents

Pour visionner les fichiers sélectionnés, entrer le code reCAPTCHA :



Pour visualiser une image, cliquer sur un lien dans la colonne description du document (Temporairement non-disponible). Pour télécharger l'image (les images), cliquer l'une ou plusieurs cases à cocher dans la première colonne et ensuite cliquer sur le bouton "Télécharger sélection en format PDF (archive Zip)" ou le bouton "Télécharger sélection (en un fichier PDF fusionné)".

Liste des documents de brevet publiés et non publiés sur la BDBC .

Si vous avez des difficultés à accéder au contenu, veuillez communiquer avec le Centre de services à la clientèle au 1-866-997-1936, ou envoyer un courriel au Centre de service à la clientèle de l'OPIC.


Description du
Document 
Date
(yyyy-mm-dd) 
Nombre de pages   Taille de l'image (Ko) 
Revendications 2006-07-19 4 177
Abrégé 2006-07-19 1 63
Description 2006-07-19 14 883
Dessin représentatif 2006-07-19 1 13
Dessins 2006-07-19 7 174
Page couverture 2006-09-25 1 42
Rappel de taxe de maintien due 2006-09-25 1 110
Avis d'entree dans la phase nationale 2006-09-20 1 192
Courtoisie - Certificat d'enregistrement (document(s) connexe(s)) 2006-09-20 1 105
Courtoisie - Lettre d'abandon (taxe de maintien en état) 2007-03-20 1 175
Avis de retablissement 2007-05-03 1 165
Rappel - requête d'examen 2009-09-27 1 117
Accusé de réception de la requête d'examen 2010-02-03 1 176
Courtoisie - Lettre d'abandon (taxe de maintien en état) 2012-03-19 1 174
Avis de retablissement 2012-12-26 1 163
Courtoisie - Lettre d'abandon (R30(2)) 2013-09-09 1 164
Courtoisie - Lettre d'abandon (taxe de maintien en état) 2014-03-20 1 171
PCT 2006-07-19 2 64
Taxes 2007-04-18 1 28
Taxes 2008-01-17 1 35
Taxes 2009-01-25 1 36
Taxes 2010-01-03 1 36
Taxes 2011-01-03 1 35