Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication system with message conversion

A technology of messages and authentication requests, applied in the field of authentication systems with message conversion, which can solve problems such as payment party authentication difficulties

Inactive Publication Date: 2017-04-19
VISA INT SERVICE ASSOC
View PDF1 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for "card not present" transactions, such as those conducted online by mail or by telephone, it is more difficult to perform payer authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication system with message conversion
  • Authentication system with message conversion
  • Authentication system with message conversion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Embodiments of the invention may provide exemplary systems, apparatus and methods for performing transactions and related activities. Although these transactions may be referenced in the examples provided below, embodiments are not so limited. That is, the systems, methods and devices described herein may be used for any suitable purpose.

[0025] Before discussing the embodiments of the present invention, it may be helpful to describe some terms to understand the embodiments of the present invention.

[0026] An "authentication request message" may be an electronic message sent to one or more computing devices to request authentication of a transaction. In some embodiments, the authentication request message may be an electronic message sent to the payment processing network and / or the issuer of the payment account to request authentication of the payment transaction. In some implementations, the authentication request message may include cardholder, merchant, and tr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A server computing device receives authentication request messages formatted according to a first message format from a party via a computing device of a user involved in a transaction, translates the messages into modified authentication request messages formatted according to a second message format, and transmits the modified authentication request messages to an authorization computer. The server computing device may augment the modified authentication request messages by including data gathered from the received authentication request messages describing the user, user's computing device, and / or network path between the server computing device and user's computing device, as well as risk scores generated based upon the received authentication request message. Additionally, the server computing device receives messages formatted according to the second message format from the authorization computer and translates them into messages formatted according to the first message format to be sent to the user's computing device.

Description

[0001] Related Application Cross Reference [0002] This application is a non-provisional application and claims the benefit of priority of US Provisional Application No. 62 / 031,084, filed July 30, 2014, which is hereby incorporated by reference in its entirety for all purposes. Background technique [0003] During a transaction, it is desirable to authenticate the user conducting the transaction in order to avoid problems such as fraud. For example, during a payment transaction using a payment device (e.g., a credit card, debit card, or stored-value card), it is desirable to verify the identity of the cardholder of the account to avoid various issues such as unauthorized use. question. Payer authentication is the process of verifying the identity of the cardholder who owns the account. The most common method of authenticating the identity of the cardholder of an account is routinely performed at the point of sale during a so-called "card present" transaction. A card prese...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/38G06Q20/40
CPCG06Q20/40G06Q20/4016G06F21/31G06Q20/3224
Inventor M·尼尔森C·奥肯尼尔K·纽兰D·费舍尔
Owner VISA INT SERVICE ASSOC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More