Electronic payment validation using transaction authorization tokens
A token and transaction technology, applied in the system field of authorizing electronic transactions, can solve the problem of easy theft of personal identification numbers
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] In the following description, well-known structures, materials, or principles of operation are not shown or described in detail to avoid obscuring aspects of the invention. Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
[0028] FIG. 1 is a block diagram illustrating a system according to one embodiment of the present invention. In one embodiment, the account holder system 102 includes a token creation and editing module 104 which in turn is controlled by a user interface 106 . The term "account holder" used here may also refer to a user authorized by the account holder.
[0029] When a user begins to create or edit a token or token settings, the token log access module 108 stores the token and settings in the token log 110 . The token log 110 shown in FIG. 1 is separate from the account holder system 102 , the seller system 114 and the financial institution system 122 . However, ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 