throbber
111111111111111111111111111111111111111111111111111111111111111111111111111
`US007840486B2
`
`(12) United States Patent
`D'Agostino
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 7,840,486 B2
`Nov. 23, 2010
`
`(54) SYSTEM AND METHOD FOR PERFORMING
`SECURE CREDIT CARD PURCHASES
`
`(76)
`
`Inventor:
`
`John D'Agostino, 6237 Weymouth Dr.,
`Sarasota, FL (US) 34238
`
`( *) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.c. 154(b) by 0 days.
`
`(21) Appl. No.: 11/252,009
`
`(22)
`
`Filed:
`
`Oct. 17, 2005
`
`(65)
`
`(63)
`
`Prior Publication Data
`
`US 2006/0031161 Al
`
`Feb. 9,2006
`
`Related U.S. Application Data
`
`Continuation of application No. 10/037,007, filed on
`Nov. 9, 2001, now abandoned, which is a continuation(cid:173)
`in-part ofapplication No. 09/231,745, filed on Jan. 15,
`1999, now Pat. No. 6,324,526.
`
`(51)
`
`Int. Cl.
`G06Q40/00
`
`(52)
`
`U.S. Cl.
`
`(2006.01)
`
`705/44; 705/41
`
`(58)
`
`(56)
`
`CA
`
`Field of Classification Search .... ... ... ..... .... 705/39,
`705/40,44
`See application file for complete search history.
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`3,938,091 A
`2/1976 Atalla et al.
`12/1983 Sano et al.
`4,423,316 A
`(Continued)
`
`FOREIGN PATENT DOCUMENTS
`2167543
`7/1997
`(Continued)
`
`OTHER PUBLICATIONS
`
`Lee et al.: Evoluntionary business models for e-cash with smart
`cards, Korea Advanced Institute of Science and Technology, Korea,
`htp://koasas.kaist.ac.kr/bitstrearn/l0203/4774/1/2000-092.pdf , pp.
`352-358.*
`
`(Continued)
`
`Primary Examiner-Hani Kazimi
`Assistant Examiner-Bijendra K Shrestha
`(74) Attorney, Agent, or Firm-Maxey Law Offices, PLLC;
`Stephen Lewellyn
`
`(57)
`
`ABSTRACT
`
`A method and system of performing secure credit card pur(cid:173)
`chases in the context of a remote commercial transaction,
`such as over the telephone, wherein only the customer, once
`generally deciding upon a product or service to be purchased,
`communicates with a custodial authorizing entity, such as a
`credit card company or issuing bank wherein such entity has
`previous knowledge of the credit card number as well as
`custodial control of other account parameters such as interest
`rate, payment history, available credit limit etc. The customer
`supplies the custodial authorizing entity with the account
`identification data such as the credit card number and a
`requested one of a possible plurality of predetermined pay(cid:173)
`ment categories which define the dollar amount for the pur(cid:173)
`chase and specific, predetermined time parameters within
`which authorization by the custodial authorizing entity will
`remain in effect. The custodial authorizing entity then gener(cid:173)
`ates a transaction code which is communicated exclusively to
`the customer wherein the customer in tum communicates
`only the transaction code to the merchant instead of a credit
`card number. The transaction code is indicative of merchant
`identification, credit card account identification and a desig(cid:173)
`nated one of the plurality of predetermined payment catego(cid:173)
`nes.
`
`30 Claims, 2 Drawing Sheets
`
`MasterCard, Exh. 1001, p. 1
`
`

`

`u.s. PATENT DOCUMENTS
`4,707,592 A
`11/1987 Ware
`4,720,860 A
`1/1988 Weiss
`4,725,719 A
`2/1988 Oncken et al.
`4,747,050 A
`5/1988 Bracht! et al.
`4,797,920 A
`1/1989 Stein
`4,893,330 A *
`1/1990 Franco
`5,097,505 A
`3/1992 Weiss
`5,130,519 A
`7/1992 Bush et al.
`5,163,097 A
`11/1992 Pegg
`5,193,114 A
`3/1993 Moseley
`5,196,840 A
`3/1993 Leith et al.
`5,202,826 A
`4/1993 McCarthy
`5,239,583 A
`8/1993 Parrillo
`5,287,268 A
`2/1994 McCarthy
`5,317,636 A
`5/1994 Vizcaino
`5,323,338 A
`6/1994 Hawthorne
`5,326,960 A
`7/1994 Tannenbaum
`5,350,906 A
`9/1994 Brodyet al.
`5,363,449 A
`11/1994 Bestock
`5,428,684 A
`6/1995 Akiyama et al.
`5,466,919 A
`11/1995 Hovakimian
`5,478,994 A
`12/1995 Rahman et al.
`5,485,510 A
`1/1996 Colbert
`5,500,513 A *
`3/1996 Langhans et al.
`5,504,808 A
`4/1996 Harmick, Jr.
`5,555,497 A
`9/1996 Helbling
`5,577,109 A
`11/1996 Stimson et al.
`5,583,918 A
`12/1996 Nakagawa
`5,606,614 A
`2/1997 Bradyet al.
`5,621,201 A
`4/1997 Langhans et al.
`5,627,355 A
`5/1997 Rahman et al.
`5,671,279 A
`9/1997 Elgamal
`5,677,955 A
`10/1997 Doggett et al.
`5,694,471 A
`12/1997 Chen et al.
`5,696,908 A
`12/1997 Muehlberger et al.
`5,715,314 A
`2/1998 Payne et al.
`5,721,768 A
`2/1998 Stimson et al.
`5,724,424 A
`3/1998 Gifford
`5,727,163 A
`3/1998 Bezos
`5,729,594 A
`3/1998 Klingman
`5,748,908 A
`5/1998 Yu
`5,757,917 A
`5/1998 Rose et al.
`5,768,381 A
`6/1998 Hawthorne
`5,777,305 A
`7/1998 Smith et al.
`5,777,306 A
`7/1998 Masuda
`5,794,221 A
`8/1998 Egendorf
`5,815,657 A
`9/1998 Williams et al.
`5,822,737 A
`10/1998 Ogram
`5,825,881 A
`10/1998 Colvin, Sr.
`5,826,241 A
`10/1998 Stein et al.
`5,826,243 A
`10/1998 Musmanno et al.
`5,832,087 A
`11/1998 Hawthorne
`5,845,281 A *
`12/1998 Benson et al.
`5,864,830 A
`1/1999 Armetta et al.
`5,868,236 A
`2/1999 Rademacher
`5,883,810 A
`3/1999 Franklin et al.
`5,890,137 A
`3/1999 Koreeda
`5,893,907 A
`4/1999 Ukuda
`5,903,878 A
`5/1999 Talati et al.
`5,914,472 A *
`6/1999 Foladare et al
`5,953,710 A *
`9/1999 Fleming
`5,956,699 A
`9/1999 Wong et al.
`5,984,180 A
`11/1999 Albrecht
`5,991,749 A *
`11/1999 Morrill, Jr
`5,991,750 A *
`11/1999 Watson
`6,000,832 A *
`12/1999 Franklin et al.
`6,014,650 A *
`1/2000 Zampese
`6,029,150 A *
`2/2000 Kravitz
`6,029,890 A
`2/2000 Austin
`6,144,948 A
`11/2000 Walker et al.
`6,163,771 A *
`12/2000 Walker et al
`
`.
`
`US 7,840,486 B2
`Page 2
`
`379/91.02
`
`235/380
`
`6,188,761 Bl
`6,226,624 Bl *
`6,240,397 Bl
`6,267,292 Bl
`6,298,335 Bl
`6,324,526 Bl
`6,339,766 Bl
`6,341,724 B2
`6,343,279 Bl
`6,375,084 Bl
`6,422,462 Bl
`6,456,984 Bl *
`6,598,031 Bl
`6,636,833 Bl
`2001/0011249 Al *
`2002/0120587 Al
`2002/0152158 Al *
`2003/0018567 Al
`2003/0028481 Al
`2003/0097331 Al
`2003/0216997 Al
`
`2/2001 Dickerman et al.
`5/2001 Watson et al
`5/2001 Sachs
`7/2001 Walker et al.
`10/2001 Bernstein
`11/2001 D' Agostino
`1/2002 Gephart
`1/2002 Campisano
`1/2002 Bissonette et al.
`4/2002 Stanford et al.
`7/2002 Cohen
`9/2002 Demoff et al.
`7/2003 Ice
`10/2003 Flitcroft et al.
`8/2001 Yanagihara et al
`8/2002 D' Agostino
`10/2002 Paleiov et al.
`1/2003 Flitcroft et al.
`2/2003 Flitcroft et al.
`5/2003 Cohen
`11/2003 Cohen
`
`FOREIGN PATENT DOCUMENTS
`
`705/44
`
`705/40
`
`705/41
`
`705/39
`
`EP
`EP
`EP
`EP
`FR
`GB
`GB
`GB
`GB
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`
`0081921 Al
`0590861 A2
`0590861 A3
`0590961 A2
`2661996 Al
`2145265 A
`2252270 A
`2327831 A
`2361790 A
`WO 91/12693
`WO 93/14476
`WO 95/07512
`WO 96/08756
`WO 96/42150
`WO 97/15893
`WO 97/19549
`WO 98/26376
`WO 99/49424
`WO 00/42486
`
`6/1983
`4/1994
`4/1994
`4/1994
`11/1991
`3/1985
`8/1992
`2/1999
`10/2001
`5/1992
`7/1993
`3/1995
`3/1996
`12/1996
`5/1997
`5/1997
`6/1998
`9/1999
`7/2000
`
`OTHER PUBLICATIONS
`
`Jones, R.: Prepaid cards, an emerging internet payment mechanism,
`the Nuvantage Group, Jun. 2001, pp. 1-9.*
`Eran Gabber and Abraham Silberschatz, A Minimal Distributed Pro(cid:173)
`tocol
`for Electronic Commerce, www.usenix.org/publications
`(Article), Oakland, USA, Nov. 18-21, 1996.
`Citi.com, Total Fraud Protection ... Solutions for your safety and
`peace of mind, (printout) CBSD002144-CBSD002153.
`Owen Thomas, Money Changers, www.ecompany.com. (Article),
`Oct. 2000.
`Netchex-a short brief, www.trnl.hut.fi/StudiesiTik-110.50/1997/
`Ecomerce/netchex-5.htrnl, (Article), Nov. 5, 2002.
`GE Capital Financial Inc., GE Pre-Authorization System, (GE's
`website printout).
`Matt Barthel, Diebold Plans Major Push in Market for Debit-Card
`Point of Sale Terminals, Sep. 28, 1993, American Banker, pp. 1-2.
`Bob Woods, New Dell E-Commerce Guarantee Called "Weak", Aug.
`13, 1998, Newbytes News pp. 1-2.
`Anne Finnigan, The Safe Way to Shop Online, Good Housekeeping,
`Sep. 1998, pp. 1-2.
`Paul Demery, Attaching the Smart Card Fortress, Credit Card Man(cid:173)
`agement, Sep. 1998, pp. 1-4.
`Larry Chase, Taking Transactions Online, Target Marketting, Oct.
`1998, 1-4.
`Virtual Credit Card (VCe), www.geocites.comiEurekaiParkl5014/
`vcc.htrn, (printout). Jun. 28, 1999.
`Smart Cards, disc.cba.uh.edu, (printout), Nov. 1,2001.
`
`1/1
`
`235/380
`705/38
`
`705/44
`705/44
`700/232
`705/44
`705/39
`
`705/18
`
`MasterCard, Exh. 1001, p. 2
`
`

`

`US 7,840,486 B2
`Page 3
`
`Vincent Moscaritolo & Robert Hettinga, Digital Connnerce for the
`Rest of Us Apple in a Geodesic Economy, www.shipwright.coml
`rants/rant_15.html, (article), Sep. 4, 1996.
`Black Ives & Michael Earl, Mondex International Reengineering
`Money, London Business School Article,
`isds.bus.Isu.edu/casesl
`mondex.html, Nov. 1,2001.
`Smart Card New Ltd's Information Gateway, www.smartcard.co.uk/
`articles/electronicmoney.html, Nov. 1, 2001.
`Putting Risk in Perspective, (Article) Internet Outlook (Jul. 20,
`1997), vol. 1 No.3, www.webreference.com. Nov. 1,2001.
`
`Keith Lamond,Credit Card Transactions Real World and Online.
`www.virtualschools.edu/mon/ElectronicProperty/klamond/
`credit_card.htm, Sep. 11, 2001.
`Steven P. Ketchpel & Andreas Paepcke, Shopping Models: A Flexible
`Architecture for Information Connnerce, dbpubs.stanford.edu:8090,
`Oct. 1, 2002, (Stanford, USA).
`Re-examination of U.S. Patent No. 6,324,526 granted to John
`D' Agostino, assigned U.S. Appl. No. 901007,481, filed Mar. 28,
`2005.
`* cited by examiner
`
`MasterCard, Exh. 1001, p. 3
`
`

`

`u.s. Patent
`
`Nov. 23, 2010
`
`Sheet 1 of2
`
`US 7,840,486 B2
`
`Contact
`Customer
`
`Terminate
`
`18'
`
`18
`
`Customer Retrieves
`Promotional
`Information
`
`Customer Contacts
`Authorizing Entity
`
`Customer Supplies
`Credit Card Info. &
`Payment Category
`
`Generate
`Transaction
`Code
`
`Transmit
`Transaction Code
`To Customer
`
`Customer Transmits
`Transaction Code
`To Merchant
`
`10
`
`12
`
`14
`
`16
`
`20
`
`22
`
`24
`
`Terminate
`Transaction
`
`Inform
`Customer
`
`30
`
`28
`
`26
`
`FIG. 1
`
`MasterCard, Exh. 1001, p. 4
`
`

`

`u.s. Patent
`
`Nov. 23, 2010
`
`Sheet 2 of2
`
`US 7,840,486 B2
`
`54
`
`Customer
`
`o
`
`Camp.
`
`Tel.
`
`58
`
`42'
`
`66
`
`66'
`
`56
`
`Merchant
`
`Tel.
`
`Compo
`
`56'
`
`44'
`
`Authorizing Entity
`
`64
`
`45'
`
`FIG. 2
`
`45'
`
`54
`
`Customer
`
`Camp.
`
`Tel.
`
`42'
`
`66
`
`66'
`
`62
`
`60
`
`56
`
`Merchant
`
`Tel.
`
`Camp.
`
`56'
`
`44'
`
`Authorizing Entity
`
`45'
`
`64
`
`45'
`
`FIG. 3
`
`MasterCard, Exh. 1001, p. 5
`
`

`

`US 7,840,486 B2
`
`1
`SYSTEM AND METHOD FOR PERFORMING
`SECURE CREDIT CARD PURCHASES
`
`The present application is a Continuation of u.s. patent
`applicationSer. No. 10/037,007, filed Nov. 4, 2001 nowaban(cid:173)
`doned, which is a continuation-in-part of u.s. patent appli(cid:173)
`cation Ser. No. 09/231,745, filed on Jan. IS, 1999, now U.S.
`Pat. No. 6,324,526, issued on Nov. 27, 2001.
`
`BACKGROUND OF THE INVENTION
`
`1. Field of the Invention
`This invention relates to a system and method of perform(cid:173)
`ing secure credit card purchases in connection with remote
`commercial transactions, wherein a credit card holder does
`not have to reveal their credit card number to a merchant or a
`mechanism controlled by the merchant in order to accomplish
`a purchase, and wherein the merchant is still assured of the
`necessary credit verifications and approvals prior to authoriz(cid:173)
`ing and/or completing a credit card transaction,
`thereby
`increasing overall security by minimizing any access to credit
`card numbers without having to substantially modifY or devi(cid:173)
`ate from existing, accepted credit card transaction practices.
`2. Description of the Related Art
`The utilization of credit and debit cards to conduct trans(cid:173)
`actions is ever increasing. This is especially the case with
`remote or "mail-order" transactions wherein merchants
`desire to be assured of a payment prior to shipping a product.
`For example, recent years have seen a substantial increase in
`the popularity of televised shopping networks to further
`supplement the popularity ofcatalogue type sales. Moreover,
`the increasing use and popularity of distributed computer
`networks such as the internet has also contributed to the
`dramatic increase in the number ofremote commercial trans(cid:173)
`actions conducted every day.
`One primary reason associated with the rapid growth of
`remote commercial transactions is the ability ofa merchant to
`reach an almost limitless number of potential customers at a
`substantially insignificant cost and with little or no operating
`overhead since an actual store is not required. Additionally,
`such sales techniques permit customers to view the products
`and services in a greatly expanded marketplace, representing
`a great number ofvendors, without extensive travel and with(cid:173)
`out foregoing the privacy and convenience of their home or
`other predetermined computer site in some cases. Simply put,
`a telephone or like commnnication avenue is all that is needed
`to place the consumer in contact with the merchant and com(cid:173)
`plete the transaction.
`The vast increase in popularity of remote commercial
`transactions conducted over the telephone or internet is fur(cid:173)
`ther facilitated by the relatively simple protocols and proce(cid:173)
`dures necessary to conduct such transactions. In particular, in
`order to complete a valid transaction, a merchant need not
`physically see the customer or the credit card, but must
`merely accept and enter a customer's credit card acconnt 55
`number and an expiration date thereofto obtain authorization.
`This same convenience, however, is the primary disadvantage
`and/or problem associated with conducting commerce in the
`manners set forth above. Specifically, there is a great reluc(cid:173)
`tance on the part of the customer to transmit the credit card 60
`acconnt
`information,
`including the credit card number,
`because of the proliferation of fraud, and a well recognized
`lack of security directed to the protection of such acconnt
`information. Indeed, it has been established that security and
`privacy concerns are realistic due to the fact that credit card 65
`acconnt data is easily readable or interceptable by unautho(cid:173)
`rized parties, and can be readily used for all types of remote
`
`2
`transactions with minimal risk ofbeing physically caught. In
`fact, unscrupulous individuals have many ways of gaining
`access to a consumer's legitimate remote transactions and
`thereby obtaining the credit card information. This informa(cid:173)
`tion can be obtained from old credit card receipts or even from
`the unauthorized notation and use ofthe information by mer(cid:173)
`chants or their employees after a legitimate transaction is
`made. Naturally, the latter is the most difficult to prevent
`utilizing known methods and systems unless a consumer is
`10 willing to completely forego the use of a credit card for
`purchases.
`In the case of computerized remote transactions, as mes(cid:173)
`sages, including account data or other confidential informa-
`15 tion, move across the internet, they can easily pass through
`numerous computers, anyone of which can be utilized to
`copy such confidential information or data, thereby leading to
`a further risk of potential fraud when conducting such trans(cid:173)
`actions. Presently, some companies currently seek to address
`20 such security and privacy concerns by the employment of
`encryption programs and techniques. To this end there is an
`extensive facility associated with both public and private
`encryption schemes being deployed in order to guard the
`private or secured information being transmitted across the
`25 internet or like world wide networks. Unfortunately, however,
`even with such encryption techniques, the account informa(cid:173)
`tion must usually still ultimately be transmitted to a third
`party who did not previously have access to that information
`previously. Even some more sophisticated systems which
`30 ~~~~~~ni~:~oa:s:~:;~:~at~e::~~~%~~a:~~:~~~~:a:~~d-
`rization and forward it to the merchant, that information must
`still be made available to and/or transmitted to that third party,
`thereby leaving open an avenue for fraud or theft. Further,
`35 such encryption techniques, even if minimally effective for
`computerized remote transactions, are not truly useable for
`other conventional types ofremote transactions, or even nor(cid:173)
`mal in person transactions.
`Based on the above, there is an obvious need in the field of
`40 art associated with remote commercial transactions for a sys(cid:173)
`tem and method ofperforming secure credit card purchases of
`goods and services which truly reduces the risk of potential
`fraud and theft by eliminating outside access to a consumer's
`private credit card information without requiring complex
`45 encryption equipment or significantly altering the ease and
`convenience of current transaction techniques. Further, such
`a system and method should also be effective for use in
`conventional, "in person" transactions as well, thereby pro(cid:173)
`viding an added measure of security and minimizing the
`50 hazards associated with the passing on of account informa(cid:173)
`tion by unscrupulous merchants. Also, such a system should
`provide limits to potential loss or liability in a manner which
`does not impede the transaction.
`
`SUMMARY OF THE INVENTION
`
`The present invention is directed towards a system and
`method of performing secure credit card purchases, wherein
`payment for goods or services purchased is efficiently accom(cid:173)
`p ished while eliminating the necessity of disclosure or dis(cid:173)
`semination of a consumers specific credit card number or
`other account data which the customer or other individual
`may wish to maintain in confidence. The system and method
`of the present invention incorporates the advantage of con(cid:173)
`snnnnating the purchase by the customer through the selec(cid:173)
`tion of anyone of a plurality of predetermined payment
`categories. Collectively, the payment categories represent a
`
`MasterCard, Exh. 1001, p. 6
`
`

`

`US 7,840,486 B2
`
`3
`variety of methods for accomplishing payment for a fixed
`transaction, a multiple transaction and/or a repeating transac(cid:173)
`tion.
`One embodiment of the system and method of the present
`invention comprises a customer
`receiving information,
`including specific data necessary for the purchase of any
`given product or service. This promotional information gen(cid:173)
`erated by the merchant can be received by any ofa plurality of
`conventional means including advertisements, catalogues,
`computer network connections, direct person to person cus(cid:173)
`tomer and merchant contact,
`telephone solicitation, mail
`orders, etc. Once the customer has identified the product or
`services which he/she wishes to purchase, the customer con(cid:173)
`tacts and supplies a custodial authorizing entity with the
`requisite information concerning both the identification of a
`specific credit card or debit card account and a requested
`payment category. Additionally, security against unautho(cid:173)
`rized use of confidential account data may also preferably
`include information relating to the merchant's identification
`and/or location.
`The custodial authorizing entity is preferably defined as the
`entity which has or has been assigned the custodial responsi(cid:173)
`bility for the financial account data ofa customer's credit card
`account, including a previous knowledge of the credit card
`number and other information such as credit limits, payment 25
`history, available credit amounts and other information which
`will determine the status of a given credit card account in
`terms of authorizing a requested payment for a current pur(cid:173)
`chase.
`As part of the security system for accomplishing a com(cid:173)
`mercial transaction utilizing credit card or debit card pay(cid:173)
`ment,
`the custodial authorizing entity includes sufficient
`facilities, preferably including a processing computer or like
`applicable hardware for the generation of an exclusive trans(cid:173)
`action code. The transaction code is to be used in substitution 35
`for the credit card number and when utilized as authorized,
`will issue the merchant a credit approval, and will accomplish
`payment for the goods or services desired in the normal
`fashion normally associated with a credit or debit card trans(cid:173)
`action, without the publication or dissemination of an identi- 40
`fying credit card number for a specific customer's account to
`any entity that is not already aware of that information.
`Further, a feature of the transaction code is its ability to
`indicate anyone of preferably a plurality of predetermined
`payment categories which may be either requested by the 45
`customer or automatically chosen by the custodial authoriz(cid:173)
`ing entity based on the type ofaccount or the type ofpurchase
`or other commercial transaction involved. Each of the pay(cid:173)
`ment categories are reflective of a different type of payment
`desired or required to consummate the intended purchase. 50
`More specifically, the plurality of payment categories may
`include a single transaction involving a specific dollar amount
`for a purchase within a specific time period, such as twenty
`four hours, during which authorization of the purchase
`remains valid. Alternately, a single transaction may be 55
`involved wherein a maximum limit or a dollar amount is
`determined above which the purchase will become invali(cid:173)
`dated and further wherein a fixed period of time is preferably
`established for maintaining authorization of such purchase.
`Other alternatives would involve one or more of the catego- 60
`ries coded to define multiple transactions involving a maxi(cid:173)
`mum dollar amount for purchases, as well as a fixed period of
`time for authorization of such purchases, and/or a repeating
`transaction wherein payments may be automatically accessed
`by a merchant over a predetermined or unspecified time inter- 65
`val (such as every thirty days) for a specific dollar amount or
`a maximum dollar amount limit. Also, limits solely as to a
`
`4
`specific merchant or a given time period can be effectively
`established for which the transaction code is valid.
`A further feature ofthe present invention to be described in
`greater detail hereinafter, is the requirement that the transac(cid:173)
`tion code, once received by the customer is transmitted to the
`merchant by the customer or a person specifically authorized
`by the customer. Only minimal contact by the merchant and
`the custodial authorizing entity is provided for purposes ofthe
`10 merchant verifYing the validity ofthe transaction code utiliz(cid:173)
`ing a conventional process electronically or otherwise similar
`to the verification of a credit card number normally offered to
`a merchant for the purchase of goods or services. There is,
`therefore, no disclosure, publication or other dissemination of
`15 the specific credit card number of a given customer account
`beyond those entities who already know the information, and
`the transaction code is transmitted exclusively to the cus(cid:173)
`tomer by the custodial authorizing entity who has the ability
`to better identify whether the customer is properly authorized
`20 to use the account. Moreover, the transaction code, once given
`out by the customer, only has a limited usefulness, thereby
`limiting the risk of misuse and minimizing the potential
`losses to be experienced by the credit card company and/or
`the account holder.
`Accordingly, it is an object of the present invention to
`provide a system and attendant method for performing
`remote commercial transactions utilizing credit cards, which
`maximizes the security of the transaction and limits the
`30 potential liability to be experienced from a fraudulent trans(cid:173)
`action.
`Yet another object of the present invention is to provide a
`secure system and method for establishing credit card pur(cid:173)
`chases which eliminate the disclosure or dissemination ofthe
`actual credit card number to anyone other than a custodial
`authorizing entity which normally has custodial responsibili(cid:173)
`ties for account information including the previously estab(cid:173)
`lished credit card number.
`It is another object of the present invention to provide a
`system and method of establishing secure credit card pur(cid:173)
`chases through the generation of a transaction code which
`renders it extremely difficult or impossible to access or infil(cid:173)
`trate a customer's credit card account by unauthorized means.
`It is yet another object ofthe present invention to provide a
`secure method of completing a remote commercial transac(cid:173)
`tion which eliminates the need to convey actual account infor(cid:173)
`mation to a merchant, but which allows the merchant to
`conduct a normal verification of information needed to con(cid:173)
`sUlllillate a given purchase.
`It is also an object of the present invention to provide a
`system and attendant method of accomplishing secure credit
`card purchases which eliminate the need to disclose or dis(cid:173)
`seminate a given credit card number while providing the
`customer with the versatility of choosing anyone of a plural(cid:173)
`ity of predetermined payment categories.
`It is yet another feature of the present invention to provide
`a system and method of accomplishing secure credit card
`payments having the versatility of allowing the customer to
`select anyone of a plurality ofpayment categories which are
`indicative ofa variance in the amount of a purchase as well as
`the time in which authorization for such payment is valid.
`These and other objects, features and advantages of the
`present invention will become more clear when the drawings
`as well as the detailed description are taken into consider(cid:173)
`ation.
`
`MasterCard, Exh. 1001, p. 7
`
`

`

`US 7,840,486 B2
`
`5
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`For a fuller understanding of the nature of the present
`invention, reference should be had to the following detailed
`description taken in connection with the accompanying draw(cid:173)
`ings in which:
`FIG. 1 is a schematic representation of a flow chart show(cid:173)
`ing various steps involved in the performance of the system
`and method ofthe present invention for the secure credit card
`purchasing;
`FIG. 2 is a schematic representation similar to that of FIG.
`1 wherein customer to merchant contact is accomplished by
`conventional facilities such as television; and
`FIG. 3 is a schematic representation similar that of FIG. 2
`wherein customer to merchant contact is established either by
`phone or in person.
`Like reference numerals refer to like parts throughout the
`several views of the drawings.
`
`DETAILED DESCRIPTION OF THE PREFERRED
`EMBODIMENT
`
`As shown in the accompanying Figures, the present inven(cid:173)
`tion is directed towards a system and method for accomplish(cid:173)
`ing secure credit card purchases. Moreover, these purchases
`can be "in person", but preferably include remote commercial
`transactions such as mail order, purchases over the intemet,
`television solicitations, telephone solicitations, etc. Security
`is established by virtue of the elimination of the need to
`disclose an active credit card number and expiration date to
`the merchant or any other party other than the original credit
`card company, issuing bank or like financial institution which
`already has custodial responsibilities for the financial or
`account data associated with a given customer's credit card
`account.
`More specifically and with reference to FIG. 1 the system
`as well as an attendant method is preferably instigated by the
`customer viewing a product, identifYing a desired amount for
`a transaction and/or receiving promotional information as at
`10, either in person or by any of the electronic or more
`conventional techniques which will be described in greater
`detail with reference to FIGS. 2 through 3. Once the customer
`reviews the product or promotional information and has suf(cid:173)
`ficient information, such as including price, product or ser(cid:173)
`vice identification, payment requirement, etc., regarding the
`remote commercial transaction to be conducted, the customer
`contacts, either by computer, telephone or in person, a custo(cid:173)
`dial authorizing entity as at 12. The custodial authorizing
`entity may herein be defined as comprising that entity or
`institution which has or has been designated by the entity
`which has custodial responsibility for the financial data and
`security of a given credit card account of a customer. As set
`forth above such custodial authorizing entity can be repre(cid:173)
`sented by the credit card company issuing a credit card to a
`given customer or alternately can be represented by a bank or
`other financial institution serving to sponsor a credit card or
`debit card to the extent of processing the debits and credit
`associated therewith. The authorizing entity's custodial
`responsibilities of course includes the previous knowledge
`and/or storage ofthe credit card number serving to identify a
`specific customer's credit card account. Once contacted, the
`customer then supplies appropriate identification data to
`inform the custodial authorizing entity of a specific custom(cid:173)
`er's credit card account as at 14. In addition, the customer will
`supply the custodial authorizing entity with additional
`required information needed to consummate the purchase as
`well as ensure the security of the account in order to prevent
`
`6
`its unauthorized use. Such additional information may pref(cid:173)
`erably include the identification ofthe merchant or merchants
`involved, when such information is deemed necessary, and a
`requested one of a plurality of predetermined payment cat(cid:173)
`egories to facilitate consummation of the purchase of the
`products or services desired. Such predetermined plurality of
`payment categories will be discussed in greater detail here(cid:173)
`inafter.
`Once the appropriate information has been received from
`10 the customer as indicated at 16, the custodial authorizing
`entity verifies the credit card status and account identification
`of the customer to determine the viability of the account in
`terms of dollar amount limits, payment history, available
`credit balance, etc. Ifthe accessed credit card account is not in
`15 good standing, the custodial authorizing entity will perma(cid:173)
`nently or temporarily terminate the transaction as at 18 and/or
`communicate to the customer directly as at 18' by any appli(cid:173)
`cable means for purposes of informing the customer of the
`unacceptable status ofthe accessed credit card account. Ifthe
`20 credit card account is in good standing, based at least in part
`on the requested payment category, (amount ofpayment), the
`custodial authorizing entity generates a transaction code as at
`20. The transaction code is used in substitution for the specific
`credit card number which would normally identifY a custom-
`25 er's credit card account and would allow access thereto by any
`entity having possession ofthe credit card number whether or
`not such possession was authorized or unauthorized. More
`specifically, the transaction code is pre-coded to be indicative
`of a specific credit card account, preferably a merchant or
`30 merchants identification and a designated payment category,
`selected from the plurality ofpredetermined payment catego(cid:173)
`ries as set forth above. Once generated, the transaction code is
`communicated exclusively to the authorized and verified cus(cid:173)
`tomer by the custodial authorizing entity as at 22, wherein the
`35 system and method of the present
`invention preferably
`restricts communication between the custodial authorizing
`entity and the merchant except to conduct a normal verifica(cid:173)
`tion as will be explained.
`The verified customer thereafter and preferably within a
`40 time limit to be determined by the customer and pre-coded in
`association with the transaction code, will directly or through
`an authorized representative communicate the transaction
`code to the merchant as at 24. The system and method of the
`preferred embodiment of the present invention contemplates
`45 that only the verified customer will transmit the generated
`transaction code to the merchant in the case of a remote
`commercial transaction, thereby limiting knowledge of the
`transaction code to those parties having a need to know. Of
`course, however, as the transaction code will generally have a
`50 limited value as defied by the verified customer when
`obtained, the verified customer may designate an agent or
`other entity to act as the customer on hislher behalf, with the
`amount of potential liability to be experienced by such a
`transaction to be limited to the amount defined by the verified
`55 customer when obtaining the transaction code.
`At this point the purchase is consummated at least from the
`customer standpoint in that the customer has previously
`established the acceptable status ofthe account. Therefore the
`customer feels free to disclose the transaction code to the
`60 merchant or merchants instead of the actual credit card num(cid:173)
`ber as at 22, 24 and is relatively unconcerned ifthe transaction
`code is published or otherwise disseminated to unauthorized
`entities. In a preferred embodiment wherein a merchant iden(cid:173)
`tifier is pre-coded in association with the transaction code, the
`65 pre-coding of the transaction code will prohibit an unautho(cid:173)
`rized use due at least in part to the fact that the merchant is
`specifically identified and any a

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket