Adapter for providing a unified transaction interface
阅读说明:本技术 用于提供统一交易接口的适配器 (Adapter for providing a unified transaction interface ) 是由 陈悦玺 M·科基切夫 P·马丁 于 2018-06-21 设计创作,主要内容包括:本发明的实施例涉及使得访问交易系统能够接受不同的通信协议。在一些实施例中,访问装置从便携式装置接收将通过在所述便携式装置与远程计算机之间交换交易信息而执行交易的指示,其中所述远程计算机被配置成使用第一通信协议进行通信。接下来,所述访问装置确定所述便携式装置被配置成使用第二通信协议进行通信。所述访问装置接着将所述便携式装置与所述远程计算机之间的通信从所述第二通信协议转换为所述第一通信协议,以协助所述便携式装置与所述远程计算机交换所述交易信息。(Embodiments of the present invention relate to enabling access to a transaction system to accept different communication protocols. In some embodiments, an access device receives an indication from a portable device that a transaction is to be performed by exchanging transaction information between the portable device and a remote computer, wherein the remote computer is configured to communicate using a first communication protocol. Next, the access device determines that the portable device is configured to communicate using a second communication protocol. The access device then converts communication between the portable device and the remote computer from the second communication protocol to the first communication protocol to assist the portable device in exchanging the transaction information with the remote computer.)
1. A method, comprising:
receiving, by an access device from a portable device, an indication that a transaction is to be performed by exchanging transaction information between the portable device and a remote computer, wherein the remote computer is configured to communicate using a first communication protocol;
determining, by the access device, that the portable device is configured to communicate using a second communication protocol; and
converting communication between the portable device and the remote computer from the second communication protocol to the first communication protocol to facilitate the portable device and the remote computer exchanging the transaction information.
2. The method of claim 1:
wherein the first communication protocol defines:
the access device is configured to receive a first set of communications from a first plurality of portable devices configured to communicate using the first communication protocol; and
a second set of communications that the access device is configured to transmit to the remote computer;
wherein the second communication protocol defines a third set of communications that the access device is configured to receive from a second plurality of portable devices configured to communicate using the second communication protocol; and is
Wherein converting the communication between the portable device and the remote computer from the second communication protocol to the first communication protocol comprises obtaining the third set of communications from the portable device and transmitting the second set of communications to the remote computer based on the third set of communications.
3. The method of claim 2, wherein the transaction is a first transaction, the transaction information is first transaction information, and the portable device is a first portable device; and is
Wherein the method further comprises:
receiving, from a second portable device or the remote computer, another indication that a second transaction is to be performed by exchanging second transaction information between the second portable device and the remote computer;
determining that the second portable device is configured to communicate using the first communication protocol; and
facilitating the second portable device to exchange the second transaction information with the remote computer using the first communication protocol and not using the second communication protocol.
4. The method of claim 3, wherein facilitating the second portable device to exchange the second transaction information with the remote computer using the first communication protocol and without using the second communication protocol comprises obtaining the first set of communications from the portable device and transmitting the second set of communications to the remote computer based on the first set of communications.
5. The method of claim 2:
wherein the first communication protocol further defines:
the remote computer is configured to transmit a fourth set of communications to the access device; and
the access device is configured to transmit a fifth set of communications to the first plurality of portable devices configured to communicate using the first communication protocol;
wherein the second communication protocol further defines a sixth set of communications that the access device is configured to transmit to the second plurality of portable devices configured to communicate using the second communication protocol; and is
Wherein converting the communication between the portable device and the remote computer from the second communication protocol to the first communication protocol further comprises receiving the fourth set of communications from the remote computer and transmitting the sixth set of communications to the portable device based on the fourth set of communications.
6. The method of claim 5, wherein the first set of communications, the second set of communications, the fourth set of communications, and the fifth set of communications are in XML or JSON format.
7. The method of claim 5, wherein the first set of communications and the fifth set of communications are in XML or JSON or ISO 7816 format, and the second set of communications and the fourth set of communications are in XML or JSON format.
8. The method of claim 1, wherein the remote computer is located remotely from the access device and communicates with the access device over a network.
9. The method of claim 1, wherein the first communication protocol is stateless and the second communication protocol is stateful.
10. The method of claim 1, wherein the indication is received from the portable device when the portable device is in:
inserting into an interface provided by the access device;
docking the interface;
pairing with the access device;
scanning by the interface; or
Is optically read.
11. The method of claim 1, wherein the method further comprises converting other communications between one or more other portable devices and the remote computer from one or more other communication protocols to the first communication protocol to facilitate the one or more other portable devices exchanging other transaction information with the remote computer.
12. An access device, comprising:
a processor, and
a computer-readable medium coupled to the processor, the computer-readable medium storing one or more instructions that when executed by the processor cause the processor to:
receiving, from a portable device, an indication that a transaction is to be performed by exchanging transaction information between the portable device and a remote computer, wherein the remote computer is configured to communicate using a first communication protocol;
determining that the portable device is configured to communicate using a second communication protocol; and
converting communication between the portable device and the remote computer from the second communication protocol to the first communication protocol to facilitate the portable device and the remote computer exchanging the transaction information.
13. The access device of claim 12:
wherein the first communication protocol defines:
the access device is configured to receive a first set of communications from a first plurality of portable devices configured to communicate using the first communication protocol; and
a second set of communications that the access device is configured to transmit to the remote computer;
wherein the second communication protocol defines a third set of communications that the access device is configured to receive from a second plurality of portable devices configured to communicate using the second communication protocol; and is
Wherein converting the communication between the portable device and the remote computer from the second communication protocol to the first communication protocol comprises obtaining the third set of communications from the portable device and transmitting the second set of communications to the remote computer based on the third set of communications.
14. The access device of claim 13, wherein the transaction is a first transaction, the transaction information is first transaction information, and the portable device is a first portable device; and is
Wherein the instructions further cause the processor to:
receiving, from a second portable device or the remote computer, another indication that a second transaction is to be performed by exchanging second transaction information between the second portable device and the remote computer;
determining that the second portable device is configured to communicate using the first communication protocol; and
facilitating the second portable device to exchange the second transaction information with the remote computer using the first communication protocol and not using the second communication protocol.
15. The access device of claim 14, wherein facilitating the second portable device to exchange the second transaction information with the remote computer using the first communication protocol and without using the second communication protocol comprises obtaining the first set of communications from the portable device and transmitting the second set of communications to the remote computer based on the first set of communications.
16. The access device of claim 13:
wherein the first communication protocol further defines:
the remote computer is configured to transmit a fourth set of communications to the access device; and
the access device is configured to transmit a fifth set of communications to the first plurality of portable devices configured to communicate using the first communication protocol;
wherein the second communication protocol further defines a sixth set of communications that the access device is configured to transmit to the second plurality of portable devices configured to communicate using the second communication protocol; and is
Wherein converting the communication between the portable device and the remote computer from the second communication protocol to the first communication protocol further comprises receiving the fourth set of communications from the remote computer and transmitting the sixth set of communications to the portable device based on the fourth set of communications.
17. The access device of claim 16, wherein the first set of communications, the second set of communications, the fourth set of communications, and the fifth set of communications are in XML or JSON format.
18. The access device of claim 16, wherein the first set of communications and the sixth set of communications are in XML or JSON or ISO 7816 format, and the second set of communications and the fourth set of communications are in XML or JSON format.
19. The access device of claim 12, wherein the indication is received from the portable device when the portable device is in:
inserting into an interface provided by the access device;
docking the interface;
pairing with the access device;
scanning by the interface; or
Is optically read.
20. A portable device, comprising:
a processor, and
a computer-readable medium coupled to the processor, the computer-readable medium storing one or more instructions that when executed by the processor cause the processor to:
providing an indication to an access device that a transaction is to be performed by exchanging transaction information between the portable device and a remote computer, wherein the remote computer is configured to communicate using a first communication protocol and the portable device is configured to communicate using a second communication protocol; and
exchanging the transaction information with the remote computer, wherein to assist the portable device to exchange the transaction information with the remote computer, the access device converts communication between the portable device and the remote computer from the second communication protocol to the first communication protocol.
Background
In the case of access transactions (e.g. transactions to access buildings, transactions for accessing data inside computers, payment transactions) at a resource provider (e.g. secure buildings, merchants) with portable devices (e.g. contact chip cards, NFC enabled phones, contactless credit cards) and access terminals (e.g. chip terminals, contactless terminals), there may be multiple communication protocols for conducting the transactions. The communication protocol may be defined by various features. Some protocols may be stateless, while others may be stateful. Some protocols may specify a particular sequential sequence of instructions or communications to be exchanged between the portable device and the access terminal in order to conduct a transaction.
Because of these characteristics, communication protocols may not be compatible with each other. In particular, a portable device configured to use one communication protocol may not be able to perform transactions with an access terminal configured to use a different communication protocol. In instances where a customer intends to use a credit card to purchase an item at a store checkout station, the credit card may not be available at the store if the credit card relies on a stateful communication protocol while the access terminal is configured to communicate in a stateless manner. As a result, the customer is forced to rely on a different payment method (e.g., cash, check, or another type of credit card) or the store is forced to purchase and maintain another type of access terminal
Embodiments of the present invention address these problems and others individually and collectively.
Disclosure of Invention
Embodiments of the present invention relate to techniques for enabling access terminals and other types of access transaction systems to operate using different communication protocols. The techniques may include receiving, by an access device from a portable device, an indication indicating that a transaction is to be performed between the portable device and a remote computer (e.g., a remote transaction processor). As one example, a customer may be attempting to purchase a physical item from a physical store by swiping a credit card to a card reader, where the card reader is communicatively coupled with a Payment Acceptance (PA) service accessible through a cloud (i.e., a PA in the cloud). In this regard, the purchase of the item may correspond to a transaction, the credit card may correspond to a portable device, the swiping of the credit card may correspond to an indication of the transaction, the card reader may correspond to an access device, and the PA in the cloud may be provided by a remote computer.
In some embodiments, to provide the PA in the cloud, the remote computer may host a transaction processing module having functionality, logic, or data for handling contact or contactless transactions initiated by a portable device interacting with the access device. The remote computer may be configured to communicate using a first communication protocol. For example, the PA in the cloud may be exposed as a representational state transfer (REST) service or a JavaScript object notation (JSON) service, where messages in extensible markup language (XML) or JSON format are exchanged over the first communication protocol.
Next, the access device determines that the portable device is configured to communicate using the second communication protocol. For example, the portable device may be exposed as a stateful service, wherein information in an integrated circuit card command (e.g., compliant with ISO 7816) format is exchanged over a second communication protocol. Note that the terms "first", "second", and the like are not restrictive, but may be used as labels to indicate different devices or objects.
Thus, the access device may play the role of an interpreter that enables a portable device communicating in the second communication protocol to exchange transaction information with a remote computer communicating in the first communication protocol. In so doing, the access device may convert communication between the portable device and the remote computer from the second communication protocol to the first communication protocol to facilitate the portable device and the remote computer to exchange the transaction information.
Other embodiments relate to systems, access devices, computer servers, portable communication devices, portable consumer devices, and computer-readable media associated with the methods described herein.
The nature and advantages of embodiments of the present invention may be better understood with reference to the following detailed description and accompanying drawings.
Drawings
Fig. 1 illustrates a block diagram of a system for conducting access transactions using different communication protocols, in accordance with some embodiments.
FIG. 2 depicts a block diagram of a remote computer, according to some embodiments.
Fig. 3 depicts a block diagram of an access device according to some embodiments.
FIG. 4 sets forth a flow chart illustrating an exemplary method for conducting an access transaction using different communication protocols according to some embodiments.
Fig. 5-6 illustrate sequence diagrams showing operations for performing access transactions using different communication protocols, in accordance with some embodiments.
Detailed Description
Embodiments of the present invention relate to techniques for enabling access terminals and other types of access transaction systems to operate using different communication protocols. The techniques may include receiving, by the access device from the portable device, an indication indicating that a transaction is to be performed between the portable device and a remote computer. As one example, a customer may be attempting to purchase a physical item from a physical store by swiping a credit card to a card reader, where the card reader is communicatively coupled with a Payment Acceptance (PA) service accessible through a cloud (i.e., a PA in the cloud). In this regard, the purchase of the item may correspond to a transaction, the credit card may correspond to a portable device, the swiping of the credit card may correspond to an indication of the transaction, the card reader may correspond to an access device, and the PA in the cloud may be provided by a remote computer.
In some embodiments, to provide the PA in the cloud, the remote computer may host a transaction processing module having functionality, logic, or data for handling contact or contactless transactions initiated by a portable device interacting with the access device. The remote computer may be configured to communicate using a first communication protocol. For example, the PA in the cloud may be exposed as a representational state transfer (REST) service or a JavaScript object notation (JSON) service, where messages in extensible markup language (XML) or JSON format are exchanged over the first communication protocol.
Next, the access device determines that the portable device is configured to communicate using the second communication protocol. Note that the terms "first", "second", and the like are not restrictive, but may be used as labels to indicate different devices or objects. Returning to the above example, a credit card may be configured to communicate with a reader via Near Field Communication (NFC), where the message is in a more compact format, such as an integrated circuit card command (e.g., compliant with ISO 7816).
Thus, the access device may play the role of an interpreter that enables a portable device communicating in the second communication protocol to exchange transaction information with a remote computer communicating in the first communication protocol. In so doing, the access device may convert communication between the portable device and the remote computer from the second communication protocol to the first communication protocol to facilitate the portable device and the remote computer to exchange the transaction information.
In some embodiments, the access device may be configured to determine whether the portable device is configured to communicate using the first communication protocol or the second communication protocol. If the portable device is configured to communicate using the first communication protocol (e.g., if the credit card is a newer type of credit card), the access device may not perform as many conversion operations to forward the communication from the portable device to the remote computer as if the portable device is configured to communicate using the second protocol (e.g., if the credit card is an older type of credit card). In doing so, the access device may enable a remote computer (e.g., a PA in the cloud) to conduct transactions with a wider variety of portable devices.
Before discussing embodiments of the present invention, some terminology will be described.
A "portable device" may include any suitable device operable by a user. Examples of portable devices may include mobile communication devices (e.g., mobile phones), payment devices (e.g., credit cards, debit cards, etc.), user access devices such as access chest cards, and the like. The portable device may store sensitive information such as payment credentials (e.g., primary account number, token, expiration date, etc.) and access credentials.
A "mobile communication device" may be an example of a "communication device" that may be easily carried. Examples of remote communications capabilities include the use of a mobile telephone (wireless) network, a wireless data network (e.g., 3G, 4G, or the like), Wi-Fi, Wi-Max, or any other communications medium that can provide access to a network (e.g., the internet or a private network). Examples of mobile communication devices include mobile phones (e.g., cellular phones), PDAs, tablet computers, netbooks, laptop computers, personal music players, handheld dedicated readers, and the like. Other examples of mobile communication devices include wearable devices, such as smart watches, fitness bracelets, foot chains, rings, earrings, and the like, as well as automobiles with telecommunication capabilities. In some embodiments, the mobile communication device may function as a payment device (e.g., the mobile communication device may store and be able to transmit payment credentials for a transaction). The mobile communication device may also include a vehicle such as a car with telecommunications capabilities.
A "payment device" may include any suitable device that may be used to conduct a financial transaction, such as providing payment credentials to a merchant. Suitable payment devices may be hand-held and compact such that they can be placed into a user's wallet and/or pocket (e.g., may be pocket-sized). Example payment devices can include smart cards, key fob devices (e.g., Speedpass, available from Exxon-Mobil corpTM) And the like. PaymentOther examples of devices include payment cards, smart media, transponders, and the like. If the payment device is in the form of a debit, credit or smart card, the payment device may also optionally have features such as a magnetic stripe. Such devices may operate in a contact or contactless mode.
A "credential" may be any suitable information that serves as reliable evidence of value, ownership, identity, or authorization. A credential may be a string of numbers, letters, or any other suitable character, and any object or document that may serve as a confirmation.
The "payment credentials" may include any suitable information associated with the account (e.g., a payment account and/or payment device associated with the account). Such information may be directly related to the account, or may be derived from information related to the account. Examples of account information may include a PAN (primary account number or "account number"), a username, an expiration date, and verification values, such as CVV, dCVV, CVV2, dCVV2, and CVC3 values.
The "token" may be a substitute value for the credential. The token may be a string of numbers, letters, or any other suitable character. Examples of tokens include payment tokens, access tokens, personal identification tokens, and the like.
The "payment token" may include an identifier of the payment account that is a substitute for an account identifier, such as a Primary Account Number (PAN). For example, the payment token may include a series of alphanumeric characters that may be used as a substitute for the primary account identifier. For example, the token "4900000000000001" may be used in place of PAN "4147090000001234". In some embodiments, the payment token may be "reserved format" and may have a numeric format (e.g., ISO8583 financial transaction message format) consistent with account identifiers used in existing transaction processing networks. In some embodiments, the payment token may be used in place of the PAN to initiate, authorize, settle, or resolve a payment transaction, or represent the original credential in other systems that would normally provide the original credential. In some embodiments, the payment token may be generated such that the recovery of the original PAN or other account identifier from the token value may not be computationally derivable. Further, in some embodiments, the token format may be configured to allow an entity receiving the token to identify it as a token and identify the entity that issued the token.
The "user" may comprise an individual. In some embodiments, a user may be associated with one or more personal accounts and/or mobile devices. In some embodiments, the user may also be referred to as a cardholder, account holder, or consumer.
A "resource provider" may be an entity that may provide resources such as goods, services, information, and/or locations. Examples of resource providers include merchants, data providers, transportation departments, government entities, site and home operators, and the like.
A "merchant" may generally be an entity that participates in a transaction and may sell or provide access to goods or services.
An "acquirer" can generally be a business entity (e.g., a commercial bank) that has a business relationship with a particular merchant or other entity. Some entities may perform the functions of both an issuer and an acquirer. Some embodiments may encompass such single entity issuer-acquirer. The acquirer may operate an acquirer computer, which may also be generally referred to as a "transmitting computer".
An "authorizing entity" may be the entity that authorizes the request. Examples of authorized entities may be issuers, government agencies, document repositories, access administrators, and the like. The authorizing entity may operate an authorizing computer.
An "issuer" may generally refer to a business entity (e.g., a bank) that maintains a user's account. The issuer may also issue payment credentials to the consumer that are stored on a portable device such as a cell phone, smart card, tablet, or laptop.
An "access device" may be any suitable device that provides access to a remote system. The access device may also be used to communicate with a merchant computer, a transaction processing computer, an authentication computer, or any other suitable system. The access device may generally be located at any suitable location, such as at a merchant location. The access means may take any suitable form. Some examples of access devices include POS or point-of-sale devices (e.g., POS terminals), cellular phones, PDAs, Personal Computers (PCs), tablet PCs, hand-held dedicated readers, set-top boxes, Electronic Cash Registers (ECRs), Automated Teller Machines (ATMs), Virtual Cash Registers (VCRs), kiosks, security systems, access systems, and the like. The access device may use any suitable contact or contactless mode of operation to send or receive data from or associated with the mobile communication device or payment device. In some embodiments where the access device may comprise a POS terminal, any suitable POS terminal may be used and may include a reader, a processor, and a computer readable medium. The reader may include any suitable contact or contactless mode of operation. For example, an exemplary reader may include a Radio Frequency (RF) antenna, an optical scanner, a barcode reader, or a magnetic stripe reader to interact with a payment device and/or a mobile device. In some embodiments, a cellular phone, tablet, or other dedicated wireless device used as a POS terminal may be referred to as a mobile point of sale or "mPOS" terminal.
An "authorization request message" may be an electronic message requesting authorization for a transaction. In some embodiments, an authorization request message is sent to the transaction processing computer and/or the issuer of the payment card to request authorization for the transaction. The authorization request message according to some embodiments may conform to ISO8583, which ISO8583 is a standard of systems for exchanging electronic transaction information associated with payments made by users using payment devices or payment accounts. The authorization request message may include an issuer account identifier that may be associated with the payment device or the payment account. The authorization request message may also include additional data elements corresponding to "identification information," including (by way of example only): a service code, a Card Verification Value (CVV), a dynamic card verification value (dCVV), a primary account number or "account number" (PAN), a payment token, a user name, a validity period, and so forth. The authorization request message may also include "transaction information," such as any information associated with the current transaction, such as the transaction amount, merchant identifier, merchant location, acquirer Bank Identification Number (BIN), card acceptor ID, information identifying the item being purchased, etc., and any other information that may be used to determine whether to identify and/or authorize the transaction.
The "authorization response message" may be a message in response to the authorization request. In some cases, the authorization response message may be an electronic message reply to the authorization request message generated by the issuing financial institution or the transaction processing computer. The authorization response message may include, for example, one or more of the following status indicators: approval-the transaction is approved; decline-transaction not approved; or call center-suspend more informative responses, the merchant must call the toll free authorized telephone number. The authorization response message may also include an authorization code, which may be a code indicating that the transaction is approved that the credit card issuing bank returned to the merchant's access device (e.g., PA equipment) in response to the authorization request message in the electronic message (either directly or through the transaction processing computer). The code may serve as proof of authorization.
A "server computer" may include a powerful computer or cluster of computers. For example, a server computer may be a mainframe, a minicomputer cluster, or a group of servers functioning as a unit. In one example, the server computer may be a database server coupled to a network server. The server computer may include one or more computing devices and may service requests from one or more client computers using any of a variety of computing structures, arrangements, and compilations.
The "memory" may be any suitable device that can store electronic data. Suitable memory may include a non-transitory computer-readable medium that stores instructions executable by a processor to implement a desired method. Examples of memory may include one or more memory chips, disk drives, and the like. Such memories may operate using any suitable electrical, optical, and/or magnetic operating modes.
A "processor" may refer to any suitable data computing device. The processor may include one or more microprocessors that work together to implement the desired functionality. The processor may comprise a CPU including at least one high speed data processor sufficient to execute program components for performing user and/or system generated requests. The CPU may be a microprocessor, such as AMD's fast dragon (Athlon), drill dragon (Duron), and/or gosauron (Opteron); PowerPC from IBM and/or Motorola; cell processors by IBM and Sony (Sony); intel (Intel) sialon (Celeron), Itanium (Itanium), Pentium (Pentium), to strong (Xeon) and/or XScale; and/or the like.
I. System for providing a unified transaction interface
FIG. 1 shows a block diagram of a system including a user 112, a portable device 102, a 104, an
In one example, the user 112 and 114 may be a customer attempting to purchase something at a brick and mortar store, the portable device 102 may be a newer type of credit card carried by the user 112, the portable device 104 may be an older type of credit card carried by the user 114, the
When a transaction is initiated between the portable device 102 and the
The communication protocol between the
In particular, the
Returning to the above example, the user 114 may initiate a contact transaction by inserting the portable device 104 into the
At various points in time, the user 112 may initiate a contactless transaction by holding the portable device 102 in proximity to the
In some embodiments, the first communication protocol may correspond to the EuroPay Master Visa (EMV) second generation standard (EMV 2.0), and the second communication protocol may correspond to the EMV first generation standard (EMV 1.0). Each EMV standard is associated with a number of payment schemes. Each payment scheme in EMV1.0 defines its own payment processing module, where each module includes functionality, logic, or data for handling contact or contactless transactions performed using the associated payment scheme. In processing the transaction, the POS terminal will need to determine which payment processing module to use, and then have that module exchange commands with the portable device (where the commands are sent via the exchanged communications and include data). EMV1.0 may be a stateful communication protocol. In other words, the EMV1.0 payment processing module may wish to exchange commands in a particular order.
EMV 2.0 may be a stateless data driven communication protocol that may be associated with a single processing module that may handle different protocols. In general, however, a POS terminal configured to handle EMV 2.0 transactions may not be able to handle EMV1.0 transactions. Rather than having the merchant operate a first POS terminal for EMV1.0 transactions and a second POS terminal for EMV 2.0 transactions, some embodiments may allow the merchant to operate a single physical card reader (i.e., access device 106) capable of handling any payment scheme associated with either the EMV1.0 communication protocol or the EMV 2.0 communication protocol. The card reader may be communicatively coupled to a PA (i.e., remote computer 108) in the cloud that handles payment processing via a single communication protocol (e.g., a first communication protocol).
Thus, in response to a transaction initiated by a credit/debit card, the card reader may be responsible for identifying the communication protocol (e.g., EMV1.0 or EMV 2.0), the payment scheme, and/or the payment processing module based on the credit card usage. If the identified communication protocol, payment scheme, or processing module is not compatible with the PA in the cloud, the card reader will translate or convert the communication from the card into a format compatible with the PA in the cloud. Meanwhile, the PA in the cloud may be responsible for processing payments according to the converted/translated communications. In this regard, the card reader may be referred to as a thin client. The resulting correlated separation may result in multiple modular components (e.g., thin clients and PAs in the cloud), including software that is less complex overall than (1) a single component configured to process payments using any communication protocol (e.g., a single local POS terminal, where the local POS terminal is a complete PA system contained entirely within a physical store) or (2) multiple local POS terminals (e.g., a first POS terminal that handles EMV1.0 transactions and a second POS terminal that handles EMV 2.0 transactions).
In some embodiments, EMV 2.0 may be based on REST or JSON. For example, EMV 2.0 compliant communications may be in XML or JSON format, and/or such communications may be transmitted/received from other interfaces.
Generally, updates to the payment processing logic may be more common than updates to the communication protocol. Thus, relocating the payment processing software from the local POS terminal to the PA in the cloud may more easily update the payment processing logic, as the payment processing network operator no longer needs to update the local POS terminal (e.g., perform any updates by actually accessing the card reader).
The area 150 may correspond to a physical location of the resource provider (e.g., a brick and mortar store) where the portable device 102 and 104 are placed in close proximity (e.g., inches or feet) to the
The
The portable devices 102 and 104 may each be a portable device as defined above, wherein the portable device 102 is configured to perform transactions using a first communication protocol and the portable device 104 is configured to perform transactions using a second communication protocol. For example, portable device 102 may be a newer type of credit or debit card compatible with EMV 2.0, while portable device 104 may be an older type of credit or debit card compatible with EMV 1.0.
FIG. 2 illustrates a block diagram of a
The
the
The
In particular, the transaction processing module may notify the
The data communication manager may synchronize data exchanges between the portable device and the
The
Fig. 3 illustrates a block diagram of an
The
The
In particular, the
To this end, the
The
Processing transactions in a unified transaction interface
FIG. 4 sets forth a flow chart illustrating an exemplary method for conducting an access transaction using different communication protocols according to some embodiments.
At
In some embodiments, a first communication protocol may define a first set of communications (e.g., selecting a first application on a card, providing a first set of data, and requesting a second set of data from the card), the access device being configured to exchange with a particular set of portable devices configured to communicate using the first communication protocol. For example, a first communication protocol may correspond to EMV 2.0, and a particular set of portable devices configured to communicate using the first communication protocol may correspond to a newer type of credit card. In some embodiments, the communications may include application layer communications that define data objects and data flows (e.g., TCP/IP, bluetooth, ISO 7816) when the transport layer communications define a message format, regardless of the data being exchanged.
The first communication protocol may further define a second set of communications that the access device is configured to exchange with the remote computer, a fourth set of communications that the remote computer is configured to exchange with the access device (e.g., a first transaction processing flow), and a fifth set of communications that the access device is configured to exchange with a portable device configured to communicate using the first communication protocol.
The first set of communications and the second set of communications may be the same as an embodiment that is a simple relay when both the portable device and the remote computer use the same communication protocol. However, some embodiments may have the access device perform translation on communications to optimize performance and minimize the amount of communications exchanged with the remote computer (e.g., package communications in an object or packaging interface) and/or to accommodate a particular transport protocol (e.g., TCP/IP, bluetooth, ISO 7816), even when the portable device and the remote computer use the same communication protocol. In these embodiments, the first set of communications may be different from the second set of communications.
At
In some embodiments, the second communication protocol may define a third set of communications (e.g., selecting a second application on the card, providing a third set of data, and requesting a fourth set of data from the card) that the access device is configured to receive from a particular portable device configured to communicate using the second communication protocol. For example, the second communication protocol may correspond to EMV1.0, and a particular set of portable devices configured to communicate using the second communication protocol may correspond to an older type of credit card. The second communication protocol may further define a sixth set of communications (e.g., a second transaction processing flow) that the access device is configured to exchange with a portable device configured to communicate using the second communication protocol.
Generally, the sets of communications may include communications requesting data, communications authenticating data, and communications transmitting data.
In
At
It should be noted that during or after the process of exchanging transaction data between the portable device and the remote computer, one or more authorization request messages may be generated and transmitted to the payment processing network, which may include forwarding the authorization request messages to the acquirer and/or issuer.
Fig. 5-6 illustrate sequence diagrams of operations for performing transactions using different communication protocols, in accordance with some embodiments. Fig. 5 illustrates a transaction conducted between a portable device configured to use a first communication protocol and configured to use the first communication protocol. As shown in FIG. 5, system 500 includes remote computer 502, access device 504, and portable device 506. Note that in some embodiments, remote computer 502, access device 504, portable device 506 may be similar to
At step 520, the access device 504 receives a communication from the remote computer 502 to initiate selection of an application for which to perform a transaction. In some embodiments, the access device 504 may have forwarded an indication that a transaction is to be conducted between the remote computer 502 and the portable device 506. The indication may result from a physical interaction between the portable device 506 and the access device 504 (e.g., swiping a credit card on a card reader). At this point, the remote computer (i.e., the PA in the cloud) may determine the applications on the portable device 506 that are available to perform the transaction.
In step 522, the access device 504 forwards the communication in step 520 to the portable device 506 as a "select EMV" command. If the portable device fails to respond correctly to the command, or rejects the command, the access device 504 may determine that the portable device uses the second communication protocol instead of the first communication protocol and may communicate with the portable device 506 using the second communication protocol, as discussed in further detail below with respect to FIG. 6.
At step 524, because the portable device 506 uses EMV 2.0, the access device 504 may receive a communication confirming that the portable device 506 uses the first communication protocol. In some embodiments, the portable device response may also include a request for server data from the remote computer 502.
At step 526, access device 504 forwards the portable device's confirmation of use of the first communication protocol, and any eventual POS data request from portable device 506, to remote computer 502.
Step 552-. To conduct a transaction, remote computer 502 and portable device 506 may seek to obtain transaction information from each other. For example, portable device 506 may wish to know what type of card verification method is supported by remote computer 502. At the same time, the remote computer may wish to obtain a Primary Account Number (PAN), expiration date, country code, and other account information related to the portable device 506.
Because EMV 2.0 is a data-driven communication protocol, different card data or combinations of POS data may be requested or provided in a single communication. In particular, a single communication may request data and provide the data in response to an earlier request. For example, communications from remote computer 502 to portable device 506 may include requests for card data and POS data responsive to POS data requests made by portable device 506. This ability to mix data and data requests in a single communication may reduce the total number of communications exchanged, which may increase speed and reduce the complexity of processing transactions. It should be noted that step 552-558 may be repeated multiple times depending on the transaction information that needs to be exchanged.
At step 552, the access device 504 may receive a communication from the remote computer 502 requesting card data from the portable device 506. The communication may also include POS data. In some embodiments, remote computer 502 provides the POS data requested by portable device 506 in step 524. In some embodiments, remote computer 502 provides all POS data available at that stage to access device 504, regardless of the portable device data request.
At step 554, access device 504 may forward the card data request and POS data to portable device 506. In some embodiments, access device 504 may package the card data request in a list of data objects requested from portable device 506. In some embodiments, access device 504 only provides POS data sets requested by the portable device in previous communications.
At step 556, the access device 504 may receive another communication from the portable device 506 containing the card data requested in the previous step. In some embodiments, the portable device 506 only provides the card data set requested in the last step.
In step 556, access device 504 may request a communication from portable device 506 requesting POS data. In some embodiments, portable device 506 packages the POS data request in a list of data objects requested from remote computer 502.
At step 558, the access device 504 may forward the card data and POS data request to the remote computer 502. In some embodiments, access device 504 may have received POS data requested by portable device 506 in a previous communication with remote computer 502, and may be able to provide them without additional communication with remote computer 502. In some embodiments, access device 504 simply forwards to remote computer 502 a data request from portable device 506 for POS data that it has not yet received.
Fig. 6 illustrates a transaction conducted between a remote computer configured to use a first communication protocol (e.g., EMV 2.0) and a portable device configured to use a second communication protocol (e.g., EMV 1.0). As shown in FIG. 6,
At
At
At
At
Similar to step 552- > 558 of FIG. 5, step 648- > 656 describes a series of exchanges of transaction information between the
At step 648, the
At
At step 662, the
At step 664, the
In some embodiments, the portable device response may also include a request for certain POS data from the
At
The various participants and elements described herein with reference to fig. 1-6 can operate one or more computer devices to facilitate the functionality described herein. Any of the elements in fig. 1-6, including any servers or databases, may use any suitable number of subsystems to facilitate the functionality described herein.
In fig. 5-6, after data is exchanged between the
The authorization request message may be transmitted to the issuer computer via the acquirer computer and the payment processing network. The issuer computer may approve or deny the transaction and may generate an authorization response message. The "authorization response message" may be an electronic message reply to the authorization request message generated by the issuing financial institution or the payment processing network. The authorization response message may include, for example, one or more of the following status indicators: approval-the transaction is approved; decline-transaction not approved; or call center-suspend more informative responses, the merchant must call the toll free authorized telephone number. The authorization response message may also include an authorization code, which may be a code indicating that the transaction is approved that the credit card issuing bank returned to the merchant's access device (e.g., POS device) in response to the authorization request message in the electronic message (either directly or through the payment processing network). The code may serve as proof of authorization. As described above, in some embodiments, the payment processing network may generate or forward an authorization response message to the merchant. The authorization response message may be transmitted back to the
Examples of such subsystems or components are interconnected via a system bus. Additional subsystems such as a printer, keyboard, fixed disk (or other memory including computer-readable media), monitor coupled to a display adapter, and other devices are shown. Peripheral devices and input/output (I/O) devices coupled to an I/O controller, which may be a processor or any suitable controller, may be connected to the computer system by any number of means known in the art, such as serial ports. For example, a serial port or external interface can be used to connect the computer device to a wide area network (such as the internet), a mouse input device, or a scanner. The interconnection via a system bus allows the central processor to communicate with each subsystem and to control the execution of instructions from the system memory or the fixed disk and the exchange of information between subsystems. The system memory and/or fixed disk may embody a computer readable medium.
In addition, while the present invention has been described using a particular combination of hardware and software in the form of control logic and programming code and instructions, it should be recognized that other combinations of hardware and software are also within the scope of the present invention. The present invention can be implemented by only hardware or only software or using a combination thereof.
Any of the software components or functions described in this application may be implemented as software code executed by a processor using any suitable computer language, such as, for example, Java, C + + or Perl using, for example, conventional or object-oriented techniques. The software code may be stored as a series of instructions or commands on a computer readable medium, such as a Random Access Memory (RAM), a Read Only Memory (ROM), a magnetic medium such as a hard drive or floppy disk, or an optical medium such as a CD-ROM. Any such computer-readable media may reside on or within a single computing device, and may exist on or within different computing devices within a system or network.
The above description is illustrative and not restrictive. Many variations of the invention will become apparent to those skilled in the art upon reading the present disclosure. The scope of the invention should, therefore, be determined not with reference to the above description, but instead should be determined with reference to the pending claims along with their full scope or equivalents.
Any of the methods described herein may be performed in whole or in part with a computer system that includes one or more processors that may be configured to perform the steps. Thus, embodiments may relate to a computer system configured to perform the steps of any of the methods described herein, possibly with different components performing the respective steps or groups of the respective steps. Although presented in numbered steps, the steps of the methods herein may be performed simultaneously or in a different order. Additionally, portions of these steps may be used with portions of other steps of other methods. Further, all or a portion of the steps may be optional. Additionally, any of the steps of any of the methods may be performed by modules, units, circuits, or other means that perform the steps.
One or more features of any embodiment may be combined with one or more features of any other embodiment without departing from the scope of the invention.
The recitation of "a", "an" or "the" is intended to mean "one or more" unless specifically indicated to the contrary.
All patents, patent applications, publications, and descriptions mentioned above are incorporated herein by reference in their entirety for all purposes. No admission is made that they are prior art.
- 上一篇:一种医用注射器针头装配设备
- 下一篇:用于基于区块链的认证的系统和方法