Automated access data provisioning

ABSTRACT

A method is disclosed. The method includes transmitting by a computing device, an account creation request to a remote server computer. The method further includes automatically provisioning the computing device with an access token in response to receiving a request to create the account.

CROSS-REFERENCES TO RELATED APPLICATIONS

This application claims the benefit of the filing date of U.S. Provisional Application No. 62/091,356, filed on Dec. 12, 2014, which is incorporated by reference in its entirety for all purposes.

BACKGROUND

Mobile phones can utilize access data to obtain access to a resource or a location. For example, a mobile phone may include data which is passed to an access device to allow the user of the mobile phone to access a room in a building. In another example, the mobile phone may have access data such as account data which may allow the user of the mobile phone to access an account to obtain a good.

In many cases, a resource provider may provision the mobile phone with the access data. For example, a building operator system may provision a mobile phone with data that allows a user of the mobile phone to access a building. In another example, a bank may provision the mobile phone with access data that allows the user of the mobile phone to access an account at the bank. In this particular situation, the resource provider can verify that the user of the mobile phone is in fact an authentic user. As a result, the transmission of access data to the mobile phone is relatively secure.

An account is typically required to be present before the mobile phone can be provisioned with the access data. Creating an account and then also requesting the provisioning of the access token can require multiple actions or steps on the part of the user of the mobile phone. This is especially true when the entity that creates the access data is different than the entity that creates the account and is also different than the entity that provisions the access data. For example, the provisioning of a payment token (which may be a substitute for a real credit or debit card account number) on a mobile device may involve a token generation entity that generates and provisions the payment token, an authorization entity such as an issuer that previously generated the real credit or debit card account number that was used to create the payment token, and a digital wallet provider that generates an account which will be associated with the payment token. If the user is required to interact with each of these entities to provision an access token on the user's mobile device, the user will be frustrated. Such an experience can, in some instances, inhibit the user such that the user may not wish to even open the account or provision the phone with the access token.

Embodiments of the invention are directed to methods and systems that are more convenient for users to provision access data such as access tokens to computing devices. Embodiments of the invention address these and other problems, individually and collectively.

BRIEF SUMMARY

Embodiments of the invention are directed to methods and systems that improve security when provisioning access data such as access tokens to a computing device. The computing device may be a mobile device.

One embodiment of the invention is directed to a method comprising steps including: a) receiving, by a server computer from an application on a computing device, user information; b) causing, by the server computer, the application on the computing device to present an account creation query for an account; c) receiving, by the server computer via the application on the computing device, a request to create the account from a user; d) initiating, by the server computer, the creation of the account; and e) initiating, by the server computer, the provisioning of the account with an access token, where steps d) and e) occur without user input.

Another embodiment of the invention is directed to a server computer configured to perform the above described method.

Another embodiment of the invention is directed to a method. The method includes steps including a) providing, by an application in a computing device to a server computer, user information; b) presenting, by the application in the computing device, an account creation query; c) transmitting, the computing device to the server computer, an account creation request to the server computer, wherein an account is created thereafter and the server computer automatically transmits access data to the computing device in response to the creation of the account; and d) receiving, by the mobile device, the access data with the account in the mobile phone.

Another embodiment of the invention is directed to a mobile device configured to perform the above described method.

These and other embodiments are described in further detail below, with reference to the Figures and Detailed Description.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows a block diagram of a system according to an embodiment of the invention.

FIG. 2 shows a block diagram of a mobile device according to an embodiment of the invention.

FIG. 3 shows a block diagram of a token service computer according to an embodiment of the invention.

FIG. 4 shows a flowchart illustrating a method according to an embodiment of the invention.

FIGS. 5A-5C show a detailed flow diagram illustrating methods according to embodiments of the invention.

FIG. 6 shows a block diagram of a building access system.

FIG. 7 shows a block diagram of a transaction processing system that can use a mobile device with access data.

DETAILED DESCRIPTION

Embodiments of the invention can allow for the automatic creation of an account and the subsequent automatic provisioning of access data such as an access token to a computing device. The provisioning process can happen at the same time that the account is created, thus making the use of access tokens easier for users. With the exception of possible identity and verification processing that might be initiated if provisioning the access token is risky, the access token provisioning process requires no additional interaction on the part of the user once the user expresses a desire to create the account. In some embodiments, the access token is a payment token, which can be used to make payments at access devices located at merchants. The access token may be a substitute for a primary account number from an issuer. The account that is created may be associated with a third party such as a digital wallet provider operating a digital wallet server computer. In other embodiments, the access token can be used to obtain access to a particular location or venue.

Before discussing detailed embodiments of the invention, some descriptions of certain terms may be useful.

A “computing device” may be any suitable device that can perform computations, and that can communicate with other devices. A mobile device is an example of a computing device. Other types of computing devices may not be mobile.

A “mobile device” may comprise any electronic device that may be transported and operated by a user, which may also provide remote communication capabilities to a network. Examples of remote communication capabilities include using a mobile phone (wireless) network, wireless data network (e.g., 3G, 4G or similar networks), Wi-Fi, Wi-Max, or any other communication medium that may provide access to a network such as the Internet or a private network. Examples of mobile devices include mobile phones (e.g., cellular phones), PDAs, tablet computers, net books, laptop computers, personal music players, hand-held specialized readers, wearable devices (e.g., watches), vehicles (e.g., cars), etc. A mobile device may comprise any suitable hardware and software for performing such functions, and may also include multiple devices or components (e.g., when a device has remote access to a network by tethering to another device—i.e., using the other device as a relay—both devices taken together may be considered a single mobile device).

“Authentication data” may include any data suitable for authenticating a user or mobile device. Authentication data may be obtained from a user or a device that is operated by the user. Examples of authentication data obtained from a user may include PINs (personal identification numbers), passwords, etc. Examples of authentication data that may be obtained from a device may be include device serial numbers, hardware secure element identifiers, device fingerprints, phone numbers, IMEI numbers, etc.

A “provisioning server computer” may include any suitable computer that can provision access data to a device.

“Access data” may include any suitable data that can be used to access a resource or create data that can access a resource. In some embodiments, access data may be account information for a payment account. Account information may include a PAN, payment token, expiration date, verification values (e.g., CVV, CVV2, dCVV, dCVV2), etc. In other embodiments, access data may be data that can be used to activate account data. For example, in some cases, account information may be stored on a mobile device, but may not be activated until specific information is received by the mobile device. This specific information may be characterized as access information in some embodiments. In other embodiments, access data could include data that can be used to access a location. Such information may be ticket information for an event, data to access a building, transit ticket information, etc. Access data may include real access data (e.g., a real credit card number or real access credentials to enter a building), or tokenized access data (e.g., data that represents or obscures the real credit card number or real access credentials).

An “access token” may be a substitute for real access data. Examples of access tokens may include payment tokens and other types of tokens that allow one to access a resource.

A “payment token” may include an identifier for a payment account that is a substitute for an account identifier, such as a primary account number (PAN). For example, a payment token may include a series of numeric and/or alphanumeric characters that may be used as a substitute for an original account identifier. For example, a token “4900 0000 0000 0001” may be used in place of a PAN “4147 0900 0000 1234.” In some embodiments, a token may be “format preserving” and may have a numeric format that conforms to the account identifiers used in existing payment processing networks (e.g., ISO 8583 financial transaction message format). In some embodiments, a token may be used in place of a PAN to initiate, authorize, settle or resolve a payment transaction or represent the original credential in other systems where the original credential would typically be provided. In some embodiments, a payment token value may be generated such that the recovery of the original PAN or other account identifier from the token value may not be computationally derived. Further, in some embodiments, the token format may be configured to allow the entity receiving the token to identify it as a token and recognize the entity that issued the token.

A “token service system” can include a system that facilitates requesting, generating and issuing tokens, as well as maintaining an established mapping of tokens to primary account numbers (PANs) in a repository (e.g. token vault). The token service system may establish a token assurance level for a given token to indicate the confidence level of the token to PAN binding. The token service system may support token processing of payment transactions submitted using tokens by de-tokenizing the token to obtain the actual PAN.

A “token service provider” may include an entity that operates or includes one or more computers (e.g., server computers) in a token service system that generates, processes and maintains tokens. A token service computer may include or be in communication with a token vault where the generated tokens are stored. Specifically, the token vault may maintain a one-to-one mapping between a token and a primary account number (PAN) represented by the token. The token service provider may have the ability to set aside licensed BINs as token BINs to issue tokens for the PANs that may be submitted to the token service provider. Various entities of a tokenization ecosystem may assume the roles of the token service provider. For example, payment networks and issuers or their agents may become the token service provider by implementing the token services according to embodiments of the present invention. A token service provider may provide reports or data output to reporting tools regarding approved, pending, or declined token requests, including any assigned token requestor IDs. The token service provider may provide data output related to token-based transactions to reporting tools and applications and present the token and/or PAN as appropriate in the reporting output.

A “token vault” may include a repository that maintains established token-to-PAN mappings. According to various embodiments, the token vault may also maintain other attributes of the token requestor that may be determined at the time of registration and that may be used by the token service provider to apply domain restrictions or other controls during transaction processing. The token vault may be a part of the token service system. In some embodiments, the token vault may be provided as a part of the token service provider. Alternatively, the token vault may be a remote repository accessible by the token service provider. Token vaults, due to the sensitive nature of the data mappings that are stored and managed in them, may be protected by strong underlying physical and logical security.

An “identification and verification (ID&V) method” may include a process that can ensure the integrity of a token generation, distribution, or use process. Examples of ID&V methods may include, but are not limited to, an account verification message, a risk score based on assessment of the primary account number (PAN) and use of one time password by the issuer or its agent to verify the account holder. Exemplary ID&V methods may be performed using information such as a user signature, a password, an offline or online personal identification number (PIN), an offline or online enciphered PIN, a combination of offline PIN and signature, a combination of offline enciphered PIN and signature, user biometrics (e.g. voice recognition, fingerprint matching, etc.), a pattern, a glyph, knowledge-based challenge-responses, hardware tokens (multiple solution options), one time passwords (OTPs) with limited use, software tokens, two-channel authentication processes (e.g., via phone), etc. Using the ID&V, a confidence level may be established with respect to the token to PAN binding.

A “token assurance level” may refer to an indicator or a value that allows the token service provider to indicate the confidence level of the token to PAN binding. The token assurance level may be determined by the token service provider based on the type of identification and verification (ID&V) performed and the entity that performed the ID&V. The token assurance level may be set when issuing the token. The token assurance level may be updated if additional ID&V is performed.

A “requested token assurance level” may refer to the token assurance level requested from the token service provider by the token requestor. The requested token assurance level may be included in a field of a token request message sent by the requestor to the token service provider for the generation/issuance of the token.

An “assigned token assurance level” may refer to the actual (i.e. generated) value assigned by the token service provider to the token as the result of the identification and verification (ID&V) process performed by an entity within the tokenization ecosystem. The assigned token assurance level may be provided back to the token requestor in response to the token request message. The assigned token assurance level may be different than the requested token assurance level included in the token request message.

An “application” may be a computer program that is used for a specific purpose.

An “access device” may be any suitable device for obtaining access to a resource. An access device may generally be located in any suitable location, such as at the location of a merchant. An access device may be in any suitable form. Some examples of access devices include POS devices, cellular phones, PDAs, personal computers (PCs), tablet PCs, hand-held specialized readers, set-top boxes, electronic cash registers (ECRs), automated teller machines (ATMs), virtual cash registers (VCRs), kiosks, security systems, access systems, Websites, and the like. An access device may use any suitable contact or contactless mode of operation to send or receive data from, or associated with, a payment device and/or a user mobile device.

An “authorization request message” may be an electronic message that is sent to a payment processing network and/or an issuer of a payment card to request authorization for a transaction. An authorization request message according to some embodiments may comply with ISO 8583, which is a standard for systems that exchange electronic transaction information associated with a payment made by a consumer using a payment device or payment account. The authorization request message may include an issuer account identifier that may be associated with a payment device or payment account. An authorization request message may also comprise additional data elements corresponding to “identification information” including, by way of example only: a service code, a CVV (card verification value), a dCVV (dynamic card verification value), an expiration date, etc. An authorization request message may also comprise “transaction information,” such as any information associated with a current transaction, such as the transaction amount, merchant identifier, merchant location, etc., as well as any other information that may be utilized in determining whether to identify and/or authorize a transaction.

An “authorization response message” may be an electronic message reply to an authorization request message generated by an issuing financial institution or a payment processing network. The authorization response message may include, by way of example only, one or more of the following status indicators: Approval—transaction was approved; Decline—transaction was not approved; or Call Center—response pending more information, merchant must call the toll-free authorization phone number. The authorization response message may also include an authorization code, which may be a code that a credit card issuing bank returns in response to an authorization request message in an electronic message (either directly or through the payment processing network) to the merchant's access device (e.g. POS equipment) that indicates approval of the transaction. The code may serve as proof of authorization. As noted above, in some embodiments, a payment processing network may generate or forward the authorization response message to the merchant.

A “server computer” is typically a powerful computer or cluster of computers. For example, the server computer can be a large mainframe, a minicomputer cluster, or a group of servers functioning as a unit. In one example, the server computer may be a database server coupled to a Web server.

A “processor” may refer to any suitable data computation device or devices. A processor may comprise one or more microprocessors working together to accomplish a desired function. The processor may include CPU comprises at least one high-speed data processor adequate to execute program components for executing user and/or system-generated requests. The CPU may be a microprocessor such as AMD's Athlon, Duron and/or Opteron; IBM and/or Motorola's PowerPC; IBM's and Sony's Cell processor; Intel's Celeron, Itanium, Pentium, Xeon, and/or XScale; and/or the like processor(s).

A “memory” may be any suitable device or devices that can store electronic data. A suitable memory may comprise a non-transitory computer readable medium that stores instructions that can be executed by a processor to implement a desired method. Examples of memories may comprise one or more memory chips, disk drives, etc. Such memories may operate using any suitable electrical, optical, and/or magnetic mode of operation.

I. Systems

FIG. 1 shows a block diagram of a system according to an embodiment of the invention. FIG. 1 shows a user 10 that operates a mobile device 20 in communication with a token service computer 80. The token service computer 80 may be part of token service system. The token service computer 80 can access a token vault 82 to obtain access tokens. The token service computer 80 may also be in communication with a digital wallet server computer 60.

The token service computer 80 may be configured to provision the mobile device 20 with access data. It may include a processor and a computer readable medium comprising code which causes the processor to perform any suitable method associated with provisioning the mobile device 20 with access data. It may also maintain a database of addresses (e.g., an IP or internet protocol address or phone number) for various mobile devices that can be provisioned with access data. The token service computer 80 may also access a token vault 82 that contains a database of access data to be provisioned.

The digital wallet server computer 60 may be configured to maintain a digital wallet associated with the user of the mobile device 20 as well as other users. A “digital wallet” can store user profile information, payment information (e.g. PANs or primary account numbers, payment tokens (i.e., PAN substitutes), verification values such as CVVs, etc.), bank account information, and/or the like and can be used in a variety of transactions, such as but not limited to eCommerce, social networks, money transfer/personal payments, mobile commerce, proximity payments, gaming, and/or the like for retail purchases, digital goods purchases, utility payments, purchasing games or gaming credits from gaming websites, transferring funds between users, and/or the like.

Each of the entities in FIG. 1 may communicate through any suitable communication channel or communications network. A suitable communications network may be any one and/or the combination of the following: a direct interconnection; the Internet; a Local Area Network (LAN); a Metropolitan Area Network (MAN); an Operating Missions as Nodes on the Internet (OMNI); a secured custom connection; a Wide Area Network (WAN); a wireless network (e.g., employing protocols such as, but not limited to a Wireless Application Protocol (WAP), I-mode, and/or the like); and/or the like.

FIG. 2 shows a block diagram of a mobile device 20 according to an embodiment of the invention. The mobile device 20 may be an example of a computing device. In some embodiments, the mobile device 20 may be a payment device that can be used to make payments or a device which can allow a user to gain access to a location. The exemplary mobile device 20 may comprise a computer readable medium 20J that can be present within the body 10H of the mobile device 20. The computer readable medium 20J may be in the form of a memory that stores data. In some cases, the memory 10B may also store information such as access data. In general, any of this information may be transmitted by the mobile device 20 to another device, using any suitable method, including the use of antenna 20H or contactless element 20G. The body 10H may be in the form a plastic substrate, housing, or other structure.

The computer readable medium 20J may comprises code, executable by the processor for implementing a method comprising providing, by an application in the mobile device to a server computer, user information, presenting an account creation query, and transmitting an account creation request to the server computer. An account is created thereafter and the server computer automatically transmits a token to the computing device in response to the creation of the account. The method also includes receiving the access token associated with the account in the mobile device.

In some embodiments, the mobile device 20 may further include a contactless element 20G, which is typically implemented in the form of a semiconductor chip (or other data storage element) with an associated wireless transfer (e.g., data transmission) element, such as an antenna. Contactless element 20G may be coupled to (e.g., embedded within) the mobile device 20 and data or control instructions that are transmitted via a cellular network may be applied to the contactless element 20G by means of a contactless element interface (not shown). Contactless element 20G may be capable of transferring and receiving data using a short range wireless communication capability. As noted above, mobile device 20 may comprise components to both be the interrogator device (e.g. receiving data) and the interrogated device (e.g. sending data). Thus, the mobile device 20 may be capable of communicating and transferring data or control instructions via both cellular network (or any other suitable wireless network—e.g. the Internet or other data network) and short range communications.

The mobile device 20 may also include a processor 20C (e.g., a microprocessor) for processing the functions of the mobile device 20 and a display 20D to allow a consumer to see phone numbers and other information and messages. The mobile device 20 may further include input elements 20E to allow a user to input information into the device, a speaker 20F to allow the user to hear voice communication, music, etc., and a microphone 20I to allow the user to transmit her voice through the mobile device 20. The mobile device 20 may also include an antenna 20H for wireless data transfer (e.g., data transmission).

A memory 20 may be coupled to the processor 20C and may store a first application 20A and a second application 20B. The memory 20 may be in the form of one or more memory devices (e.g., RAM, EEPROM, ROM chips), using any suitable mode of data storage. In some embodiments, the memory 20 in the mobile device 20 may also include a secure storage area for storing sensitive data such as payment credentials (account numbers, payment tokens, verification values, etc.) and access data. For example, the memory 20 may be part of or may contain a secure element.

In some embodiments, the first application 20A is an application that is specifically associated with the authorization computer system 40 and is generally trusted by the authorizing entity associated with the authorization computer system 40. The first application 20A may be, for example, an issuer application such as a mobile banking application. Such applications are generally designed by the authorizing entity and can include data security measures that are specifically required by the authorizing entity. The first application 20A could alternatively be a merchant application or a third party wallet application.

The second application 20B may be an SDK (software development kit) that is provided by an entity such as a payment processor, a token service, a digital wallet provider, or even the issuer. The second application 20B may, when executed by the processor 20C, obtain device information from the mobile device 20 and may provide it to the first application 20A.

FIG. 3 shows a block diagram of a token service computer 80 according to an embodiment of the invention. The token service computer 80 may also be in a payment processing network in some embodiments of the invention. The token service computer 80 may comprise a processor 81, which may be coupled to a system memory 82 and an external communication interface 83. A computer readable medium 84 may also be operatively coupled to the processor 81.

In some embodiments, the token service computer 80 may be part of a payment processing network that switches transaction request and responses between issuers and acquirers. A payment processing network may be a transaction processing network. A transaction processing network may process payment transactions or other types of access transactions.

The computer readable medium 84 may comprise a number of software modules including a communication module 84A, a device database 84B, a provisioning module 84C, an authorization module 84D, and an encryption module 84E.

The communication module 84A may comprise code that causes the processor 81 to generate messages, forward messages, reformat messages, and/or otherwise communicate with other entities.

The device database 84B may comprise device information, wallet identifiers, and user information. Wallet identifiers may be in any suitable form and may contain any suitable number and type of characters. Examples of device and user information are provided above and below.

The provisioning module 84C may comprise code that allows the token service computer 80 to provision access tokens to computing devices. The provisioning module 84C may include any suitable software that allows access tokens to be formatted and transmitted to a computing device.

The ID&V module 84D can include logic that is executable by the processor 81 to initiate ID&V processing, which is described in further detail above.

The computer readable medium 84 may also optionally comprise a token generation module 84E. The token generation module may include any suitable software to generate tokens. Such tokens may be generated using an algorithm. For example, primary account numbers or PANs may be subjected to a token generation algorithm which converts the PANs to tokens. In other embodiments, tokens may be randomly generated from the PANs and the PANs may be mapped to the tokens.

II. Methods

FIG. 5 shows a high level flowchart illustrating a method according to an embodiment of the invention.

In step S10, a server computer such as the token service computer 80 may receive user information from an application (e.g., the first application 20A) on a computing device such as the mobile device 20. The user information is not limited, and may include at least one of a phone number, e-mail address, primary account number, etc. In some embodiments, the server computer may also receive device information.

In step S20, the server computer causes the application on the computing device to present an account creation query for an account. The account creation query may be a query to the user of the computing device requesting the user to indicate whether or not the user wants to create an account associated with a digital wallet provider. The digital wallet provider may store account data associated with payment accounts from various issuers.

In step S30, the server computer receives from the application on the computing device, a request to create the account from a user.

In step S40, after the server computer receives the request to create the account, the server computer initiates the creation of the account. In some embodiments, the server computer may send a message to a digital wallet server computer to instruct the digital wallet server computer to create the account.

In step S50, after the account is created, the sever computer initiates the provisioning of the account with an access token. Steps S40 and S50 can occur without user input. The only exception to this might be if the provisioning of the access token may involve an unacceptable amount of risk to either the digital wallet provider, the issuer, or the token service provider. In this case, an additional identity and verification process can take place to request additional authentication data from either the computing device and/or the user.

FIGS. 5A-5C show a more detailed process flow according to an embodiment of the invention.

In step S102, a user opens up the first application 20A for the first time. The first application may be a mobile application. The mobile application may be an issuer application associated an issuer (not shown), a merchant application, and a third party wallet proximity application. An issuer is typically a bank or other entity that issues accounts such as credit and debit card accounts. In some embodiments, as explained below, the first application 20A is initially not affiliated with the digital wallet provider that operates the digital wallet server computer 60.

In step S104, after the first application 20A is opened, the first application 20A may send a request to the token service computer 30 to request the request the status of the mobile device 20A. The request may include information such as user information known by the first application 20A (e.g., a phone number, e-mail address, etc.).

Prior to step S104, in step S118, the second application 20B, which may be an SDK (software development kit) may collect device information about the mobile device 20 without any user interaction. Such information may include an IMEI (international mobile equipment identity) number, an MSISDN number, an IMSI (international mobile subscriber identity) number, e-mail account, secure element identifier, a SIM card number, etc. This information may also be sent in the device status request sent to the token service computer 80 in step S104.

At step S106, the token service computer 80 checks for a matching device in a database as shown in S108. This checking can be performed to see if any of the collected device information and/or user information matches stored device information and/or user information that correlates to a previously stored digital wallet identifier associated with the digital wallet server computer 60.

At step S110, the token service computer 80 makes a decision as to whether or not the device is found in the database based upon the received user information and/or device information. The decision may be based on a common database information lookup.

In step S112, if the token service computer 80 determines that the mobile device 20 is not found in the database, then the token service computer 80 communicates to the first application 20A in the mobile device that the mobile device 12 is unknown.

In step S114, after receiving the communication, the first application 20A displays an enrollment form with a wallet enrollment option. The wallet enrollment option provides the user 10 with the option to create an account with the wallet server computer 60 through the first application 20A.

In step S116, a decision is made as to whether or not the user 10 has an account with the digital wallet server 60.

In step S118, if the user does not have an account with the digital wallet server 60, then the user 10 enters account information, a proposed wallet login identifier (e.g., an e-mail address, and a proposed password or a passcode).

If the user has a wallet, then the process proceeds to step 120, which is described in further detail below.

In step S119, if user 10 does not have a wallet, then the first application 20A in the mobile device 20 then initiates the creation of a digital wallet account and the request to recreate the account is transmitted to the token service computer 80. Note that the digital wallet account may be unrelated to the first application which may be an issuer application provided by an issuer, a merchant application or any other application. Any additional device information collected in step S118 may be included along with the account information, wallet login, and password or passcode in an account creation request message that is sent to the token service computer 80. Device information that may be collected may be a secure element identifier, an IMEI number, an IMSI number, etc. The device data may be automatically gathered by a second application 20B on the mobile device 20 without human intervention.

In step 160, once the token service computer 80 receives the account creation request message, the device information and the user information can be stored in a database, along with a corresponding digital wallet ID that is associated with the wallet server computer 60. The token service computer 80 can also initiate a token provisioning process, and can initiate the creation of the account by sending an account creation message to the wallet server computer 60. The token service computer 80 may perform these steps without any additional user input.

In step S162, the digital wallet server computer 60 can create a digital wallet account using the user information, login information, and the passcode or password information. This information may be stored at the wallet server computer 60. In addition, if the digital wallet server computer 60 utilizes its own application, the digital wallet server computer 60 may direct the installation of its own application onto the mobile device 20. It may do so by contacting the mobile device directly, or through the token service computer 80.

In step S142, the token service computer 80 may then determine if additional ID&V (identification and verification) needs to be performed before an access token is provisioned to the mobile device 20. In order to make this decision, the token service computer 80 may perform a risk analysis. The risk analysis may involve checking the account information, as well as any device information to determine if the provisioning of an access token on the mobile device 20 involves an unacceptable risk. For example, the device information may indicate that the mobile device 20 may have been compromised, or the user account information may be in a blacklist of fraudulent or stolen account information. In some cases, a risk score may be generated and this risk score may be compared to predetermined thresholds to determine if the level of risk is acceptable.

In step S146, if additional ID&V is needed, ID&V processing can occur. For example, the user 10 may be challenged for additional information via the mobile device 20 or through another device and/or communication channel used by the user 10.

In step S144, if no further ID&V is required or if the ID&V process was successfully completed in step S146, then the token service computer 80 may obtain a token from the token vault 82.

In step S148, after receiving the token request, the token vault 80 may supply the access token to the token service computer 80.

In step S150, after receiving the access token, the token service computer 80 may then provision the token and any other account information to the first application 20A.

In step S152, the token is stored in the mobile device 20 associated with the mobile application 20A. The user 10 may now use the mobile device 20 to provide the provisioned access token to a device operated by a resource provider to access a resource.

In some cases, the mobile device 20 is known to the token service computer 80. In this case, returning to step S110 and then proceeding to step S121, if the mobile device 20 is found in the database, then no account creation process is performed because an account with the digital wallet server computer 60 already exists. The token service computer 80 then retrieves the digital wallet ID associated with the digital wallet account from the database this information is returned to the first application 20A.

In step S120, a digital wallet login and passcode request are presented to the user 10 via the first application 204.

In step S122, after being prompted to do so, the user 10 then enters the user's digital wallet login information, and passcode or password into the mobile device 20.

In step S124, after the user 10 enters the correct login information and passcode or password into the mobile device 20, the mobile application 20A sends a request for a list of eligible accounts to the token service computer 80.

In step S126, the token service computer 80 passes the request on to the wallet server computer 60.

In step S128, the user's login, and passcode or password are validated by the wallet server computer 60 after the wallet server computer 60 receives this information. After the user's login and passcode are validated by the wallet server computer 60, it can return a list of available accounts to the first application 20A.

In step S130, the token service computer 80, then filters the accounts and then returns only eligible accounts for the type of first application being used. Some accounts may not be suitable for the type of first application 20A being used.

In step S132, the first application 20A on the mobile device 20 displays the list of eligible accounts for provisioning.

In step S134, the user selects an account from among the list of eligible accounts displayed by the first application 20A on the mobile device 20 to be provisioned.

In step S136, a decision is made by the first application 20A as to whether ID&V is required. Similar to the process in step S142 above, the risk of the provisioning process may require additional authentication data from the user 10 before any access data is provisioned to the mobile device 20.

In step S140, if necessary, an ID&V process is then performed by the first application 20A.

In step S138, if the ID&V process was successfully performed or if an ID&V process is not required, then the first application 20A may then send a request for token provisioning to the token service computer 80.

In step S140, the token service computer 80 checks the token provisioning request for any additional ID&V processing that might be required. The process then proceeds to step S142, which is described in detail above. Then, steps S144, S146, S148, S150, and S152 are performed as described above.

Once the mobile device 20 is provisioned with access data, it may be used to conduct an access transaction. FIG. 6 illustrates a system including a mobile device that is provisioned with access data and that can allow a user to access a location such as a building. FIG. 7 illustrates a payment processing system that includes a mobile device that is provisioned with access data and that allows a user to access an account to pay for a good or service at a merchant.

FIG. 6 shows a block diagram of a building access system. FIG. 6 shows a mobile device 110 operated by a user 206. The mobile device 110 has been provisioned with access data (e.g., an access token) as described above. The mobile device 110 can interact with the access device 120 and pass access data to the access device 120. The access device 120 may locally verify the received access data or it may communicate with a remotely located authentication server computer (not shown). The remotely located authentication server computer may verify that the access data is authentic and may transmit a signal indicating this back to the access device 120. The access device 120 may then proceed to let the user 206 enter the building 130.

FIG. 7 shows a block diagram of a transaction processing system that can use a mobile device 210 with access data such as an access token. FIG. 7 shows a user 206 that can operate a mobile device 210. The user 206 may use the mobile device 210 to pay for a good or service at a merchant. The merchant may operate a merchant computer 230 and/or an access device 220. The merchant may communicate with an issuer computer 260 via an acquirer computer 240 and a payment processing network 250.

The payment processing network 250 may include data processing subsystems, networks, and operations used to support and deliver authorization services, exception file services, and clearing and settlement services. An exemplary payment processing network may include VisaNet™. Payment processing networks such as VisaNet™ are able to process credit card transactions, debit card transactions, and other types of commercial transactions. VisaNet™, in particular, includes a VIP system (Visa Integrated Payments system) which processes authorization requests and a Base II system which performs clearing and settlement services. The payment processing network may use any suitable wired or wireless network, including the Internet.

A typical payment transaction flow using a mobile device 210 at an access device 220 (e.g. POS location) can be described as follows. A user 206 presents his or her mobile device 210 to an access device 220 to pay for an item or service. The mobile device 210 and the access device 220 interact such that access data from the mobile device 210 (e.g. PAN, a payment token, verification value(s), expiration date, etc.) is received by the access device 220 (e.g. via contact or contactless interface). The merchant computer 230 may then receive this information from the access device 220 via an external communication interface. The merchant computer 230 may then generate an authorization request message that includes the information received from the access device 220 (i.e. information corresponding to the mobile device 210) along with additional transaction information (e.g. a transaction amount, merchant specific information, etc.) and electronically transmits this information to an acquirer computer 240. The acquirer computer 240 may then receive, process, and forward the authorization request message to a payment processing network 250 for authorization.

The payment processing network 250 may determine that the access data is in the form of an access token rather than real account data. It may then communicate with the token service computer 80, which may resolve the access token by contacting the token vault 82. The token vault 82 may obtain the real account information (e.g., a real PAN) and then provide it to the token service computer 80, which may in turn provide it to the payment processing network 250. The payment processing network 250 may then modify the authorization request message so that it includes the real account information instead of the access token.

In general, prior to the occurrence of a credit or debit-card transaction, the payment processing network 250 has an established protocol with each issuer on how the issuer's transactions are to be authorized. In some cases, such as when the transaction amount is below a threshold value, the payment processing network 250 may be configured to authorize the transaction based on information that it has about the user's account without generating and transmitting an authorization request message to the issuer computer 260. In other cases, the payment processing network 250 may determine the issuer associated with the real account information, and forward the authorization request message for the transaction to the issuer computer 260 for verification and authorization. Once the transaction is authorized, the issuer computer 260 may generate an authorization response message (that may include an authorization code indicating the transaction is approved or declined) and transmit this electronic message via its external communication interface to payment processing network 250. The payment processing network 250 may then forward the authorization response message to the acquirer computer 240, which in turn may then transmit the electronic message to comprising the authorization indication to the merchant computer 230, and then to the access device 220.

In some embodiments, prior to forwarding the authorization response message from the payment processing network 250, the payment processing network 250 may use the real account information in the authorization response message and may use it to obtain the access token from the token vault 82 via the token service computer 80. The payment processing network 250 may then modify the authorization response message to include the access token and remove the real account information before sending it to the access device 220 via the acquirer computer 240 and the merchant computer 230.

At the end of the day or at some other suitable time interval, a clearing and settlement process between the merchant computer 230, the acquirer computer 240, the payment processing network 250, and the issuer computer 260 may be performed on the transaction.

A computer system may be used to implement any of the entities or components described above. The subsystems in the computer system may be interconnected via a system bus. Additional subsystems include a printer, keyboard, system memory, and monitor, which is coupled to display adapter. Peripherals and input/output (I/O) devices, which couple to the I/O controller. For example, the external interface can be used to connect the computer apparatus to a wide area network such as the Internet, a mouse input device, or a scanner, via an input/output port. The interconnection via system bus allows the central processor to communicate with each subsystem and to control the execution of instructions from system memory or the storage device(s), as well as the exchange of information between subsystems. The system memory and/or the storage device(s) may be embodied by a computer-readable medium.

Embodiments of the invention have a number of advantages. Embodiments of the invention allow for the automatic provisioning of an access token onto a computing device upon the creation of an account with an entity such as a mobile wallet server computer. This reduces the number of steps that would otherwise be required to provision an access token in a computing device.

It should be understood that the present invention as described above can be implemented in the form of control logic using computer software in a modular or integrated manner. Based on the disclosure and teachings provided herein, a person of ordinary skill in the art will know and appreciate other ways and/or methods to implement the present invention using hardware and a combination of hardware and software.

Any of the software components or functions described in this application may be implemented as software code to be executed by a processor using any suitable computer language such as, for example, Java, C++ or Perl using, for example, conventional or object-oriented techniques. The software code may be stored as a series of instructions, or commands on a computer-readable medium, such as a random access memory (RAM), a read-only memory (ROM), a magnetic medium such as a hard-drive or a floppy disk, or an optical medium such as a CD-ROM. Any such computer-readable medium may reside on or within a single computational apparatus, and may be present on or within different computational apparatuses within a system or network.

While certain exemplary embodiments have been described in detail and shown in the accompanying drawings, it is to be understood that such embodiments are merely illustrative of and not intended to be restrictive of the broad invention, and that this invention is not to be limited to the specific arrangements and constructions shown and described, since various other modifications may occur to those with ordinary skill in the art.

As used herein, the use of “a”, “an” or “the” is intended to mean “at least one”, unless specifically indicated to the contrary 

What is claimed is:
 1. A method comprising steps including: receiving, by a server computer from a computing device comprising an application, user information input into the computing device by a user of the computing device, and device information; determining, by the server computer, if the user information and the device information is already associated with an account by determining if the user information or the device information is stored in a database; after determining that the user information and the device information is not already associated with the account, causing, by the server computer, the application on the computing device to present an account creation query for an account; receiving, by the server computer via the application on the computing device, a request to create the account, the request including account information entered into the computing device by the user; initiating, by the server computer, the creation of the account; performing, by the server computer, a risk analysis on at least the account information and the device information to determine if a risk of provisioning access data to the computing device exceeds a predetermined threshold; determining, by the server computer, that the risk of provisioning the access data to the computing device does not exceed the predetermined threshold; and initiating, by the server computer, provisioning of the account with the access data automatically in response to the creation of the account, wherein the steps of initiating the creation of the account, and initiating provisioning of the account with the access data automatically in response to the creation of the account occur without additional user input, and wherein provisioning of the account with the access data comprises transmitting the access data to the computing device to store the access data on the computing device.
 2. The method of claim 1, wherein the account is unrelated to the application, and wherein the account and the application are associated with different entities.
 3. The method of claim 1, wherein the server computer is a token service computer.
 4. The method of claim 1, wherein the access data allows the user to enter a building.
 5. The method of claim 1, wherein the device information was automatically gathered without human intervention by a second application on the computing device.
 6. A server computer comprising: a processor; and a memory comprising a computer readable medium coupled to the processor, the computer readable medium comprising code, executable by the processor, for implementing a method comprising receiving, from a computing device comprising an application, user information input into the computing device by a user of the computing device, and device information; determining if the user information and the device information is already associated with an account by determining if the user information or the device information is stored in a database; after determining that the user information and the device information is not already associated with the account, causing the application on the computing device to present an account creation query for an account; receiving, via the application on the computing device, a request to create the account, the request including account information entered into the computing device by the user; initiating the creation of the account; performing a risk analysis on at least the account information and the device information to determine if a risk of provisioning access data to the computing device exceeds a predetermined threshold; determining that the risk of provisioning the access data to the computing device does not exceed the predetermined threshold; and initiating provisioning of the account with the access data automatically in response to the creation of the account, wherein the steps of initiating the creation of the account, and initiating provisioning of the account with the access data automatically in response to the creation of the account occur without additional user input, and wherein provisioning of the account with the access data comprises transmitting the access data to the computing device to store the access data on the computing device.
 7. The server computer of claim 6, wherein the account is unrelated to the application, and wherein the account and the application are associated with different entities.
 8. The server computer of claim 6, wherein the server computer is a token service computer.
 9. The server computer of claim 6, wherein the access data allows the user to enter a building.
 10. The server computer of claim 6, wherein the the device information was automatically gathered without human intervention by a second application on the computing device.
 11. A method comprising: providing, by a computing device comprising an application to a server computer, user information and device information, which causes the server computer to determine if the user information and the device information is already associated with an account by determining if the user information or the device information is stored in a database; receiving, by the application in the computing device, an account creation query; in response to receiving the account creation query, transmitting, by the computing device to the server computer, an account creation request comprising account information to the server computer, which causes the server computer to perform a risk analysis on at least the account information and the device information to determine if a risk of provisioning access data to the computing device exceeds a predetermined threshold, and determine that the risk of provisioning the access data to the computing device does not exceed the predetermined threshold, and wherein an account is created thereafter and the server computer then automatically transmits and provisions the access data to the computing device in response to the creation of the account without additional user input; and receiving and storing, by the computing device, the access data associated with the account in the computing device.
 12. The method of claim 11, further comprising: gathering, by a second application on the computing device, the device information about the device without user interaction.
 13. The method of claim 11, wherein the computing device is a mobile device, and the device information comprises a secure element identifier, a phone number, an IMEI number, an IMSI number, a SIM card number, or a device serial number.
 14. The method of claim 11, wherein the access data is used to access a building.
 15. The method of claim 11, wherein the application performs an identity and verification process before receiving the access data.
 16. The method of claim 11, further comprising: providing, by the computing device, the access data to an access device, which transmits an authorization request message including the access data to an issuer computer via an acquirer computer and a payment processing network.
 17. A computing device comprising: a processor; and a memory comprising a computer readable medium coupled to the processor, the computer readable medium comprising an application and comprising code, executable by the processor, for implementing a method comprising providing to a server computer, user information and device information, which causes the server computer to determine if the user information and the device information is already associated with an account by determining if the user information or the device information is stored in a database; receiving, by the application, an account creation query; in response to receiving the account creation query, transmitting, to the server computer, an account creation request comprising account information to the server computer, which causes the server computer to perform a risk analysis on at least the account information and the device information to determine if a risk of provisioning access data to the computing device exceeds a predetermined threshold, and determine that the risk of provisioning the access data to the computing device does not exceed the predetermined threshold, and wherein an account is created thereafter and the server computer then automatically transmits and provisions the access data to the computing device in response to the creation of the account without additional user input; and receiving and storing the access data associated with the account in the computing device.
 18. The computing device of claim 17, wherein the method further comprises: gathering, by a second application on the computing device, the device information about the device without user interaction.
 19. The computing device of claim 17, wherein the access data comprises a payment token that is a substitute for a credit or debit card account number that is issued by an issuer, the application being an issuer application associated with the issuer.
 20. The computing device of claim 17, wherein the computing device is a mobile phone. 