System and method for providing signal compatability

ABSTRACT

The present disclosure provides methods and systems for transforming characters stored in a fixed format into an alternate format or template with which the fixed format would otherwise be incompatible. In particular, methods and systems are disclosed for reading a customer identification (CID) number from a radio frequency identification device (RFID) and processing the CID number into a format that is compatible with an otherwise incompatible standard, template, sequence, or combination thereof.

The present invention claims priority to U.S. Provisional ApplicationNo. 60/492,982, filed Aug. 7, 2003, the contents of which areincorporated herein by reference in their entirety.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present disclosure provides methods and systems for transformingcharacters stored in a fixed format into an alternate format or templatewith which the fixed format would otherwise be incompatible. Inparticular, methods and systems are disclosed for reading a customeridentification (CID) number from a radio frequency identification device(RFID) and processing the CID number into a format that is compatiblewith an otherwise incompatible standard, template, sequence, orcombination thereof.

2. Description of Related Art

The traditional credit card comprises a magnetic stripe on the back ofthe credit card. This magnetic stripe generally contains three “tracks”of data and information that are stored in the magnetic stripe. Eachtrack is 0.110 inches wide. The standard format for the data in themagnetic stripe is detailed in sources such as International StandardISO/IEC 7813, 5^(th) ed., 2001-05-01 (Reference No. ISO/IEC7813:2001(E)).

With reference to FIG. 1, track 1 is a “track” of information on acredit card magstripe that has a 79 six-bit plus parity bit read onlycharacters. Normally, a primary account number (up to 19characters—designated on FIG. 1 as data A), a country code (3characters) and a name (2-26 characters) (collectively, data B), and anexpiration date (4 characters) and discretionary data (collectively,data C) are contained on track 1. Track 2 is typically a “track” ofinformation on a credit card magstripe that has a 40 four-bit plusparity bit characters. Normally, a primary account number (up to 19characters—data D), a country code (3 characters), an expiration date (4characters) and discretionary data (collectively, data E) are containedon track 2. Track 3 is a “track” of information on a credit cardmagstripe that has a 107 four-bit plus parity bit characters. Normally,track 3 is a read/write track that can include an encrypted personalidentification number (PIN), country code, currency units, authorizedamount and additional information (arranged in some fashion as data Fand data G). Typically, credit card processing uses only tracks 1 and 2as the usage of track 3 has not been standardized in the credit cardindustry. In addition, each track may also contain start sentinels (SS)and end sentinels (ES), format codes (FC), field separators (FS), andlongitudinal redundancy check (LRC) characters.

The above described magnetic stripe technology is well known in thecurrent art and publications. For example, in addition to the aboveISO/IEC standard, the website accessible athttp://www.howstuffworks.com/question503.htm, presents an overview ofmagnetic stripe technology and the track 1 and track 2 standards andsequences.

When a credit card is used as payment by a consumer to a merchant, thecredit card is passed through a device (a reader) that reads themagnetic stripe on a credit card for account information toautomatically be processed for a transaction. Typically, a credit cardreader is either integrated into a register, attached onto a register asa separate component or is part of a stand-alone terminal dedicated forthe function of processing credit card transactions.

Contactless cards, key fobs, and other form factors, have been shown tobe preferred over the normal magnetic stripe cards. First, contactlessdevices are more resistant to wear-and-tear due to use and are notsubject to magnetic interference of the stored information. Second, someare of the opinion that contactless devices are less likely to bemis-read. Third, contactless devices are, or at least are perceived bythe consumer to be, faster than a normal magnetic stripe transaction.Finally, in general, a consumer can perform the contactless devicetransaction themselves, thus eliminating giving possession of theircredit card to a merchant employee.

Contactless cards have recently been introduced by several credit cardissuers for use by consumers. These contactless credit cards generallycontain an on-card circuit chip and a magnetic stripe. The chip containstrack 1 and track 2 data that is virtually identical to the data on themagnetic stripe (i.e., cardholder name, card number, expiration date,etc.). Typically, a radio frequency-based reader that is capable ofreading the chip is attached to an existing, already-in-use magneticstripe reader that is associated with a point of sale (POS) terminal orsystem. The radio frequency-based reader reads the track 1 and track 2magnetic stripe data from the chip and communicates the data to the POSterminal. Typically, the track 1 and track 2 data stored on the chip isin the same format and sequence as track 1 and track 2 data stored on amagnetic stripe. Therefore, the POS terminal is able to process the dataas it would a traditional magnetic stripe credit card transaction.Accordingly, other than the addition of a radio frequency-based reader,minimal changes may be required to the POS terminal or system in orderfor the contactless credit card to be utilized with the existing,already-in-use POS terminal or system.

Despite providing the above-mentioned benefits and advantages of acontactless transactions, these contactless credit cards have severaldisadvantages. For example, if the card is lost or stolen, the card mustbe replaced and the consumer is unable to utilize the card as a paymentform until the card is replaced. Likewise, if the expiration date of thecard expires, the entire card must be replaced and the consumer isunable to utilize the card until a replacement card is obtained.

The contactless credit card is also typically associated with a singlemethod of payment. For example, a consumer may have a contactless creditcard corresponding to a single account and serviced by a single creditprocessing network. Typically, such a contactless credit card can onlybe used in the corresponding credit processing network.

Contactless credit cards can also present security concerns. Forexample, if the chip embedded in the credit card is removed from thecredit card by a thief, the chip may be used in fraudulent contactlesscredit card transactions by the thief. Further, in systems where theactual credit card number is transmitted wirelessly (in magstripeformat) to the reader and utilized for the transaction, the credit cardnumber could be intercepted by a thief and used in unauthorizedtransactions.

SUMMARY OF THE INVENTION

A number of these disadvantages and problems are mitigated by atransponder-based transaction system that associates information storedon the transponder with a method of payment. An example of such a systemis the Speedpass® system, embodiments of which are disclosed in U.S.application Ser. No. 10/407,363, filed Apr. 4, 2004, U.S. applicationSer. No. 10/083,249, filed Feb. 27, 2002 and U.S. application Ser. No.09/505,721, filed Feb. 17, 2000 which are herein incorporated byreference.

The herein disclosed systems and methods provide several advantages overthe current and known transaction systems and solves the problemsdiscussed above by, among other things, reading a CID code, that is notin track 1-3 format, from an RFID, converting the CID code into a track1-3 format, and communicating the converted CID code to the POS terminalor system. In this manner, a consumer may employ a credit card basedtransaction that utilizes a CID code that is associated with theircredit card number stored in a database, generally a remote database asdescribed below. However, the actual credit card number is nevertransmitted in the “open” (and, therefore, is not capable of beingintercepted by a thief).

Conversion of the CID code may be accomplished in any suitable manner.For example, all or parts of the herein described processing may beaccomplished by processor(s) running program(s) resident at the reader,the POS terminal or system, a remotely located host processor system orsome other processor device.

Another advantage is that the transponder and corresponding CID code arenot locked to a specific method of payment. Therefore, if a consumer hasa particular credit card associated with their transponder andcorresponding customer identification code, and this particular creditcard is lost, stolen, or expires, the consumer merely has to associateanother method of payment with their transponder and the consumer maycontinue to utilize the transponder without waiting for the transponderto be replaced.

In addition, the consumer may link more than one source of payment to atransponder and corresponding CID code. For example, a consumer mayspecify that food purchased with the transponder is to be paid viaelectronic funds transfer (EFT) from a bank account and that gasolinepurchased with the transponder is to be paid via an oil company (e.g.,proprietary) credit card and that merchandise purchased at a departmentstore is to be paid, first via loyalty program reward points, and thebalance via credit card. Of course, other variations are also possible.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is an exemplary schematic representation of the informationtracks on a magnetic stripe in accordance with the prior art.

FIG. 2 is a schematic representation of some system components inaccordance with some disclosed embodiments.

FIG. 3 is a schematic representation of some processor modules inaccordance with some disclosed embodiments.

DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS

The detailed description that follows is represented largely in terms ofprocesses and symbolic representations of operations performed byconventional computer components, including central processing units(CPU), memory storage devices for the CPU, and connected input anddisplay devices. These operations include the manipulation of data bitsby the CPU and the maintenance of these bits within data structuresresiding in one or more of the memory storage devices. Such datastructures impose a physical organization upon the collection of databits stored within computer memory and represent specific electrical ormagnetic elements. These symbolic representations are the means used bythose skilled in the art of computer programming and computerconstruction to most effectively convey teachings and discoveries toothers skilled in the art.

For the purposes of this discussion, a process is generally conceived tobe a sequence of processor or computer-executable steps leading to adesired result. These steps generally require physical manipulations ofphysical quantities. Usually, though not necessarily, these quantitiestake the form of electrical, magnetic, or optical signals capable ofbeing stored, transferred, combined, compared, or otherwise manipulated.It is convention for those skilled in the art to refer to these signalsas bits, values, elements, symbols, characters, terms, objects, numbers,records, files or the like. It should be kept in mind, however, thatthese and similar terms should be associated with appropriate physicalquantities for computer operations, and that these terms are merelyconventional labels applied to physical quantities that exist within andduring operation of the computer.

It should also be understood that manipulations within the computer areoften referred to in terms such as adding, comparing, moving, etc.,which are often associated with manual operations performed by a humanoperator. It is understood that no such involvement of a human operatoris necessary or even desirable in the present invention. The operationsdescribed herein are machine operations performed in conjunction withhuman operator(s) or user(s) who interact with the computer(s). Themachines used for performing the operation of the present inventioninclude general digital computers or other similar processing devices.

In addition, it should be understood that the programs, processes,methods, etc., described herein are not related or limited to anyparticular computer or apparatus. Rather, various types of generalpurpose machines may be used with programs constructed in accordancewith the teachings described herein. Similarly, it may proveadvantageous to construct specialized apparatus to perform the methodsdescribed herein by way of dedicated computer systems with hard-wiredlogic or programs stored in nonvolatile memory, such as read onlymemory.

The operating environment in which the present invention is used mayencompass general distributed computing systems wherein general purposecomputers, workstations, personal computers, special purpose computers,POS devices, card readers, etc., are connected via communication linksof various types. In embodiments employing a client-server arrangement,programs and data, many in the form of objects, are made available byvarious members of the system.

FIG. 2 is a schematic representation of some system components inaccordance with some disclosed embodiments. As shown in FIG. 2, atransponder 10 may be used to transmit an RF signal that comprises aCID. The RF signal may be received by an appropriate receiver 20. Aprocessing device (e.g., CPU) 30 may process the received signal todetermine, among other things, the CID. Processor 30 may also comprisethe routines to convert the CID into appropriate Track 1, 2 and 3formats as described below. While receiver 20 and processor 30 are shownas separate items in FIG. 2, other configurations are possible. Forexample, receiver 20 and processor 30 may both comprise parts of asingle POS terminal or system, or receiver 20 and processor 30 may bediscrete devices that communicate with a POS terminal or system, or someother combination.

Processor 30 may also communicate with one or more networks 50. Inaddition, processor 30 may communicate with payment processing system40. This communication may be direct (e.g., through a wired connection)or indirect (e.g., through a network). In addition, payment processingsystem 40 may include a host processor or similar device that enablesvarious functionalities. For example, consumer payment preferences,account numbers, or other parameters may be stored at a remote hostprocessor.

FIG. 3 is a schematic representation of some processor modules inaccordance with some disclosed embodiments. As shown in FIG. 3,processor 30 may comprise several modules to carry out variousprocesses. The modules may comprise software routines (e.g., programs),firmware routines, hardware components, or any other acceptablemechanism for performing processor based operations. In addition, whileFIG. 3 shows a number of modules within processor 30, it is understoodthat all or parts of the modules may be distributed over other networkedresources.

In some embodiments, processor 30 may comprise an RFID module 100, aconversion module 200, a communication module 300 and other modules 400.RFID module 100 may comprise the process instructions to process thereceived RF signal and extract the CID code and security data.Conversion module 200 may comprise the process instructions to convertthe CID information to the appropriate magstripe track format asdescribed below. Communication module 300 may comprise the processinstructions to enable communication of the magstripe track formattedCID information to the POS terminal or system, host processor or paymentprocessing network 40. Of course, processor 30 may also comprise othermodules 400 for carrying out other processes.

One embodiment comprises taking unique CID codes stored in a transponder10 and associated security data and converting them, via conversionmodule 200, into standard magnetic credit card track data format (e.g.,as described in ISO 7813) for passing with transactions through existingPOS systems, their host processors and associated processing networksusing an intelligent reader device (e.g., processor 30) attached to thePOS terminal or system or otherwise in communication with the paymentprocessing network 40.

The converted CID and security data is communicated to the POS terminalor system or payment processing network 40 in the appropriate accountnumber and discretionary data fields format for tracks 1 and 2. In someembodiments, processor 30 (via conversion module 200) may insert a BankIdentification Number (BIN) which is not part of the transponder 10provided data. This BIN may be inserted in the account number fieldtrack data format to allow proper routing. In another embodiment, theBIN may be assigned to the issuer of the transponder or one allocated tothe issuer by another third party network. BINs may be stored locally orremotely (e.g., in a host processor).

In another embodiment, transponder 10 CID numbers may consist of 11 to20 digits. Optionally, conversion module 200 converts the data to theappropriate magstripe track format by splitting it between the accountnumber (e.g., data A and data D) and the discretionary portions of thetrack data (e.g., data C and data E). In some embodiments, processor 30may provide a check digit for the account number (e.g., a known checksumor other validity checking technique), an acceptable expiration date(e.g., a valid YYMM format, such as, MM is a value from 01 to 12) andservice code data to facilitate common edits. In some embodiments, thesecommon edits are those already in place in most POS systems andassociated payment processing networks 40.

In another embodiment, the name field format (e.g., data B) for track 1is used for including additional security or application data.Optionally, the security data utilizes an algorithm or encryption systemto ensure device integrity. For example, in some embodiments, thesecurity algorithm comprises a proprietary Texas Instrument DigitalSignature Transponder algorithm. In most cases, the longer the BIN, themore the transponder 10 CID code is shifted into the discretionary datafield (data C and data E) and the more compact the security databecomes. In another embodiment, the track 1 format is utilized and theequivalent track 2 data is included in addition to utilizing thestandard 26 character “name” field for additional security and/orapplication data.

The following examples are provided to facilitate understanding of theconversion of CID information. In one example, transponder 10 CID codeis eleven digits long and comprises the numeric string: 22222222222. Thesecurity and/or other application data is sixteen digits long andcomprises the numeric string: 3333333333333333. The BIN is four digitslong and comprises the numeric string: 1111. Once the RF signal isreceived and processed, as discussed above, conversion of the aboveinformation into appropriate magstripe format may result in acommunicated account number (data A and data D) of 1111222222222220(wherein the last digit of “0” comprises the check digit). The resultingdiscretionary data (data C and data E) comprises: YYMM3333333333333333.Thus, in this example, conversion module 200 converted the eleven digitsof the CID code and the four digits of the BIN into a sixteen digitaccount number format (data A and data D). As shown above, theconversion may include steps to insure that the first digits of theaccount number format include the BIN, that the sixteenth digit equals acheck sum digit for the account number (according to a predeterminedcheck sum routine) and that the YYMM digits are a valid date (e.g., YYhas not elapsed and MM is 01 to 12). This magstripe formatted string(including appropriate start and end sentinel, LRC and separator bits)may be communicated (e.g., via communication module 300), ultimately, topayment processing network 40 for appropriate handling in the samemanner as a “swiped” magnetic stripe transaction.

In another example, transponder 10 CID code is eleven digits long andcomprises the numeric string: 22222222222. The security and/or otherapplication data is twelve digits long and comprises the numeric string:333333333333. The BIN is eight digits long and comprises the numericstring: 11111111. Once the RF signal is received and processed, asdiscussed above, conversion of the above information into appropriatemagstripe format may result in a communicated account number (data A anddata D) of 1111111122222226 (wherein the last digit of “6” comprises thecheck digit). The resulting discretionary data (data C or data E)comprises: YYMM2222333333333333. Thus, in this example, conversionmodule 200 converted the seven of eleven digits of the CID code and theeight digits of the BIN into a fifteen digit account number plus thecheck digit format (data A and data D), with the remaining four digitsof the CID code shifted into the discretionary data (data C or data E).As shown above, the conversion may include steps to insure that thefirst digits of the account number format include the BIN, that the lastdigit equals a check sum digit for the account number (according to apredetermined check sum routine) and that the YYMM digits are a validdate (e.g., YY has not elapsed and MM is 01 to 12). The digits in thediscretionary data may be rearranged or modified to accommodate anyspecific POS edits encountered (e.g. expecting a specific service codefollowing the expiration date, etc.).

As demonstrated by the above examples, the conversion module 200 mayappropriately format the CID code and other information (e.g., securitydata, BIN, etc.) into the corresponding magstripe track format (e.g.,track 1 or track 2 format). As also demonstrated above, the conversionmay depend upon the number of characters present in the CID, BIN,security data and other factors (e.g., are first 4 digits of data C anddata E in valid YYMM format, etc.). This magstripe formatted data maythen be communicated to the POS terminal or system (or to the paymentprocessing network 40) for appropriate handling.

While the above description has been primarily limited to credit cards,the claimed invention is not so limited. Any type of magstripeformatting may be implemented be it for credit cards, debit cards,combination credit/debit cards, or the like. Of course, different typesof cards may require additional or fewer processing steps to accomplishconversion to the appropriate format. For example, debit cards mayrequire additional processing steps to incorporate a PIN or othersecurity mechanism.

Therefore, while the description herein is phrased in terms of a genericCID code, it is to be understood that the transponder 10 could transmitan encrypted credit card or debit card track 1, 2, and 3 data that wasgenerated using a number of possible encryption techniques (e.g., RC2,RC4, DES, 3DES, Blowfish, AES, Public Key, etc.). The conversion processdescribed in turn would decrypt the track 1,2, and 3 card informationand convert it into a standard format as found on the magnetic stripeitself. As such, encryption-decryption techniques may be used to maskthis, and other, signals without departing from the claimed systems andmethods. Likewise, other signal processing techniques, such as errorcheck, may be incorporated into the disclosed systems and methods.

Similarly, while the above examples demonstrate conversion of a CIDcode, the claimed invention is not so limited. Transponder 10 maytransmit various types of unique information for conversion to magstripeformat. For example, the unique information may comprise a CID code, acredit card number encrypted using a number of possible encryptiontechniques (e.g., RC2, RC4, DES, 3DES, Blowfish, AES, Public Key, etc.),or some other unique identifier that is subsequently converted tomagstripe format in a manner similar to that described above.

Although the present invention has been described in terms of particularembodiments, it is not limited to these embodiments. Alternativeembodiments and modifications which would still be encompassed by theinvention may be made by those skilled in the art, particularly in lightof the foregoing teachings. Therefore, this invention is defined by thefollowing claims and is intended to cover any alternative embodiments,modifications or equivalents which may be within the spirit and scope ofthe claimed invention.

1. A system for processing a contactless transaction, the systemcomprising: a receiver for receiving a radio frequency identification(RFID) signal; a processor for determining customer identification (CID)information from the received RFID signal; a conversion module forconverting the CID information into a magnetic stripe track format; anda communication module for communicating the converted CID informationin the magnetic stripe track format to a payment processing network. 2.The system of claim 1, wherein the RFID signal does not include a creditcard account number.
 3. The system of claim 1 wherein the conversionmodule converts the CID information into credit card track 1 magneticstripe format.
 4. The system of claim 1 wherein the conversion moduleconverts the CID information into credit card track 2 magnetic stripeformat.
 5. The system of claim 1 wherein the conversion module convertsthe CID information into credit card track 3 magnetic stripe format. 6.The system of claim 1 wherein the conversion module converts the CIDinformation by compiling additional information with the CIDinformation.
 7. The system of claim 6 wherein the additional informationis a Bank Identification Number (BIN).
 8. The system of claim 6 whereinthe additional information is security information.
 9. The system ofclaim 1 wherein the conversion module converts the CID information byincluding a check digit.
 10. A method for processing a contactlesstransaction the method comprising: receiving a radio frequencyidentification (RFID) signal; determining customer identification (CID)information from the received RFID signal; converting the CIDinformation into a magnetic stripe track format; and communicating theconverted CID information in the magnetic stripe track format to apayment processing network .
 11. The method of claim 10, wherein theRFID signal does not include a credit card account number.
 12. Themethod of claim 10 wherein the conversion of the CID information is aconversion into credit card track 1 magnetic stripe format.
 13. Themethod of claim 10 wherein the conversion of the CID information is aconversion into credit card track 2 magnetic stripe format.
 14. Themethod of claim 10 wherein the conversion of the CID information is aconversion into credit card track 3 magnetic stripe format.
 15. Themethod of claim 10 wherein the conversion of the CID information furthercomprises compiling additional information with the CID information. 16.The method of claim 15 wherein the additional information is a BankIdentification Number (BIN).
 17. The method of claim 15 wherein theadditional information is security information.
 18. The method of claim10 wherein the conversion of the CID information further comprisesincluding a check digit.
 19. A method for processing a contactlesstransaction the method comprising: receiving a radio frequencyidentification (RFID) signal; determining unique information from thereceived RFID signal; converting the unique information into a magneticstripe track format; and communicating the converted unique informationin the magnetic stripe track format to a payment processing network. 20.The method of claim 19 wherein the converted unique informationcomprises a credit card number.
 21. The method of claim 19 wherein theconverted unique information comprises a debit card number.
 22. Themethod of claim 19 wherein the converted unique information comprises aBank Identification Number (BIN).
 23. A system for processing acontactless transaction the system comprising: a receiver for receivinga radio frequency identification (RFID) signal; a processor fordetermining unique information from the received RFID signal; aconversion module for converting the unique information into a magneticstripe track format; and a communication module for communicating theconverted unique information in the magnetic stripe track format to apayment processing network.