Secure payment processing using authorization request

ABSTRACT

A payment system that uses replacement account identifiers is disclosed. An encrypted primary account number (PAN) may be received by a secure computer from a data entry device. The encrypted PAN may be decrypted by the secure computer and the secure computer may transmit a zero, nominal or no dollar authorization request to an issuer. Using the zero, nominal or no dollar authorization request, the issuer may verify the account. If the account is verified, then a replacement account identifier can be issued at a later time. The replacement account identifier may be used instead of the actual PAN to conduct payment transactions.

CROSS-REFERENCES TO RELATED APPLICATIONS

None.

BACKGROUND

Conventional systems and methods for generating replacement accountnumbers generally include sending an original account number from arequestor computer to a central host computer. The central host computercan then provide the replacement account number to the requestercomputer. The requestor computer can then use that replacement accountnumber in a payment transaction instead of the original account number.

Systems and methods that use replacement account numbers instead oforiginal account numbers are outside the scope of PCI (payment cardindustry) requirements, because the original account numbers are not atrisk of being obtained by unauthorized persons. Since the methods andsystems are outside the scope of PCI requirements, the methods andsystems need not implement the stringent security protocols required byPCI.

While conventional systems and methods that use replacement accountnumbers are useful, a number of improvements can be made. For example,one problem with issuing replacement account numbers is that they cansometimes be issued even though the accounts associated with the accountnumbers used in the replacement account number requests may not be ingood standing. This can impose a significant risk to various entities(e.g., issuers) who manage the accounts, or who might otherwise use theaccounts to conduct payment transactions.

Embodiments of the invention address this and other problems,individually and collectively.

BRIEF SUMMARY

Embodiments of the present invention relate to systems and methods forproviding better data and transaction security when processing paymenttransactions.

One embodiment of the invention is directed to a method. The methodincludes receiving, by a management computer, an authorizationidentifier. The authorization identifier is generated by anauthorization computer after the authorization computer receives anauthorization request message comprising an original account identifier(e.g., a PAN or primary account number) and a zero, nominal, or nodollar amount. The method also includes generating a replacement accountidentifier request message and sending the replacement accountidentifier request message to a payment processing computer. The methodalso includes receiving, by the management computer, in response totransmitting the replacement account identifier request message, areplacement account identifier response message comprising thereplacement account identifier. The replacement account identifier canthen be used to conduct payment transactions instead of the originalaccount identifier.

Another embodiment of the invention is directed to a management computercomprising a processor and a computer readable medium coupled to theprocessor. The computer readable medium comprises code, executable bythe processor to implement a method. The method comprises receiving anauthorization identifier. The authorization identifier is generated byan authorization computer after the authorization computer receives anauthorization request message comprising an original account identifierand a zero, nominal or no dollar amount. The method also includesgenerating a replacement account identifier request message, andtransmitting the replacement account identifier request message to apayment processing computer. The method further comprises receiving, inresponse to transmitting the replacement account identifier requestmessage, a replacement account identifier response message comprisingthe replacement account identifier. The replacement account identifiermay thereafter be used to conduct payment transactions instead of theoriginal account identifier.

Another embodiment of the invention is directed to a system comprising alocal workstation and a management computer in communication with thelocal workstation. The management computer comprises a processor and acomputer readable medium coupled to the processor. The computer readablemedium comprises code, executable by the processor to implement amethod. The method includes receiving an authorization identifier fromthe workstation. The authorization identifier is generated by anauthorization computer after the authorization computer receives anauthorization request message comprising an original account identifierand a zero, nominal or no dollar amount. The method also includesgenerating a replacement account identifier request message,transmitting the replacement account identifier request message to apayment processing computer, and receiving, in response to transmittingthe replacement account identifier request message, a replacementaccount identifier response message comprising the replacement accountidentifier. The replacement account identifier may be used instead ofthe original account identifier to conduct transactions.

These and other embodiments of the invention are described in furtherdetail below.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows a block diagram of a system according to an embodiment ofthe invention.

FIG. 2A is a block diagram showing components of a data entry deviceaccording to an embodiment of the invention.

FIG. 2B is a block diagram showing components of a workstation accordingto an embodiment of the invention.

FIG. 2C is a block diagram showing components of an order managementcomputer according to an embodiment of the invention.

FIG. 2D is a block diagram showing components of a payment processingcomputer according to an embodiment of the invention.

FIG. 3 is a flowchart illustrating methods according to embodiments ofthe invention.

FIG. 4 is a block diagram of a computer apparatus.

DETAILED DESCRIPTION

One embodiment of the invention is directed to a method that includesreceiving, by a workstation and from a data entry device in a merchantsystem, an encrypted payment account identifier. Prior to receipt by theworkstation, the encrypted payment account identifier was formed byencrypting an original account identifier at the data entry device.

The workstation may generate an authorization request message comprisingan original account identifier and a zero, nominal or no dollar amount,and may transmit it to a payment processing computer. A “zero” dollarauthorization request message is an authorization request message thathas a zero in the amount data field. An authorization request messagewith a “no dollar” amount means that there is no dollar value in theamount data field in the authorization request message. A “nominal”dollar amount can relate to an amount that is not indicative of a normaltransaction in the environment in which transactions are normallyconducted by the merchant system. As such, the nominal dollar amountcannot be mistaken for a real transaction amount that might be processedby the merchant system. For example, if a cable TV provider sends alwayssends transaction amounts greater than $10, then any amount less thanthis may be a nominal dollar amount. Typically, a nominal dollar amountmight be $1 or $0.01 (or any suitable value less than $2 or $1).

The authorization request message comprising the encrypted paymentaccount identifier may then be transmitted to a payment processingcomputer. The payment processing computer then decrypts the encryptedpayment account identifier to obtain the original unencrypted paymentaccount identifier. After the payment processing computer obtains theunencrypted payment account identifier, it may generate an authorizationrequest message comprising an original account identifier and the zero,nominal or no dollar amount.

In some embodiments, the payment processing computer may then transmitthe authorization request message to an issuer computer via an acquirercomputer and a payment processing network. The issuer computer mayverify that the account exists and is otherwise in good standing. Oncethe account has been verified by the issuer computer, the issuercomputer may transmit an authorization response message comprising anauthorization identifier to the payment processing computer. Theauthorization identifier may then be provided to the workstation, andthe workstation may provide it to an order management computer.

After the order management computer receives the authorizationidentifier, it may generate a replacement account identifier requestmessage and transmit it to the payment processing computer. The paymentprocessing computer may determine a replacement account identifier inresponse to receiving the authorization identifier. Once it isdetermined, the payment processing computer may then transmit it to theorder management computer. The order management computer may thenreceive a replacement account identifier response message comprising areplacement account identifier for the original account identifier.

The replacement account identifier may be stored at the order managementcomputer to conduct recurring or non-recurring payment transactions. Forexample, in some embodiments, the order management computer mayperiodically send requests including the replacement account identifiersand transaction amounts to the payment processing computer to obtainauthorizations for the recurring transactions.

In a specific transaction, the payment processing computer may receivean authorization request message comprising the replacement accountidentifier and a transaction amount from the order management computer.It may then generate a modified authorization request message includingthe original account identifier and the transaction amount. It may thentransmit it to the issuer computer via an acquirer computer and apayment processing network. The issuer may then respond to theauthorization request message by transmitting an authorization responsemessage back to the payment processing computer via the paymentprocessing network and the acquirer computer.

At the end of the day or at some other suitable period of time, aclearing and settlement process between the payment processing network,the acquirer computer, and the issuer computer may take place.

As noted above, in embodiments of the invention, the original accountidentifier is not maintained by the order management computer. Theoriginal account identifier only passes through an original data entrydevice and local workstation one time, in an encrypted format. Only thereplacement account identifier is used thereafter. Further, before thereplacement account identifier is actually used for purchasing, theaccount associated with the original account identifier is verified. Theverification of the status of the account can advantageously be obtainedusing a traditional credit and debit card payments infrastructure,before any replacement account identifiers are issued and used forpayment transactions.

Before discussing specific embodiments of the invention, some terms maybe discussed in further detail.

“Payment account information” may be any information that identifies oris associated with a payment account. Payment account information may beprovided in order to make a payment from a payment account. Someexamples of payment account information include one or more of a PAN(primary account number), a CVV (card verification value), a dCVV(dynamic card verification value), a user name, an expiration date, agift card number or code, etc.

An “original account identifier” may include a transactable identifierassociated with a payment account that directly represents the paymentaccount. For example, an original account identifier may be a primaryaccount number (PAN) issued by an issuer for a card account (e.g.,credit card, debit card, etc.). For instance, in some embodiments, anoriginal account identifier may include a sixteen digit numerical valuesuch as “4147 0900 0000 1234.” The first six digits of the real accountidentifier (e.g., “414709”), may represent a real issuer identifier(e.g., a “BIN” or bank identification number) that may identify anissuer associated with the real account identifier.

A “replacement account identifier” may include an identifier for apayment account that is a substitute for an account identifier, such asan original account identifier or a primary account number (PAN). Thereplacement account identifier may have the same or different format asthe primary account number. In some embodiments, the replacement accountidentifier may be a subscription ID, when the replacement accountidentifier is to be used for recurring payment transactions (as in thecase of a subscription that utilizes a recurring payment authorizationto maintain the subscription). In other embodiments, the replacementaccount identifier may include a series of alphanumeric characters thatmay be used as a substitute for an original account identifier. Forexample, a replacement account identifier “4900 0000 0000 0001” may beused in place of a PAN “4147 0900 0000 1234.” In some embodiments, areplacement account identifier may be “format preserving” and may have anumeric format that conforms to the account identifiers used in existingpayment processing networks (e.g., ISO 8583 financial transactionmessage format). In some embodiments, a replacement account identifiermay be used in place of a PAN to initiate, authorize, settle or resolvea payment transaction or represent the original credential in othersystems where the original credential would typically be provided. Insome embodiments, a replacement account identifier value may begenerated such that the recovery of the original PAN or other accountidentifier from the replacement account identifier value may not becomputationally derived. Further, in some embodiments, the replacementaccount identifier format may be configured to allow the entityreceiving the replacement account identifier to identify it as areplacement account identifier and recognize the entity that issued thereplacement account identifier.

An “authorization request message” may be an electronic message that issent to request authorization for a transaction. The authorizationrequest message can be sent to a payment processing network and/or anissuer of a payment card. An authorization request message according tosome embodiments may comply with ISO 8583, which is a standard forsystems that exchange electronic transaction information associated witha payment made by a user using a payment device or payment account. Theauthorization request message may include information that can be usedto identify an account. An authorization request message may alsocomprise additional data elements such as one or more of a service code,an expiration date, etc. An authorization request message may alsocomprise transaction information, such as any information associatedwith a current transaction, such as the transaction amount, merchantidentifier, merchant location, etc., as well as any other informationthat may be utilized in determining whether to identify and/or authorizea transaction. The authorization request message may also include otherinformation such as information that identifies the access device (orother computer) that generated the authorization request message,information about the location of the access device, etc.

An “authorization response message” may be an electronic message replyto an authorization request message. The authorization response messagecan be generated by an issuing financial institution or a paymentprocessing network. The authorization response message may include, byway of example only, one or more of the following status indicators:Approval—transaction was approved; Decline—transaction was not approved;or Call Center—response pending more information, merchant must call thetoll-free authorization phone number. The authorization response messagemay also include an authorization code, which may be a code that acredit card issuing bank returns in response to an authorization requestmessage in an electronic message (either directly or through the paymentprocessing network) to the merchant computer that indicates approval ofthe transaction. The code may serve as proof of authorization. As notedabove, in some embodiments, a payment processing network may generate orforward the authorization response message to the merchant.

A “key” may refer to a piece of information that is used in acryptographic algorithm to transform input data into anotherrepresentation. A cryptographic algorithm can be an encryption algorithmthat transforms original data into an alternate representation, or adecryption algorithm that transforms encrypted information back to theoriginal data. Examples of cryptographic algorithms may include tripledata encryption standard (TDES), data encryption standard (DES),advanced encryption standard (AES), etc.

An “issuer” may typically refer to a business entity (e.g., a bank) thatmaintains an account for a user that is associated with a portablecommunication device such as an account enrolled in a mobile applicationinstalled on a portable communication device. An issuer may also issueaccount parameters associated with the account to a portablecommunication device. An issuer may be associated with a host systemthat performs some or all of the functions of the issuer on behalf ofthe issuer.

An “authorization computer” may include any suitable computer that canperform authorization processing. For example, an issuer computer is anexample of an authorization computer. The issuer computer may authorizetransactions by analyzing data in authorization request messages.

A “merchant” may typically be an entity that engages in transactions andcan sell goods or services, or provide access to goods or services.

An “acquirer” may typically be a business entity (e.g., a commercialbank) that has a business relationship with a particular merchant orother entity. Some entities can perform both issuer and acquirerfunctions. Some embodiments may encompass such single entityissuer-acquirers.

A “server computer” may typically be a powerful computer or cluster ofcomputers. For example, the server computer can be a large mainframe, aminicomputer cluster, or a group of servers functioning as a unit. Theserver computer may be associated with an entity such as a paymentprocessing network, a wallet provider, a merchant, an authenticationcloud, an acquirer or an issuer.

FIG. 1 shows a system according to an embodiment of the invention. Thesystem may include a merchant system which may include client computer20 and a data entry device 10 coupled to the client computer 20. Theclient computer 20 and the data entry device 10 may be used by a user(e.g., a call center employee) at a merchant. In some embodiments, thedata entry device 10 may be a keyboard. It may comprise encryptionsoftware so that sensitive data such as original account identifierinformation can be encrypted. The merchant system may also comprise alocal workstation 30 and an order management computer 40 incommunication with the client computer 20. The local workstation 30 mayservice a number of different client computers, and the order managementcomputer 40 may service one or more local workstations. Although in someembodiments of the invention, the data entry device 10, the clientcomputer 20, the local workstation 30, and the client computer 40 are inor part of a merchant system, they may be part of other systems in otherembodiments of the invention.

The system in FIG. 1 may also have a payment processing computer 50which may be coupled to the local workstation 30 and the ordermanagement computer 40. In some embodiments, the payment processingcomputer 50 may receive authorization requests and provide responses tothe local workstation 30 and the order management computer 40. In someembodiments, the local workstation 30 may be part of the ordermanagement computer 40. The payment processing computer 50 may alsoinclude or operate a database which may correlate replacement accountidentifier data with original account identifier data.

In addition to being in communication with the local workstation 30 andthe order management computer 40, the payment processing computer 50 mayalso be in communication with an issuer computer 80 via an acquirercomputer 60 and a payment processing network 70. The payment processingcomputer 50 may be part of a secure transaction system, which may or maynot include the issuer computer 80, the acquirer computer 60 and thepayment processing network 70. Transmission and storage of originalaccount identifiers may be secure in the payment processing computer 50,the issuer computer 80, the acquirer computer 60 and/or the paymentprocessing network 70

The payment processing network 70 may include data processingsubsystems, networks, and operations used to support and deliverauthorization services, exception file services, transaction scoringservices, and clearing and settlement services. An exemplary paymentprocessing network may include VisaNet™. Payment processing networkssuch as VisaNet™ are able to process credit card transactions, debitcard transactions, and other types of commercial transactions. VisaNet™,in particular, may include a VIP system (Visa Integrated Paymentssystem) which processes authorization requests and a Base II systemwhich performs clearing and settlement services.

Any suitable number or types of communication networks may be presentbetween the computers and devices shown in FIG. 1. A communicationsnetwork may be any one and/or the combination of the following: a directinterconnection; the Internet; a Local Area Network (LAN); aMetropolitan Area Network (MAN); an Operating Missions as Nodes on theInternet (OMNI); a secured custom connection; a Wide Area Network (WAN);a wireless network (e.g., employing protocols such as, but not limitedto a Wireless Application Protocol (WAP), I-mode, and/or the like);and/or the like.

FIG. 2A is a block diagram showing components of a data entry device 10according to an embodiment of the invention. The data entry device 10comprises a data processor 10A, a computer readable medium 10B, an I/Ointerface 10C, and a user interface 10D (e.g., a keyboard, atouchscreen, microphone, etc.) coupled to the data processor 10A. Thecomputer readable medium 10B comprises an encryption module 10B-1 andencryption keys 10B-2.

Computer readable media can include both volatile and nonvolatile media,both removable and non-removable media, and both local and remote media.By way of example, and not limitation, computer readable media maycomprise computer storage media and communication media. Computerstorage media includes both volatile and nonvolatile, removable andnon-removable media implemented in any method or technology for storageof information such as computer-readable instructions, data structures,program modules or other data. Computer storage media includes, but isnot limited to, RAM, ROM, EEPROM, flash memory or other memorytechnology, CD-ROM, digital versatile discs (DVD) or other optical discstorage, magnetic cassettes, magnetic tape, magnetic disc storage orother magnetic storage devices, or any other medium.

The encryption module 10B-1 may comprise code, executable by the dataprocessor 10A, to encrypt data such as primary account numbers. It mayinclude code for performing any suitable and known encryption processincluding DES, triple DES, AES, etc.

FIG. 2B is a block diagram showing components of a workstation 30according to an embodiment of the invention. The workstation 30comprises a data processor 30A, a computer readable medium 30B, a memory30C, and an I/O interface 30D coupled to the data processor 30A. Thecomputer readable medium 30B comprises an authorization processingmodule 30B-1. The authorization processing module 30B-1 may have code,executable by the data processor 30A to perform authorizationprocessing. Authorization processing may include the generation,transmission, and/or receipt of payment transaction authorizationrequest and response messages.

FIG. 2C is a block diagram showing components of an order managementcomputer 40 according to an embodiment of the invention. The ordermanagement computer 40 comprises a data processor 40A, a computerreadable medium 40B, a memory 40C, and an I/O interface 40D coupled tothe data processor 40A. The computer readable medium 40B comprises areplacement account identifier creation request module 40B-1, anauthorization processing module 40B-2, and an order tracking module40B-3. The order management computer 40 is an example of a managementcomputer, where the management computer may manage any suitable type ofdata and may perform any or all of the functions of the order managementcomputer 40B-2, as well as additional functions.

The replacement account identifier creation request module 40B-1 maycomprise code, executable by the data processor 40A to create areplacement account identifier request message. The replacement accountidentifier request message may request a replacement account identifiersuch as a subscription ID.

The replacement account identifier may be requested or provided toanother computer using any suitable form of communication. In someembodiments, a replacement account identifier request may be in anelectronic message format, such as an e-mail, a short messaging service(SMS) message, a multimedia messaging service (MMS) message, a hypertexttransfer protocol (HTTP) request message, a transmission controlprotocol (TCP) packet, a web form submission. The replacement accountidentifier may be directed to any suitable location, such as an e-mailaddress, a telephone number, an internet protocol (IP) address, or auniform resource locator (URL). In some embodiments, the replacementaccount identifier request may comprise a mix of different messagetypes, such as both email and SMS messages.

The authorization processing module 40B-2 may comprise code, executableby the data processor 40A to perform authorization processing.Authorization processing may include the generation, transmission,and/or receipt of payment transaction authorization request and responsemessages.

The order tracking module 40B-3 may comprise code, executable by thedata processor 40A, to track and manage orders associated with aparticular account, subscription ID, or individual.

FIG. 2D is a block diagram showing components of a payment processingcomputer 50 according to an embodiment of the invention. The paymentprocessing computer 50 comprises a data processor 50A, a computerreadable medium 50B, a memory 50C, and an I/O interface 50D coupled tothe data processor 50A. The computer readable medium 50B comprises anauthorization processing module 50B-1, a replacement account identifiergeneration module 50B-2, a replacement account identifier database50B-3, an encryption module 50B-4, and encryption keys 50B-5.

The authorization processing module 50B-1 may include code that issimilar to the code in the previously described authorization processingmodules 30B-1, 40B-1.

The replacement account identifier generation module 50B-1 may includecode, executable by the data processor 50A, that can generatereplacement account identifiers. Replacement account identifiers may begenerated using an algorithm that converts real PANs into replacementaccount identifiers. In another example, a listing of replacementaccount identifiers may be generated in advance and they may beassociated with actual PANs over time. In the latter case, thereplacement account identifier may be generated in batch, rather than ona per account basis.

The replacement account identifier database 50B-3 may store data tablesthat map the replacement account identifiers to the PANs. The database50B-3 may be a conventional, fault tolerant, relational, scalable,secure database such as Oracle™ or Sybase™.

The encryption/decryption module 50B-4 may comprise code, executable bythe data processor 50A to encrypt or decrypt data. It may comprise codefor performing any suitable encryption and/or decryption process usingDES, triple DES, AES, or any other suitable encryption algorithm. Inembodiments of the invention, the encryption/decryption module maycomprise code for decrypting an encrypted PAN that is received from amerchant's data entry device.

FIG. 3 is a flowchart illustrating methods according to embodiments ofthe invention. Methods according to embodiments of the invention may bedescribed with reference to FIGS. 1-3. The methods described belowrelate to the entry of data into a data entry device by a merchantemployee such as a call center employee. However, embodiments of theinvention are not limited to the specifically described embodiments. Forexample, embodiments of the invention can be utilized without the use ofa call center. In addition, although the use of a recurring payment isdescribed in detail, embodiments of the invention are not limited torecurring payment transactions. Lastly, although the methods describedbelow include steps that are described in a particular order, it isunderstood that the steps may occur in other sequences and may still bewithin embodiments of the invention.

In an embodiment of the invention, a consumer may contact a useroperating the client computer 20 and the data entry device 10. Forexample, the user may be a call center employee acting on behalf of amerchant. The consumer can call the user to place an order for a good orservice offered by the merchant. During the call, the consumer mayprovide the user with their credit card number and the expiration dateassociated with the credit card number (or any other suitablecombination of payment credentials or account information). After theuser receives this information, the user may then key in thisinformation into the data entry device 10. In some embodiments, the dataentry device 10 may be a keypad and the client computer 20 can be adesktop computer coupled to the keypad.

In step S100, after an original account identifier (e.g., a PAN) and theexpiration date are keyed into the user interface 10D (e.g., keys) ofthe data entry device 100 (e.g., a keyboard) by the user, they areencrypted by the data entry device 100. The encryption module 10B-1stored on the computer readable medium 10B may comprise encryptionsoftware that uses an encryption algorithm and one or more storedencryption keys 10B-2 to encrypt the original account identifier and theexpiration date to form an encrypted payload.

In steps S110 and S120, the encrypted payload containing the encryptedoriginal account identifier and the encrypted expiration date are sentto the local workstation 30 via the user's client computer 20.

In step S130, the local workstation 30 receives the encrypted payload.The local workstation 30 then uses the authorization processing module30B-1 and the data processor 30A to generate a first authorizationrequest message comprising the encrypted payload and a zero, nominal orno dollar transaction amount. The local workstation 30 then sends thezero, nominal or one dollar first authorization request message to thepayment processing computer 60.

The zero, nominal or no dollar first authorization request message mayinclude any suitable information. For example, it may include one ormore of: (a) the encrypted payload received from the data entry device10 (e.g., the encrypted card number and expiration date), (b) a merchantreference number, (c) a “bill to” name and address (these can be set todummy values), (d) a device type or identifier for the device thatcaptured the payment account information, (e) an indication of theencryption algorithm used to encrypt the payment account information,(f) an indication of any other encoding methods used, (g) an indicationof the entry mode (keyed vs. swipe) used to obtain the accountinformation, (h) an indication of the capabilities of the data entrydevice 10, and (i) a card present indicator (yes or no).

After the payment processing computer 60 receives the zero, nominal orno dollar authorization request message, the payment processing computer60 decrypts the encrypted original account identifier and modifies thezero, nominal or no dollar authorization request message so that itexcludes the encrypted original account identifier and includes theunencrypted original account identifier. The encryption module 50B-4 andone or more encryption keys 50B-5 may be used for this purpose. Themodified zero, nominal or no dollar first authorization request messageis then sent to the issuer computer 80 via the acquirer computer 60 andthe payment processing network 70.

The issuer computer 80 may then verify that the account associated withthe original account number is in good standing. This can occur usingany suitable process. Examples of processes include AVS (accountverification service) checks, fraud checks, etc. The issuer computer 80may include a data processor, and a computer readable medium coupled tothe data processor. The computer readable medium may store any suitablenumber of software modules, including, but not limited to, a fraudprocessing module, an authorization module and an account verificationmodule.

After the issuer computer 80 determines that the original account numberis in good standing, it may then generate a first authorization responsemessage with an authorization identifier. The first authorizationresponse message may comprise the unencrypted original accountidentifier. The first authorization response message may be sent by theissuer computer 80 to payment processing computer 50 via the paymentprocessing network 70 and the acquirer computer 60. It may include thereal account identifier. The payment processing computer 50 may thenmodify the first authorization response message so that it excludes theunencrypted original account identifier includes the encrypted originalaccount identifier and the authorization identifier.

In step S140, the local workstation 30 then receives the firstauthorization response message including the authorization identifierfrom the payment processing computer 50.

In step S150, the user, using the client computer 20, the localworkstation 30, and optionally the data entry device 10, inputs theauthorization identifier into an electronic form provided by the ordermanagement computer 40. The appropriate form may be provided on adisplay in the client computer 20 by the order management computer 40.The authorization identifier may be input into the electronic form usingany suitable process including manual data entry, automatic formfilling, or the cutting and pasting of data using a device such as acomputer mouse.

In step S160, using the replacement account identifier request module50B-2, the order management computer 40 generates and sends asubscription create request message including the authorizationidentifier to the payment processing computer 50.

After receiving the subscription create request message, the paymentprocessing computer 50, using the replacement account identifiergeneration module 50B-2, generates the replacement account identifier inthe form of a subscription identifier and transmits it to the ordermanagement computer 40. The subscription identifier may be any suitableset of characters that may identify a subscription that is associatedwith the consumer. In some embodiments, the subscription identifier maybe an example of a replacement account identifier that can be used inplace of the original account identifier (whether in an encrypted orunencrypted form).

In step S164, the subscription identifier is received by the ordermanagement computer 40.

In step S168, after receiving the subscription identifier, the ordermanagement computer 40 generates and sends a second authorizationrequest message, for the full order amount, to the payment processingcomputer 50 with the subscription identifier.

In step S170, the payment processing computer 50 sends the secondauthorization request message to the issuer computer 80 via the acquirercomputer 60 and the payment processing network 70. Prior to sending thesecond authorization request message to the issuer computer 80, thepayment processing computer 50 may modify the second authorizationrequest message by replacing (or excluding) the subscription identifierwith the original account identifier. Once the second authorizationrequest message is received by the issuer computer 80, the issuercomputer 80 may analyze the second authorization request message todetermine if the transaction should be authorized or not. Afteranalyzing the second authorization request message, the issuer computermay generate a second authorization response message indicating whetheror not the transaction is approved or declined.

In step 180, the second authorization response message that was sent bythe issuer computer 80 is received at the payment processing computer50. The payment processing computer 50 processes the authorization withthe data stores in the subscription profile and returns the result tothe local workstation 30 and the client computer 20.

Before or after the second authorization request message is transmittedto the issuer computer 80 by the payment processing computer 50, thepreviously received original account identifier and expiration date maybe stored along with the subscription ID (or other replacement accountidentifier) in the replacement account identifier database 50B-3. Thereplacement account identifier database 50B-3 may thus contain linksbetween unencrypted payment account information and replacement accountidentifiers. The placement account identifier database 50B-3 can serveas a replacement account identifier vault for processing future paymenttransactions using the replacement account identifiers.

At the end of the day or at some other suitable period of time, aclearing and settlement process occurs between the acquirer computer 60,the payment processing network 70, and the issuer computer 80.

The various participants and elements described herein with reference toFIG. 1 may operate one or more computer apparatuses to facilitate thefunctions described herein. Any of the elements in FIG. 1, including anyservers or databases, may use any suitable number of subsystems tofacilitate the functions described herein.

Examples of such subsystems or components are shown in FIG. 4. Thesubsystems shown in FIG. 4 are interconnected via a system bus 445.Additional subsystems such as a printer 444, keyboard 448, fixed disk449 (or other memory comprising computer readable media), monitor 446,which is coupled to display adapter 482, and others are shown.Peripherals and input/output (I/O) devices, which couple to I/Ocontroller 441 (which can be a processor or other suitable controller),can be connected to the computer system by any number of means known inthe art, such as serial port 484. For example, serial port 484 orexternal interface 481 can be used to connect the computer apparatus toa wide area network such as the Internet, a mouse input device, or ascanner. The interconnection via system bus allows the central processor443 to communicate with each subsystem and to control the execution ofinstructions from system memory 442 or the fixed disk 449, as well asthe exchange of information between subsystems. The system memory 442and/or the fixed disk 449 may embody a computer readable medium.

Any of the software components or functions described in thisapplication, may be implemented as software code to be executed by aprocessor using any suitable computer language such as, for example,Java, C++ or Perl using, for example, conventional or object-orientedtechniques. The software code may be stored as a series of instructions,or commands on a computer readable medium, such as a random accessmemory (RAM), a read only memory (ROM), a magnetic medium such as ahard-drive or a floppy disk, or an optical medium such as a CD-ROM. Anysuch computer readable medium may reside on or within a singlecomputational apparatus, and may be present on or within differentcomputational apparatuses within a system or network.

Embodiments of the invention have a number of advantages. As notedabove, in embodiments of the invention, the original account identifier(e.g., an unencrypted PAN) is encrypted at the point of entry to themerchant system and is not maintained or stored in the merchant system.Existing payment processing system channels can be used to verify theaccount before providing a replacement account identifier to themerchant system. Since the replacement account identifier is thereafterused for transaction processing, the merchant system can securely andefficiently process transactions while reducing the likelihood of futuretransaction declines by issuers. Systems according to embodiments of theinvention can be considered outside the scope of PCI requirements.

The above description is illustrative and is not restrictive. Manyvariations of the invention will become apparent to those skilled in theart upon review of the disclosure. The scope of the invention should,therefore, be determined not with reference to the above description,but instead should be determined with reference to the pending claimsalong with their full scope or equivalents.

One or more features from any embodiment may be combined with one ormore features of any other embodiment without departing from the scopeof the invention.

A recitation of “a”, “an” or “the” is intended to mean “one or more”unless specifically indicated to the contrary.

All patents, patent applications, publications, and descriptionsmentioned above are herein incorporated by reference in their entiretyfor all purposes. None is admitted to be prior art.

What is claimed is:
 1. A method comprising: receiving, by a managementcomputer, an authorization identifier, wherein the authorizationidentifier is generated by an authorization computer after theauthorization computer receives a first authorization request messagecomprising an original account identifier and a zero, nominal or nodollar amount, wherein the authorization identifier is provided in afirst authorization response message; generating, by the managementcomputer, a replacement account identifier request message;transmitting, by the management computer, the replacement accountidentifier request message to a payment processing computer, thereplacement account identifier request message includes theauthorization identifier; receiving, by the management computer, inresponse to transmitting the replacement account identifier requestmessage including the authorization identifier, a replacement accountidentifier response message comprising a replacement account identifier;generating, by the management computer, a second authorization requestmessage comprising a transaction amount and the replacement accountidentifier to the payment processing computer to authorize atransaction; and receiving, by the management computer, a secondauthorization response message authorizing or declining the transaction,the second authorization response message including the replacementaccount identifier.
 2. The method of claim 1 wherein authorizationidentifier is received from a local workstation, along with orderinformation for a transaction.
 3. The method of claim 2 furthercomprising: receiving, by the local workstation, the original accountidentifier from a keyboard device.
 4. The method of claim 3 wherein theoriginal account identifier is an encrypted original account identifierand wherein the first authorization request message comprises theencrypted original account identifier.
 5. The method of claim 1 whereinthe authorization computer is an issuer computer.
 6. The method of claim1 wherein the payment processing computer modifies the secondauthorization request message to exclude the replacement accountidentifier and to include the original account identifier, sends thesecond authorization request message with the original accountidentifier to the authorization computer and receives the secondauthorization response message from the authorization computercomprising the original account identifier, modifies the secondauthorization response message to include the replacement accountidentifier and transmits the second authorization response message withthe replacement account identifier to the management computer.
 7. Themethod of claim 6 wherein the transaction is a recurring paymenttransaction.
 8. A management computer comprising: a processor; and acomputer readable medium coupled to the processor, the computer readablemedium comprising code, executable by the processor to implement amethod comprising receiving an authorization identifier, wherein theauthorization identifier is generated by an authorization computer afterthe authorization computer receives a first authorization requestmessage comprising an original account identifier and a zero, nominal orno dollar amount, wherein the authorization identifier is provided in afirst authorization response message; generating a replacement accountidentifier request message; transmitting the replacement accountidentifier request message to a payment processing computer, thereplacement account identifier request message includes theauthorization identifier; receiving, in response to transmitting thereplacement account identifier request message including theauthorization identifier, a replacement account identifier responsemessage comprising a replacement account identifier; generating, by themanagement computer, a second authorization request message comprising atransaction amount and the replacement account identifier to the paymentprocessing computer to authorize a transaction; and receiving, by themanagement computer, a second authorization response message authorizingor declining the transaction, the second authorization response messageincluding the replacement account identifier.
 9. The management computerof claim 8 wherein the payment processing computer modifies the secondauthorization request message to exclude the replacement accountidentifier and to include the original account identifier, sends thesecond authorization request message with the original accountidentifier to the authorization computer and receives the secondauthorization response message from the authorization computercomprising the original account identifier, modifies the secondauthorization response message to include the replacement accountidentifier and transmits the second authorization response message withthe replacement account identifier to the management computer.
 10. Asystem comprising: a local workstation; and a management computer incommunication with the local workstation, the management computercomprising a processor, and a computer readable medium coupled to theprocessor, the computer readable medium comprising code, executable bythe processor to implement a method comprising receiving anauthorization identifier from the local workstation, wherein theauthorization identifier is generated by an authorization computer afterthe authorization computer receives an authorization request messagecomprising an original account identifier and a zero, nominal or nodollar amount, wherein the authorization identifier is provided in afirst authorization response message; generating a replacement accountidentifier request message; transmitting the replacement accountidentifier request message to a payment processing computer, thereplacement account identifier request message includes theauthorization identifier; receiving in response to transmitting thereplacement account identifier request message including theauthorization identifier, a replacement account identifier responsemessage comprising a replacement account identifier; generating, by themanagement computer, a second authorization request message comprising atransaction amount and the replacement account identifier to the paymentprocessing computer to authorize a transaction; and receiving, by themanagement computer, a second authorization response message authorizingor declining the transaction, the second authorization response messageincluding the replacement account identifier.
 11. The system of claim10, wherein the processor is a first processor and the computer readablemedium is a first computer readable medium, and wherein the systemfurther comprises: a data entry device in communication with the localworkstation, wherein the data entry device comprises a second processorand a second computer readable medium, the second computer readablemedium comprising code, executable by the second processor, forencrypting the original account identifier.
 12. The system of claim 11wherein the data entry device is a keypad device.
 13. The system ofclaim 11 further comprising the authorization computer.