Methods and systems for payments assurance

ABSTRACT

A remote payments assurance system includes a Proxy Service Manager Server, an Authentication Service Manager Server computer, an Acquirer Financial Institution (FI) Server computer, a payment network, and an Issuer financial institution server computer. A storage device of the Proxy Service Manager Server computer stores instructions which causes a processor to receive a consumer authentication request from a merchant device obtained during a card not present (CNP) transaction, transmit the consumer authentication request to the Authentication Service Manager Server computer, establish a secure communications channel between the Proxy Service Manager Server computer and the Authentication Service Manager Server computer, and transmit the consumer authentication request via the secure communications channel to the Authentication Service Manager Server computer. Next, the processor receives a non-repudiable one-time accountholder authentication value (“AAV”) token, transmits a payment authorization request to the Acquirer FI Server computer, receives a payment authorization message, and transmits a payment authorization message to the merchant device to complete the CNP purchase transaction.

CROSS REFERENCE TO RELATED APPLICATION

This application is a continuation of U.S. patent application Ser. No.13/547,445, filed on Jul. 12, 2012, which claims the benefit of andpriority to U.S. Provisional Patent Application Ser. No. 61/508,325,filed on Jul. 15, 2011, which are incorporated herein by reference forall purposes.

BACKGROUND OF THE INVENTION

Mobile telephones and other mobile communications devices (such aspersonal digital assistants) are carried by millions of consumers, andthere have been a number of attempts to integrate payment applicationswith these mobile devices. However, some of these attempts to providemethods and systems to facilitate “card not present” paymentcapabilities require substantial changes to existing paymentauthorization systems, making it difficult to achieve widespreadadoption of mobile payments. In addition, difficulties arose due tovarious country mandates and/or regulatory requirements, such as thoserequired by India that require cardholder authentication or validationto be performed by the cardholder (consumer) and verified by the Issuerfinancial institution (the entity that issued the payment account to theconsumer). Accordingly, there is a need for authentication methods andsystems for facilitating payment schemes where cardholder authenticationand Issuer financial institution verification are desired and/ormandated.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1A is a block diagram illustrating components that may be utilizedto perform an activation process for a consumer/cardholder having amobile device for an authentication service according to an embodimentof the invention;

FIG. 1B is a block diagram illustrating components that may be used toperform an activation process for a merchant having a merchant devicefor an authentication service according to an embodiment of theinvention;

FIG. 2 illustrates an embodiment of an assurance service system forsupporting merchant initiated remote payments according to an embodimentof the invention;

FIG. 3 is a block diagram of an embodiment of an Authentication ServiceManager Server computer in accordance with an embodiment of theinvention;

FIG. 4 is a block diagram of an embodiment of a Proxy Service ManagerServer computer in accordance with an embodiment of the invention;

FIG. 5 is a flowchart illustrating a consumer authentication and paymentauthorization process from the point of view of the Proxy ServiceManager Server computer of FIG. 2 according to an embodiment of theinvention;

FIG. 6 is a flowchart illustrating a consumer authentication processfrom the point of view of the Authentication Service Manager Servercomputer of FIG. 2 according to an embodiment of the invention;

FIG. 7 illustrates a process for issuing a pre-authorized tokenaccording to an embodiment of the invention; and

FIG. 8 is a flowchart illustrating a consumer authentication and paymentauthorization process that includes the use of a pre-authorized tokenfrom the point of view of the Proxy Service Manager Server computer ofFIG. 2 according to an embodiment of the invention.

DETAILED DESCRIPTION

In general, and for the purpose of introducing concepts of theembodiments described herein, systems, methods and apparatus aredescribed for providing an Authentication Service Manager toauthenticate and/or validate a consumer (cardholder) who is utilizing amobile device (or merchant device) to pay for goods and/or services. Inparticular, in some embodiments, a consumer with a mobile device (suchas a cell phone, personal digital assistant (PDA), laptop computer,touchpad computer, and the like) having a payment application enrollshis or her payment account with an Authentication Service Manager thathas a relationship with an Issuer financial institution (Issuer FI;which issued the payment account to the cardholder). In addition, amerchant having a merchant device (such as a point-of-sale (POS)terminal, automatic teller machine (ATM), personal computer, computerserver (hosting a website, for example), an interactive voice response(IVR) system, a land-line telephone, or any type of mobile device suchas a mobile telephone, personal digital assistant (PDA), laptopcomputer, touchpad computer, and the like) enrolls his or her merchantfinancial account with a Proxy Service Manager that has a relationshipwith an Acquirer financial institution (Acquirer FI; which holds themerchant's financial account). During a purchase transaction (forexample, when the consumer uses her or her mobile device to pay formerchandise at a merchant's retail store), the consumer provides paymentinformation to the merchant who utilizes a merchant device to initiatethe purchase transaction request by transmitting the cardholder paymentinformation to the Proxy Service Manager. It should be understood thatmany types of transactions qualify for the service described hereinincluding, but not limited to, telephone orders, mail orders, e-commerce(Internet) orders, POS-initiated transactions, standing instructions fora transaction, and/or other types of transactions includingnon-financial transactions.

In some embodiments, the Proxy Service Manager forwards the paymentinformation to the Authentication Service Manager, which validates theconsumer information including cardholder authentication credentials andsends a challenge/response request to the consumer's mobile device. Theconsumer, through the mobile device, authenticates to the challenge andtransmits a response to the Authentication Service Manager which thenvalidates the cardholder authentication credentials and generates adynamic and unique Accountholder Authentication Value (“AAV”). The AAVis then returned to the Proxy Service Manager, which transmits thefinancial transaction information including the AAV to the AcquirerFinancial Institution, which submits the transaction information to apayment network. The payment network submits the financial transactioninformation to the Issuer FI (which issued the payment account to theconsumer/cardholder, who also is the mobile device owner). The Issuer FIvalidates the AAV and continues to process the authentication requestby, for example, checking to make sure that the accountholder hasadequate funds in his or her financial account (which may be a creditcard account or a debit card account, for example) to pay for themerchandise or services of the merchant. If everything is in order, theIssuer FI approves the transaction and funds are transferred to themerchant's account, which is held by the Acquirer FI. The Acquirer FIthen notifies the Proxy Service Manager that the transaction has beenapproved, which in turn contacts the merchant with the approvalinformation. The transaction is then consummated as the merchantprovides the merchandise and/or the service to the consumer. Such aprocess may occur in real-time, for example, while theconsumer/cardholder is in a checkout line at a merchant retail location.Furthermore, such a method provides chargeback protection for themerchant because of the additional security provided by requiring bothcardholder authentication and issuer validation.

The term “consumer device” as used herein may refer to a handheld orportable or mobile device carried or used by a cardholder or consumer,or may refer to other types of electronic devices such as a personalcomputer, a land-line telephone, an IVR system, and the like. In thecontext of some embodiments, a “mobile device” is a device, such as alaptop computer, a personal digital assistant (PDA), a mobile telephone,a portable music player (such as an iPod™ and the like), that has apayment application stored, loaded or otherwise installed in or on themobile device such that the cardholder (or consumer) may conduct paymenttransactions involving a financial account such as a payment cardaccount (which may refer to a credit card account, a debit card account,and/or a pre-paid card account, for example).

In general, an Acquirer FI is the organization that transmits a purchasetransaction to a payment system for routing to the Issuer of the paymentaccount in question. Typically, the Acquirer FI has an agreement withmerchants, wherein the Acquirer FI receives authorization requests forpurchase transactions from the merchants, and routes the authorizationrequests to the Issuers via payment networks. The terms “Acquirer”,“Acquirer FI”, “Acquiring FI”, and “merchant's bank” may be usedinterchangeably herein. The terms “Issuer”, “Issuer FI” and “Issuing FI”may also be used interchangeably herein to refer to the financialinstitution that issued a payment account (which may be a cardholderaccount associated with, for example, a credit card, a debit card and/ora pre-paid card).

In addition, the term “payment network” is used to refer to one or morenetworks that are used to process a payment transaction, which mayinclude one or more server computers. For example, a payment network maybe the BankNet® processing network operated by MasterCard InternationalIncorporated. Those skilled in the art will appreciate that othernetworks may also be used to facilitate the authorization, clearing andsettlement of payment transactions as described herein.

The term “primary account number” (or “PAN”) is used herein to refer toa number of digits (or characters) which identify a payment accountissued by an issuer. For example, in some embodiments a payment accountis a credit account which is issued by a financial institution pursuantto the MasterCard International Incorporated rules, and the PAN may be atwelve to nineteen-digit string that identifies both the issuer (whichmay be based on the first few digits of the string, for example, thefirst five to ten digits) and the payment account number at the issuer.The PAN is typically utilized to route and process transactions thatinvolve the payment card and the payment card account. Those skilled inthe art will appreciate that other primary account number schemes andformats may be used in conjunction with embodiments described herein.

In some embodiments, the Authentication Service Manager activates theauthentication service for a cardholder (consumer) and a Proxy ServiceManager activates the authentication service for a merchant.

FIG. 1A is a block diagram 100 illustrating the components that may beutilized to perform a process for activating the authentication servicefor a consumer (cardholder) having a mobile device 102 according to anembodiment. In particular, an Issuer FI establishes a relationship withan Authentication Manager which may entail using an Issuer FI servercomputer 104 to communicate with an Authentication Service ManagerComputer 106 to transmit cardholder identification information so thatan enrollment and activation process can be initiated with theAuthentication Service Manager for cardholders. The AuthenticationService Manager receives the information and then activates theauthentication service for each individual cardholder by creating a linkbetween a particular cardholder's mobile device and that cardholder'sfinancial account payment credentials (which information was provided bythe Issuer FI). In some embodiments, the consumer (cardholder) mayprovide an alias or surrogate factor as an identifier that can be mappedto, for example, the primary account number (PAN) of the cardholder'saccount. For example, the consumer may provide a mobile telephonenumber, a national identification number (NID), a user identifier (UID),a frequent flier identifier, a driver's license identifier and/or someother consumer identifier that may be linked to the cardholder's mobiledevice and that can be used to map to a financial account of theconsumer. Such identifiers may include numbers and/or alphabeticalcharacters. During the registration process, in addition to one or moreidentifiers and the PAN, the consumer may also provide data such as anexpiration date for a particular financial account (such as a creditcard, or a debit card, or a pre-paid card, or other type of financialaccount).

In some embodiments, the Authentication Service Manager 106 may notifythe cardholder that registration and/or activation was successfullyachieved by transmitting an SMS message (or a text message, or someother type of message) to the consumer mobile device 102. For example,the mobile device may receive and then display a message that states:“Congratulations! Your payment account number XCX-3682 has beenactivated for mobile purchase transactions!” The message may includedetails (such as a consumer identifier and/or the telephone number ofthe consumer's mobile telephone) concerning the link to the cardholder'sfinancial account and/or provide a link to a website that allows thecardholder to manage the account or to obtain further information.

FIG. 1B is a block diagram 120 illustrating components according to anembodiment that may be used to perform a process for activating theauthentication service for a merchant having a merchant device 122(which may be, for example, a point-of-sale (POS) terminal, or a laptopcomputer, or a mobile device (such as a cell phone)). An Acquirer FIestablishes a relationship with a Proxy Service Manager, which in someembodiments involves using an Acquirer FI server computer 124 tocommunicate with a Proxy Service Manager Server computer 126. The ProxyService Manager computer receives information concerning financialaccounts held by the Acquirer FI for one or more merchants, and thenactivates the authentication service for those merchants. Each merchantmay be notified by the Proxy Service Manager Server computer thatactivation of the authentication assurance service was successful forthat merchant's financial account held by the Acquirer FI.

In some embodiments, the authentication service manager computer 106 andthe proxy service manager computer 126 may be controlled and/ormaintained by a single, third-party entity. Thus, the same entity (andsame server computer) may be responsible for performing the separateconsumer registration and merchant registration functions as explainedabove. In addition, in some embodiments the functionality of theauthentication service manager computer 106 and of the proxy servicemanager computer 126 may be handled by one server computer operated by asingle third-party entity.

FIG. 2 illustrates an embodiment of an assurance service system 200 forsupporting merchant-initiated remote payments. The system 200 includes amerchant device 202 adapted for communications with a Proxy ServiceManager server computer 204, an Authentication Service Manager servercomputer 206, an Acquirer FI server computer 208, a payment network 210,and an Issuer FI server computer 212. Also shown is a consumer mobiledevice 102, which is utilized by a cardholder as explained below toinitiate a payment transaction with the merchant device 202.

For ease of understanding only one Proxy Service Manager Server computerand one Authentication Service Manager Server computer are illustratedin the assurance service system 200 depicted in FIG. 2. But it should beunderstood that in some embodiments a plurality of Proxy Service ManagerServer computers and a plurality of Authentication Service ManagerServer computers may be utilized.

As explained above with regard to FIGS. 1A and 1B, merchants andconsumers register in order to utilize the present payments assuranceservice system. In some embodiments, a parameter file may be transmittedto each Proxy Service Manager Server computer at predetermined intervals(such as daily) that includes an updated list of Authentication ServiceManagers and associated consumers (or cardholders). In some embodiments,each Proxy Service Manager Server computer may transmit authenticationrequests to a “master” Authentication Service Manager Server computer(not shown) which is operable to route the authentication request to aparticular designated Authentication Service Manager Server computer.

Referring again to FIG. 2, in some embodiments a challenge and responseprocess is utilized by the assurance service system 200 to authenticatethe cardholder during a payment transaction. For example, the consumermay utilize her mobile device 102 to provide 215 an identifier (whichmay be an alias identifier, for example) and/or payment information tothe merchant device 202. In such implementations, the consumer's mobiledevice may be a mobile telephone (or cell phone) that includes anintegrated circuit (IC) and a stored payment application (which may be amobile wallet application running on the consumer's mobile telephonethat includes data concerning one or more of the consumer's financialaccounts). Such a mobile telephone may be configured for transmittingrequired payment transaction data to a proximity device associated witha POS terminal. For example, the consumer may tap her cell phone on aproximity payment device (a receiver) associated with a POS terminal toinitiate a purchase transaction. Consumer information which may includean identifier or surrogate factor and/or payment information that mayinclude identity information and/or payment card account data is thentransferred from the cell phone to the POS terminal for processing. Oncethis occurs, in some embodiments the merchant device 202 initiates 217an authentication request and transmits the consumer information to theProxy Service Manager Server computer 204.

In some embodiments, the Proxy Service Manager Server computer 204establishes a secure channel with the Authentication Service ManagerServer computer 206 and then transmits 219 the consumer informationthereto. In embodiments wherein the consumer information consists of asurrogate factor or an alias (for example, a frequent flyer accountnumber or a user identifier), the Authentication Service Managercomputer 206 performs a mapping function of the surrogate factor oralias to a particular consumer account to thus determine the cardholderpayment account information. The Authentication Service Manager thenvalidates the cardholder's payment information and looks up the MSISDN(the “Mobile Subscriber Integrated Services Digital Network” number,which is the same number as the mobile telephone number of a SIM card ofthe consumer's cell phone) that is registered to the cardholder.

Next, the Authentication Service Manager Server computer 206 transmits221 a challenge/response request (for example, an IVR call-back message)to the cardholder's mobile device 102. The cardholder then authenticates223 to the challenge/response request with the Authentication ServiceManager Server computer 206. The Authentication Service Manager Servercomputer then validates the credentials (for example, a password, anumeric PIN or a real-time token with a purchase identifier (previouslygenerated by the Authentication Service Manager Server computer andtransmitted to the cardholder's mobile device via any of a variety ofcommunication channels, for example, SMS, e-mail, and the like) providedby the cardholder and generates a dynamic and unique (andnon-repudiable) accountholder authentication value (“AAV”) token. Anon-repudiable AAV token is defined as a transaction-specific securitytoken for transaction matching at the Issuer's server that cannot bedisputed after the transaction-specific security token is verified bythe Issuer.

With reference again to FIG. 2, the Authentication Service ManagerServer computer 206 next provides 225 the AAV token to the Proxy ServiceManager Server computer 204, which creates a payment authorizationrequest (for example, an ISO-8583authorization request message) with theAAV token in, for example, a Universal Card Authentication Field(“UCAF”). (The term “ISO-8583” refers to a standard that provides a setof rules for the definition of financial transaction protocols. The UCAFis intended to be security-scheme independent and offers standardizedfields and messages for use by merchants and MasterCard™ members tocollect and transport authentication information. Once collected by themerchant and the Acquirer FI, this information is communicated to theIssuer in the payment authorization request and it provides explicitevidence that the transaction was originated by the account holder.)

The authorization request is then transmitted 227 to the Acquirer FIserver computer 208. The Acquirer FI server computer 208 then sends 229the authorization request to the payment network 210 which routes 231the authorization request to the Issuer FI server computer 212. TheIssuer FI server computer validates the AAV supplied in the UCAF, and ifall is in order, transmits 233 a payment authorization response messageto the payment network 210, which routes it 235 to the Acquirer FIserver computer 208. The Acquirer FI server computer 208 then transmits237 the payment authorization message to the Proxy Service Managerserver computer which sends 239 the payment authorization message to theMerchant Device 202 so that the merchant can complete the purchasetransaction with the consumer.

The process described immediately above is an example of a methodwherein a one-time token (the AAV token) is generated during thelifecycle of a transaction and validated during that transaction, whichoccurs in some embodiments. In some other implementations, however, theAAV token may be generated before the payment transaction is initiatedand then it is validated during the payment transaction.

Referring again to FIG. 2, in some embodiments the processing differs inthat after the cardholder is authenticated, the Proxy Service Manager204 returns (see dotted line 241) the AAV generated by theAuthentication Service Manager 206 directly to the Merchant Device 202.In this case, the Merchant Device 202 is operable to create a paymentauthorization request message with the AAV token in the UCAF, and totransmit that payment authorization request directly (see dotted line243) to the Acquirer FI Server computer 208 for further processing asdescribed above. In particular, the Acquirer FI Server computer 208 thenroutes 229 the payment authorization request through the payment network210 which transmits 231 the request to the Issuer FI Server computer212, which validates the AAV and generates a payment authorizationresponse message. The payment authorization message is then routed 233,235 back to the Acquirer FI Server computer 208 and then next routed 237to the Proxy Service Manager Server computer 204, and lastly routed 239to the Merchant Device 202, so that the merchant can complete thepurchase transaction with the consumer.

It should be understood that other processing techniques can be utilizedin accordance with the embodiments described herein that may depend uponthe capabilities of the authorization system 200. For example, themerchant device 202 may be operable to interact directly with theauthentication service manager server computer 206 (pathway not shown inFIG. 2), or may be operable to first interact with the acquirer FIcomputer 208 or with the Issuer FI computer 212, or with a paymentgateway (not shown) or with a payment processor (not shown) during apayment transaction. In some other embodiments, the Proxy ServiceManager computer 204, for example, may be operable to first interactwith the Issuer FI server computer 212, or with a payment gateway (notshown) or with a payment processor (not shown) during a paymenttransaction.

FIG. 3 is a block diagram of an embodiment of an Authentication ServiceManager Server computer 300. The Authentication Service Manager Servercomputer may be conventional in its hardware aspects but may becontrolled by software to cause it to operate in accordance with aspectsof the methods presented herein. In particular, the AuthenticationService Manager Server computer 300 may include a computer processor 302operatively coupled to a communication device 304, an input device 306,an output device 308, and a storage device 310.

The computer processor 302 may constitute one or more conventionalprocessors. Processor 302 operates to execute processor-executablesteps, contained in program instructions described herein, so as tocontrol the Authentication Service Manager Server computer 300 toprovide desired functionality.

Communication device 304 may be used to facilitate communication with,for example, other devices (such as a consumer mobile device 102 and/ora Proxy Service Manager Server computer 204 shown in FIG. 2).Communication device 304 may, for example, have capabilities forengaging in data communication over proprietary networks and/or overconventional computer-to-computer data networks. Such data communicationmay be in digital form and/or in analog form.

Input device 306 may comprise one or more of any type of peripheraldevice typically used to input data into a computer. For example, theinput device 306 may include a keyboard and a mouse and/or a touchpadand/or a touch screen. Output device 308 may comprise, for example, adisplay and/or a printer.

Storage device 310 may comprise any appropriate information storagedevice, including combinations of magnetic storage devices (e.g.,magnetic tape and hard disk drives), optical storage devices such as CDsand/or DVDs, and/or semiconductor memory devices such as Random AccessMemory (RAM) devices and Read Only Memory (ROM) devices, as well as“flash” memory devices. Any one or more of the listed storage devicesmay be referred to as a “memory”, “storage”, “storage medium” or“computer readable medium”.

Storage device 310 stores one or more programs or applications forcontrolling the processor 302. The programs comprise programinstructions that contain processor-executable process steps for theAuthentication Service Manager Server computer 300, including, in somecases, process steps that constitute processes provided in accordancewith principles of the processes presented herein.

The programs may include an application 312 that manages processes bywhich the Authentication Service Manager Server computer establishesrelationships with Issuer financial institutions by enrolling the IssuerFIs, and an application 314 that enrolls and activates theauthentication and validation service for consumers (cardholders) thathave payment accounts (or other types of financial accounts) associatedwith and issued by the enrolled Issuer FIs. For example, the cardholderenrollment application 314 may operate to activate an authenticationservice for a cardholder by creating a link between the cardholder'smobile device and the payment credentials of the cardholder's paymentaccount (which credentials may include, for example, a PAN, accountexpiration date and/or a password). In addition, a cardholder validationapplication 316 may be included, which may, for example, cause theprocessor 302 to validate cardholder information based on paymentaccount information, look up the registered MSISDN of the cardholder'smobile telephone, generate a dynamic and unique accountholderauthentication value (AAV), and transmit the AAV, for example, to aProxy Service Manager Server computer upon successful cardholderauthentication.

Reference numeral 318 in FIG. 3 identifies one or more databases thatare maintained by the Authentication Service Manager Server computer 300on the storage device 310. Among these databases may be, for example,cardholder mobile device data, cardholder payment account data, ProxyService Manager identification data, security logs, an Issuer database,and a transaction database.

It should be understood that other application programs may also bestored on the storage device 310 that are operable to cause a processorto function in accordance with embodiments disclosed herein. Forexample, a mapping application may be stored in the storage device 310that causes the processor 302 to map a consumer alias or surrogatefactor to a financial account of a consumer during a paymenttransaction.

FIG. 4 is a block diagram of an embodiment of a Proxy Service ManagerServer computer 400. The Proxy Service Manager Server computer may beconventional in its hardware aspects but may be controlled by softwareto cause it to operate in accordance with aspects of the methodspresented herein. In particular, the Proxy Service Manager Servercomputer 400 may include a computer processor 402 operatively coupled toa communication device 404, an input device 406, an output device 408,and a storage device 410.

The computer processor 402 may constitute one or more conventionalprocessors. Processor 402 operates to execute processor-executablesteps, contained in program instructions described herein, so as tocontrol the Proxy Service Manager Server computer 400 to provide desiredfunctionality.

Communication device 404 may be used to facilitate communication with,for example, other devices (such as a merchant device 202 and/or anAuthentication Service Manager Server computer 206 shown in FIG. 2).Communication device 404 may, for example, have capabilities forengaging in data communication over proprietary networks and/or overconventional computer-to-computer data networks. The data communicationmay be in digital form and/or in analog form.

Input device 406 may comprise one or more of any type of peripheraldevice typically used to input data into a computer. For example, theinput device 406 may include a keyboard and a mouse and/or a touchpadand/or a touch screen. Output device 408 may comprise, for example, adisplay and/or a printer.

Storage device 410 may comprise any appropriate information storagedevice, including combinations of magnetic storage devices (e.g.,magnetic tape and hard disk drives), optical storage devices such as CDsand/or DVDs, and/or semiconductor memory devices such as Random AccessMemory (RAM) devices and Read Only Memory (ROM) devices, as well as“flash” memory devices. Any one or more of the listed storage devicesmay be referred to as a “memory”, “storage”, “storage medium” or“computer readable medium”.

Storage device 410 stores one or more programs or applications forcontrolling the processor 402. The programs comprise programinstructions that contain processor-executable process steps for theProxy Service Manager Server computer 400, including, in some cases,process steps that constitute processes provided in accordance withprinciples of the processes presented herein.

The programs may include an application 412 that manages a process bywhich the Proxy Service Manager Server computer establishesrelationships with Acquirer financial institutions by enrolling aparticular Acquirer FI, and an application 414 that enrolls andactivates merchants that have financial accounts associated with andissued by the enrolled Acquirer FI's. For example, the merchantenrollment application 414 may operate to activate the authenticationservice for a merchant by linking a merchant's device (such as a POSterminal or a merchant's cell phone) and the merchant's account(s)credentials (which credentials may include, for example, an accountnumber and/or a password).

It should be understood that other application programs may also bestored on the storage device 410 operable to cause a processor tofunction in accordance with embodiments disclosed herein. For example,in some embodiments an application may be stored therein that causes theprocessor 402 to build an ISO-8583 purchase transaction and submit itfor authorization to an acquiring FI or payment gateway or paymentprocessor, or for submit it directly to a payment network.

Reference numeral 416 in FIG. 4 identifies one or more databases thatare maintained by the Proxy Service Manager Server computer 400 on thestorage device 410. Among these databases may be, for example, merchantdevice data, merchant account data, Proxy Service Manager identificationdata, security logs, an Acquirer database, and a transaction database.

FIG. 5 is a flowchart illustrating a consumer authentication and paymentauthorization process 500 according to an embodiment from the point ofview of the Proxy Service Manager Server computer 204 of FIG. 2. Inparticular, the Proxy Service Manager Server computer receives 502 aconsumer identifier and an authentication request from a merchantdevice. In some embodiments, the Proxy Service Manager Server computerestablishes a secure channel with an Authentication Service ManagerServer computer and then transmits 504 the consumer identifier to theAuthentication Service Manager Server computer. In some embodiments, theconsumer identifier is an alias entered by the consumer or provided tothe merchant, and it contains two pieces of information. In particular,such an alias/identifier includes information to identify the consumerand to identify a specific cardholder account to be utilized for thepayment transaction. Thus, if the consumer identifier is an alias (orsurrogate factor), then the Authentication Service Manager computer mapsthe consumer identifier to the consumer's cardholder account or otherfinancial information and continues to process the information. (Ofcourse, if the consumer identifier is a cardholder account identifier,then a mapping process is not necessary.) Next, if the consumer(cardholder) is authenticated, the Proxy Service Manager Server computerwill receive a non-repudiable accountholder authentication value (“AAV”)token. Thus, if an AAV token is received 506, in some embodiments theProxy Service Manager Server computer generates 508 a paymentauthorization request (for example, an ISO-8583 authorization requestmessage) with the AAV token in, for example, a Universal CardAuthentication Field (“UCAF”). The Proxy Service Manager Server computernext transmits 510 the payment request to the Acquirer FI Servercomputer.

Referring again to FIG. 5, if all was in order (i.e., the cardholderaccount was verified by the Issuer financial institution and containssufficient funds or a sufficient credit line to cover the cost of thepurchase transaction) then the Proxy Service Manager Server computerreceives 512 a payment authorization response message. The paymentauthorization response message is then transmitted 514 to the MerchantDevice so that the merchant can complete the purchase transaction withthe consumer. However, if instead of receiving a payment authorizationresponse in step 512, the Proxy Service Manager receives, for example, apayment declined message then the Proxy Service Manager transmits 516 apayment authorization denied message to the merchant. In this case, themerchant does not complete the purchase transaction with the consumer.

Referring again to step 506 in FIG. 5, if an AAV token is not receivedfrom the Authentication Service Manager Server computer within apredefined time (for example), or if an “authentication failed” messageis received from the Authentication Service Manager Server computer,then the Proxy Service Manager Server computer transmits 518 a“cardholder authentication failure” message to the Merchant Device.Thus, in this case, either a problem occurred with regard to theconsumer identifier and/or the authentication service manager could notmap the alias or surrogate factor to a cardholder account. Thus, in sucha case the merchant does not complete the purchase transaction with theconsumer because the consumer's payment credentials were notauthenticated.

FIG. 6 is a flowchart illustrating a consumer authentication process 600from the point of view of the Authentication Service Manager Servercomputer 206 of FIG. 2 according to an embodiment. The AuthenticationService Manager Server computer receives 602 the consumer identifierfrom the Proxy Service Manager Server computer. In some embodiments, theconsumer identifier is a surrogate factor, for example, a frequent flyeraccount number or a user identifier. In some embodiments, the consumerprovided the frequent flyer account number or identification number tothe Authentication Service Manager during the registration process. Nextthe Authentication Service Manager Server computer attempts to map 60the surrogate factor to the consumer's cardholder account. If themapping was successful (for example, the Authentication Service Managercomputer found a match in a database of registered consumer accounts),then the Authentication Service Manager Server computer transmits 606 achallenge/response request (for example, an IVR call-back message) tothe cardholder's mobile telephone or other mobile device. If thecardholder authenticates to the challenge/response request 608, forexample by providing a correct password or numeric PIN or a real-timetoken with a purchase identifier (previously generated by theAuthentication Service Manager Server computer and transmitted to thecardholder's device via any of a variety of communication channels, suchas via SMS, or e-mail, and the like), then the Authentication ServiceManager Server computer validates the credentials provided by cardholderor consumer and generates 610 a dynamic and unique (and non-repudiable)accountholder authentication value (“AAV”) token. Next, theAuthentication Service Manager Server computer transmits 612 the AAVtoken to the Proxy Service Manager Server computer for furtherprocessing. At this point, the Authentication Service Manager Servercomputer awaits further authentication requests.

However, referring again to FIG. 6, if mapping was unsuccessful in step604 because, for example the MS-ISDN (the mobile telephone number of aSIM card of the consumer's cell phone) is not registered with theAuthentication Service Manager (or the payment account is otherwise notregistered with the Authentication Service Manager), then theAuthentication Service Manager Server computer transmits 614 acardholder authentication failure message to the Proxy Service ManagerServer computer and the process ends. In this case, the purchasetransaction will not be consummated because the Proxy Service ManagerServer computer will in turn transmit the cardholder authenticationfailure message to the Merchant Device to alert the merchant that thecardholder has not been authenticated.

Referring again to FIG. 6, if in step 608 the cardholder fails toauthenticate to the challenge/response request, then the AuthenticationService Manager Server computer again transmits 614 a cardholderauthentication failure message to the Proxy Service Manager Servercomputer and the process ends. As before, the purchase transaction willnot be consummated in this case because the Proxy Service Manager Servercomputer will in turn transmit the cardholder authentication failuremessage to the Merchant Device to alert the merchant that the cardholderhas not been authenticated.

In some embodiments, Issuer financial institutions may desire toimplement a process that includes providing a pre-authorized token toregistered cardholders for use in making purchase transactions. Use ofsuch a pre-authorized token may enhance the consumers' purchasetransaction experiences because it facilitates authentication of theconsumer when the consumer wishes to consummate a purchase transactionwith a merchant. For example, FIG. 7 illustrates a process 700 forissuing a pre-authorized token according to an embodiment. Anauthentication service manager computer receives 702 a request for apre-authorized token from a consumer who is already registered with anIssuer FI and registered with an associated Authentication ServiceManager. In some embodiments, the consumer utilizes his or her mobiledevice (for example, cell phone or laptop or touchpad computer) or usesa personal computer with a web browser, to transmit his or herauthentication credentials to the Authentication Service Manager Servercomputer along with a request for a pre-authorized token. If theconsumer's authentication credentials (such as a mobile telephonenumber, driver's license ID, frequent flyer ID and the like) aresuccessfully validated 704, then the Authentication Service ManagerServer computer generates 706 a pre-authorized token that includes anexpiration date or period. In some implementations, the expiration dateis no more than twenty-four (24) hours from the time of issuance of thepre-authorized token, whereas in other embodiments the pre-authorizedtoken may be valid for shorter or longer periods of time. TheAuthentication Service Manager Server computer then transmits 708 thegenerated pre-authorized token (with an expiration date) to, forexample, the consumer's mobile device for use in making purchasetransactions. However, if in step 704 the consumers' identifier couldnot be validated, then the Authentication Service Manager computertransmits 710 a “Request Denied” message to the consumer's mobiledevice.

It should be noted that such a pre-authorized token will, in someembodiments, always be associated to a specific cardholder paymentaccount during the time of generation. For example, if a consumer hastwo or more payment accounts registered with the Authentication ServiceManager, and a pre-authorized token is generated for “Account A”, thenthe pre-authorized token will only be valid for Account A and not forany of the other accounts that consumer has with the AuthenticationService Manager. If the consumer uses the pre-authorized token andspecifies a payment account other than “Account A” for making a purchasetransaction authorization request, then the Authentication ServiceManager Server computer will reject the transaction request. In someembodiments, the pre-authorized token may be associated with a specificmerchant (for example, BestBuy™, amazon.com™ and the like), and/or witha merchant category (for example, airlines, hotels and the like). Inthis implementation, if the consumer attempts to use a pre-authorizedtoken that is not configured for use with either a particular merchantor merchant category, the Authentication Service Manager Server computerwill reject the transaction request. In addition, in some embodimentsthe pre-authorized token may be assigned a maximum purchase amount (forexample, $100 US Dollars). In such an embodiment, for example, if theconsumer attempts to use that pre-authorized token for purchases thatexceed $100 US Dollars, then the Authentication Service Manager Servercomputer will reject the transaction request. Such limitations on theuse and/or dollar amount that may be spent and/or other restrictions maybe applied together or in any combination to any pre-authorized token orclass of pre-authorized tokens.

FIG. 8 is a flowchart illustrating a consumer authentication and paymentauthorization process 800 according to an embodiment that includes theuse of a pre-authorized token from the point of view of the ProxyService Manager Server computer 204 of FIG. 2. In particular, the ProxyService Manager Server computer receives 802 an authentication requestincluding a pre-authorized token from a merchant device. In someembodiments, the authentication request also includes a consumeridentifier, which may be an alias or surrogate factor as describedherein. In some implementations, the Proxy Service Manager Servercomputer then establishes a secure channel with an AuthenticationService Manager Server computer and transmits 804 the consumeridentifier and the pre-authorized token to the Authentication ServiceManager Server computer.

Next, the Authentication Service Manager computer processes theinformation, and if the cardholder is authenticated, the Proxy ServiceManager Server computer receives 806 a non-repudiable accountholderauthentication value (“AAV”) token. If an AAV token is received 806,then the Proxy Service Manager Server computer generates 808 a paymentauthorization request with the AAV token in, for example, a UniversalCard Authentication Field (“UCAF”). The Proxy Service Manager Servercomputer next transmits 810 the payment authorization request to anAcquirer FI Server computer. If all was in order (i.e., the cardholderaccount was verified by the Issuer financial institution) then the ProxyService Manager Server computer receives 812 a payment authorizationmessage and then transmits 814 the payment authorization message to theMerchant Device so that the merchant can complete the purchasetransaction with the consumer. But if a payment authorization messagewas not received in step 812 (for example, the Proxy Service Managerreceives a payment declined message), then the Proxy Service Managertransmits 816 a payment authorization denied message to the merchant. Inthis case, the merchant does not complete the purchase transaction withthe consumer.

Referring again FIG. 8, if in step 806 an AAV token is not received fromthe Authentication Service Manager Server computer within a predefinedtime limit, or if an “authentication failed” message is received fromthe Authentication Service Manager Server computer, then the ProxyService Manager Server computer transmits 818 a “cardholderauthentication failure” message to the Merchant Device. In this case,the merchant doe not complete the purchase transaction with theconsumer.

In some embodiments, instead of generating the payment authorizationrequest in step 808 of the process 800, the Proxy Service Manager Servercomputer 204 transmits the AAV token generated by the AuthenticationService Manager Server computer 206 directly to the Merchant Device 202(see FIG. 2). In this case, the Merchant Device is operable to create apayment authorization request message with the AAV token in the UCAF,and to transmit the payment authorization request directly to theAcquirer FI Server computer. With reference to FIG. 2, processing thencontinues as described above, with the Acquirer FI Server computer 208routing the payment authorization request through the payment network210 to the Issuer FI Server computer 212, which validates the AAV tokenand generates a payment authorization message. The payment authorizationmessage is routed back to the Acquirer FI Server computer 208 and to theProxy Service Manager Server computer 204, and lastly to the MerchantDevice 202, so that the merchant can complete the purchase transactionwith the consumer.

In some embodiments, the remote payments assurance service may include aprocess wherein the Issuer FI permits the Authentication Service ManagerServer computer to generate a unique “one-time” token or “real-time”token for a consumer during the authentication request. Such a processwill now be explained with reference to the assurance service system 200of FIG. 2, which supports merchant initiated remote payments. In thisimplementation, the cardholder utilizes her consumer mobile device 102to provide cardholder payment account information to a merchant device202. The merchant device 202 then initiates an authentication requestand transmits the cardholder payment information to the Proxy ServiceManager Server computer 204. In some embodiments, the Proxy ServiceManager Server computer establishes a secure channel with theAuthentication Service Manager Server computer 206, and then providesthe cardholder payment account information to it. The AuthenticationService Manager receives and authenticates the cardholder's paymentinformation and looks up the MSISDN (the mobile telephone number of aSIM card of the consumer's cell phone) that is registered to theconsumer or cardholder. In some embodiments, the Authentication ServiceManager Server computer 206 then generates a unique real-time token witha purchase identifier and transmits it to the cardholders' mobile deviceutilizing any of a variety of communications channels, for example, SMS,e-mail, etc.

In this implementation, the cardholder receives the unique token orreal-time token and the purchase identifier at her mobile device, andthen provides them both to the merchant device 202. (Since the consumerreceives the token and purchase identifier at the time of entering intoa purchase transaction, the process may be thought of as occurring in“real time”.) The merchant device in turn submits the real-time tokenwith a purchase identifier of the cardholder to the Proxy ServiceManager Server computer 204. At this point, the Proxy Service ManagerServer computer again establishes a secure channel with theAuthentication Service Manager Server computer then transmits thereal-time token and the purchase identifier to it. The AuthenticationService Manager Server computer 206 validates the real-time token andthe purchase identifier, and then generates a dynamic and unique (andnon-repudiable) accountholder authentication value (“AAV”) token. TheAuthentication Service Manager Server computer 206 next provides the AAVtoken to the Proxy Service Manager Server computer 204, which creates apayment authorization request with the AAV token in, for example, aUniversal Card Authentication Field (“UCAF”), and then transmits theauthorization request to the Acquirer FI Server computer 208. TheAcquirer FI Server computer 208 sends the authorization request to thepayment network 210 which routes it to the Issuer FI Server computer212. The Issuer FI computer validates the AAV supplied in the UCAF, andif all is in order, transmits a payment authorized message to thepayment network 210, which routes it to the Acquirer FI server computer208. The Acquirer FI server computer 208 then transmits the paymentauthorized message to the Proxy Service Manager Server computer whichsends it to the Merchant Device 202 so that the merchant can completethe purchase transaction with the consumer. In some embodiments, asettlement process may occur at a later time wherein the necessary fundsto cover the payment transaction are transferred from the cardholder'sfinancial account held by the Issuer FI to the merchant's financialaccount held by the Acquirer FI.

In some embodiments, after the cardholder is authenticated, the ProxyService Manager Server computer 204 returns the AAV generated by theAuthentication Service Manager Server computer 206 to the MerchantDevice 202. In this case, the Merchant Device 202 is operable to createa payment authorization request message with the AAV token in the UCAF,and to transmit the payment authorization request directly to theAcquirer FI Server computer 208. Processing then continues as describedabove, with the Acquirer FI Server computer 208 routing the paymentauthorization request through the payment network 210 to the Issuer FIServer computer 212, which validates the AAV and generates a paymentauthorization message. The payment authorization message is routed backto the Acquirer FI Server computer 208 and to the Proxy Service ManagerServer computer 204, and lastly to the Merchant Device 202, so that themerchant can complete the purchase transaction with the consumer.

In an alternative embodiment, instead of the Proxy Service ManagerServer computer 204 generating the payment authorization request duringthe process, the Proxy Service Manager Server computer instead transmitsthe AAV token generated by the Authentication Service Manager Servercomputer 206 to the Merchant Device 202. In this case, the MerchantDevice is operable to create a payment authorization request messagewith the AAV token in the UCAF, and to transmit the paymentauthorization request directly to the Acquirer FI Server computer 208.With reference to FIG. 2, processing then continues as described above,with the Acquirer FI Server computer 208 routing the paymentauthorization request through the payment network 210 to the Issuer FIServer computer 212, which validates the AAV and generates a paymentauthorized message (if all is in order). The payment authorized messageis then routed back to the Acquirer FI Server computer 208 through thepayment network 210, and next to the Proxy Service Manager Servercomputer 204 which transmits it to the Merchant Device 202. Once thepayment authorized message is received at the Merchant Device, themerchant can complete the purchase transaction with the consumer.

The real-time token process described immediately above may beacceptable to regulators in certain countries or jurisdictions as alegitimate and secure process for remote payments. It may be acceptableto the regulators because of several characteristics. First, the paymentcard account number proves knowledge of payment information; second, theMSISDN (of the cardholder's mobile device, which was pre-registered bythe cardholder) used to for sending the real-time token is proof of anitem that the cardholder owns (the mobile device); and third, thereal-time token that is generated is not based on any of the informationvisible on a payment card or on a visible surface of the cardholder'smobile device.

Due to regulatory requirements in some jurisdictions, such as thosemandated in India, there is a need for remote payments assuranceservices that allow cardholder authentication for a card-not-presentpurchase transaction to be performed by a cardholder and verified by theIssuer FI. The systems and processes described herein provide remotepayments assurance services that satisfy that need. In particular, thedescribed systems provide the components needed for Issuer FI's andAcquirer FIs (and their end customers, who are the cardholders andmerchants) to satisfy such requirements in a secure and efficientmanner, and without the need for significant system changes.

In some markets, Issuer FI's are reluctant to accept debit accounttransactions (for example, by using a system such as the Maestro™ CNPsystem) because of the inability to authenticate a cardholder (exceptfor an electronic-commerce transaction wherein a process such as thatpromulgated by SecureCode™ is used). The systems and methods describedherein provide Issuer FIs in those markets with a solution for theadditional authentication to be performed, and furthermore provide forother remote payment channels such as IVR/Phone, Mail Order andpotentially recurring payment transactions.

Merchants and Acquirer FI's also benefit from the described systems andmethods due to the shift in liability that occurs. In particular, forproperly identified purchase transactions under the processes describedherein, the Issuer FI loses fraud related chargeback rights because theIssuer FI, through use of an Authentication Service Manager, not onlyauthenticated the cardholder but also approved the payment requestduring the process.

Lastly, cardholders benefit from the described systems and processesbecause of the additional security inherent in a process wherein thecardholder self-authenticates. That is, in each of the describedprocesses, the cardholder pre-registers with an Authentication ServiceManager before entering into any purchase transactions. When initiatinga purchase transaction, the cardholder provides information toauthenticate him or herself to the Authentication Service Manager Servercomputer for a particular purchase transaction before a payment is made.

It should be understood that the above description and/or theaccompanying drawings are not meant to imply a fixed order or sequenceof steps for any process referred to herein. Rather, any processdescribed herein may be performed in any order that is practicable,including but not limited to simultaneous performance of steps indicatedas sequential. In addition, in some instances steps that are depicted ordescribed herein as being sequential may be performed in parallel insome embodiments.

Although the present invention has been described in connection withspecific exemplary embodiments, it should be understood that variouschanges, substitutions, and alterations apparent to those skilled in theart can be made to the disclosed embodiments without departing from thespirit and scope of the invention as set forth in the appended claims.

What is claimed is:
 1. A remote payments assurance system, comprising: aProxy Service Manager Server computer comprising a Proxy Service ManagerServer processor operably connected to a storage device; anAuthentication Service Manager Server computer operably connected to theProxy Service Manager Server computer; an Acquirer Financial Institution(FI) Server computer operably connected to the Proxy Service ManagerServer computer; a payment network operably connected to the AcquirerFinancial Institution Server computer; and an Issuer financialinstitution server computer operably connected to the payment network;wherein the storage device of the Proxy Service Manager Server computerstores instructions configured to cause the Proxy Service Manager Serverprocessor to: receive a consumer authentication request from a merchantdevice, the consumer authentication request including consumerinformation obtained by the merchant device from a consumer mobiledevice operated by a consumer during a card not present (CNP)transaction; transmit the consumer authentication request to theAuthentication Service Manager Server computer; establish a securecommunications channel between the Proxy Service Manager Server computerand the Authentication Service Manager Server computer; transmit theconsumer authentication request comprising the consumer information viathe secure communications channel to the Authentication Service ManagerServer computer associated with the consumer; receive a non-repudiableone-time accountholder authentication value (“AAV”) token generated bythe Authentication Service Manager Server computer; generate a paymentauthorization request that includes the AAV token in a Universal CardAuthentication Field; transmit the payment authorization request to theAcquirer FI Server computer; receive a payment authorization messagesignifying that the Issuer FI validated the AAV token; and transmit thepayment authorization message to the merchant device to complete the CNPpurchase transaction.
 2. The system of claim 1, wherein the consumerauthentication request received by the Proxy Service Manager Servercomputer comprises one of an alias or a surrogate factor, and whereinthe storage device of the Proxy Service Manager Server computer storesfurther instructions, prior to the instructions for establishing asecure communications channel, configured to cause the Proxy ServiceManager Server processor to transmit the alias or surrogate factor tothe Authentication Service Manager computer.
 3. The system of claim 1,further comprising, prior to the instructions for receiving a paymentauthorization message, instructions configured for causing the ProxyService Manager Server processor to: receive a payment authorizationdenied message; and transmit the payment authorization denied message toa merchant device.
 4. The system of claim 1, further comprising, priorto the instructions for receiving the AAV token, instructions configuredto cause the Proxy Service Manager Server processor to: receive anauthentication failed message from the Authentication Service ManagerServer computer; and transmit a cardholder authentication failuremessage to a merchant device.
 5. A non-transitory computer readablemedium storing instructions for authenticating a consumer andauthorizing a card not present (CNP) transaction by causing a ProxyService Manager Server computer to: receive a consumer authenticationrequest from a merchant device, the consumer authentication requestincluding consumer information obtained by the merchant device from aconsumer mobile device operated by a consumer during a card not present(CNP) transaction; transmit the consumer authentication request to theAuthentication Service Manager Server computer; establish a securecommunications channel between the Proxy Service Manager Server computerand the Authentication Service Manager Server computer; transmit theconsumer authentication request comprising the consumer information viathe secure communications channel to the Authentication Service ManagerServer computer associated with the consumer; receive a non-repudiableone-time accountholder authentication value (“AAV”) token generated bythe Authentication Service Manager Server computer; generate a paymentauthorization request that includes the AAV token in a Universal CardAuthentication Field; transmit the payment authorization request to theAcquirer FI Server computer; receive a payment authorization messagesignifying that the Issuer FI validated the AAV token; and transmit thepayment authorization message to the merchant device to complete the CNPpurchase transaction.
 6. The non-transitory computer readable medium ofclaim 5, wherein the consumer authentication request comprises one of analias or a surrogate factor, and wherein the instructions fortransmitting the consumer authentication request further comprisesinstructions configured to transmit the alias or surrogate factor to theAuthentication Service Manager computer.
 7. The non-transitory computerreadable medium of claim 5, further comprising, prior to theinstructions for receiving a payment authorization message, instructionsconfigured for causing the Proxy Service Manager Server computer to:receive a payment authorization denied message; and transmit the paymentauthorization denied message to a merchant device.
 8. The non-transitorycomputer readable medium of claim 5, further comprising, prior to theinstructions for receiving the AAV token, instructions configured tocause the Proxy Service Manager Server computer to: receive anauthentication failed message from the Authentication Service ManagerServer computer; and transmit a cardholder authentication failuremessage to a merchant device.
 9. A remote payments assurance system,comprising: a Proxy Service Manager Server computer comprising a ProxyService Manager Server processor operably connected to a storage device;an Authentication Service Manager Server computer operably connected tothe Proxy Service Manager Server computer; an Acquirer FinancialInstitution (FI) Server computer operably connected to the Proxy ServiceManager Server computer; a payment network operably connected to theAcquirer Financial Institution Server computer; and an Issuer financialinstitution server computer operably connected to the payment network;wherein the storage device of the Proxy Service Manager Server computerstores instructions configured to cause the Proxy Service Manager Serverprocessor to: receive, from a merchant device, a consumer authenticationrequest comprising a consumer identifier and a pre-authorizationtoken-having an expiration date, the merchant device communicating witha consumer mobile device when a consumer initiates a card not present(CNP) transaction; determine that the expiration date of thepre-authorization token is valid; establish a secure communicationschannel between the Proxy Service Manager Server computer and theAuthentication Service Manager Server computer; transmit the consumerauthentication request via the secure communications channel to theAuthentication Service Manager Server computer associated with theconsumer; receive a non-repudiable, one-time accountholderauthentication value (“AAV”) token from the Authentication ServiceManager Server computer; generate a payment authorization request thatincludes the AAV token in a Universal Card Authentication Field;transmit the payment authorization request to an Acquirer financialinstitution (FI) Server computer; receive a payment authorizationmessage signifying that the Issuer FI validated the AAV token; andtransmit the payment authorization message to the merchant device tocomplete the CNP purchase transaction.
 10. The system of claim 9,wherein the storage device of the Proxy Service Manager Server computerstores further instructions, prior to the instructions for receiving theAAV token, configured to cause the Proxy Service Manager Serverprocessor to: receive an authentication failure message; and transmitthe authentication failure message to the merchant device.
 11. Thesystem of claim 9, wherein the storage device of the Proxy ServiceManager Server computer stores further instructions, subsequent totransmitting the payment authorization request, configured to cause theProxy Service Manager Server processor to: receive a paymentauthorization denied message; and transmit the payment authorizationdenied message to a merchant device.
 12. The system of claim 9, whereinthe instructions for transmitting the payment authorization request toan Acquirer FI Server computer further comprises instructions configuredto cause the Proxy Service Manager Server processor to transmit merchantidentification information.
 13. The system of claim 12, wherein thestorage device of the Proxy Service Manager Server computer storesfurther instructions, subsequent to the instructions for transmittingthe payment authorization request to an Acquirer FI Server computer,instructions configured to cause the Proxy Service Manager Serverprocessor to receive a payment authorization denied message based on themerchant identification information.
 14. A non-transitory computerreadable medium storing instructions for authenticating a consumer andauthorizing a card not present (CNP) transaction by causing a ProxyService Manager Server computer to: receive, from a merchant device, aconsumer authentication request comprising a consumer identifier and apre-authorization token-having an expiration date, the merchant devicecommunicating with a consumer mobile device when a consumer initiates acard not present (CNP) transaction; determine that the expiration dateof the pre-authorization token is valid; establish a securecommunications channel between the Proxy Service Manager Server computerand the Authentication Service Manager Server computer; transmit theconsumer authentication request via the secure communications channel tothe Authentication Service Manager Server computer associated with theconsumer; receive a non-repudiable, one-time accountholderauthentication value (“AAV”) token from the Authentication ServiceManager Server computer; generate a payment authorization request thatincludes the AAV token in a Universal Card Authentication Field;transmit the payment authorization request to an Acquirer financialinstitution (FI) Server computer; receive a payment authorizationmessage signifying that the Issuer FI validated the AAV token; andtransmit the payment authorization message to the merchant device tocomplete the CNP purchase transaction.
 15. The non-transitory computerreadable medium of claim 14, storing further instructions, prior to theinstructions for receiving the AAV token, configured to cause the ProxyService Manager Server computer to: receive an authentication failuremessage; and transmit the authentication failure message to the merchantdevice.
 16. The non-transitory computer readable medium of claim 14,storing further instructions, subsequent to transmitting the paymentauthorization request, configured to cause the Proxy Service ManagerServer computer to: receive a payment authorization denied message; andtransmit the payment authorization denied message to a merchant device.17. The non-transitory computer readable medium of claim 14, wherein theinstructions for transmitting the payment authorization request to anAcquirer FI Server computer further comprises instructions configured tocause the Proxy Service Manager Server computer to transmit merchantidentification information.
 18. The non-transitory computer readablemedium of claim 17, storing further instructions, subsequent to theinstructions for transmitting the payment authorization request to anAcquirer FI Server computer, instructions configured to cause the ProxyService Manager Server computer to receive a payment authorizationdenied message based on the merchant identification information.
 19. Aremote payments assurance system, comprising: a Proxy Service ManagerServer computer; an Authentication Service Manager Server computercomprising an Authentication Service Manager Server processor operablyconnected to a storage device, the Authentication Service Manager Servercomputer operably connected to the Proxy Service Manager Servercomputer; an Acquirer Financial Institution (FI) Server computer incommunication with the Proxy Service Manager Server computer; a paymentnetwork operably connected to the Acquirer FI Server computer; and anIssuer FI server computer operably connected to the payment network;wherein the storage device of the Authentication Service Manager Servercomputer stores instructions configured to cause the AuthenticationService Manager Server processor to: receive from the Proxy ServiceManager computer having a relationship with an Acquirer FI, a consumeridentifier; retrieve, based on the consumer identifier, a MS-ISDN numberfrom a database storing consumer mobile device data; match the consumeridentifier to data stored in a database; transmit, by utilizing theMS-ISDN number, a challenge/response request to a consumer device;receive a correct response to the challenge/response request from theconsumer device; generate a unique and non-repudiable AAV token; andtransmit the non-repudiable AAV token to a Proxy Service Manager Servercomputer.
 20. The system of claim 19, further comprising, subsequent tothe instructions for receiving the consumer identifier, instructionsconfigured for causing the Proxy Service Manager Server processor to:fail to match the consumer identifier to data stored in the database;and transmit an authentication failure message to the Proxy ServiceManager Server computer.
 21. A non-transitory computer readable mediumstoring instructions for authenticating a consumer by causing anAuthentication Service Manager Server computer to: receive from theProxy Service Manager computer having a relationship with an AcquirerFI, a consumer identifier; retrieve, based on the consumer identifier, aMS-ISDN number from a database storing consumer mobile device data;match the consumer identifier to data stored in a database; transmit, byutilizing the MS-ISDN number, a challenge/response request to a consumerdevice; receive a correct response to the challenge/response requestfrom the consumer device; generate a unique and non-repudiable AAVtoken; and transmit the non-repudiable AAV token to a Proxy ServiceManager Server computer.
 22. The non-transitory computer readable mediumof claim 21, storing further instructions, subsequent to theinstructions for receiving the consumer identifier, instructionsconfigured for causing the Authentication Service Manager Servercomputer to: fail to match the consumer identifier to data stored in thedatabase; and transmit an authentication failure message to the ProxyService Manager Server computer.