Systems and methods for distributed enhanced payment processing

ABSTRACT

A distributed enhanced payment processing system includes a merchant point of sale (POS) terminal system and a remote payment management system. The POS terminal system initiates a transaction that includes receiving a payment amount, a purchaser account identifier, a virtual electronic payment indicator, and a merchant ID via a payment client. Subsequently, the POS terminal system outputs the transaction to the remote payment management system which generates a token for the transaction. The payment management system then provides the purchaser account identifier, a merchant account identifier, and the payment amount to a remote virtual electronic payment (VEP) entity system. Upon receiving a VEP entity system response, the payment management system outputs the response and token to the POS terminal system.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of and claims the benefit of priorityto U.S. application Ser. No. 13/743,283, filed on Jan. 16, 2013, whichis a continuation-in-part of and claims the benefit of priority to U.S.application Ser. No. 13/563,534, filed on Jul. 31, 2012, which areincorporated herein by reference in their entireties.

BACKGROUND

This invention relates generally to systems and methods for distributedenhanced payment processing, including multi-merchant tokenization oftransaction information, and augmented with processing of virtualelectronic payment (VEP). Such systems and methods enable increasedsecurity for payments and transactions, provide for more seamlesstransactions across groups of related merchants, and enable groups ofrelated merchants as well as merchants in general to provide a broaderrange of payment related services than those available from traditionalcredit and debit payment card providers alone.

Many brick and mortar merchants utilize electronic point of sale (POS)terminal systems to perform purchase tallying and payment processingincluding electronic payments. A natural element of POS terminal systemdevelopment has been the establishment of third party electronic paymentmanagement service providers who securely and reliably aggregate anddirect electronic payment requests from merchants' POS terminals topayment card companys' payment systems and thus act as paymentintermediaries.

Current payment management systems may rely solely on software fromthird party POS developers to support numerous POS input display andinput devices with which to acquire payment related information frompurchasers. Support for a new POS device or for a new VEP payer may bedelayed by an overloaded POS developer. Therefore, a distributedarchitecture utilizing a “payment client” operating remotely on a givenPOS terminal system to directly provide support for numerous POS inputdisplay and input devices and for various VEP payers may thus offloadPOS developers and speed up availability of new VEP and POS devicesupport.

“Tokenization” provides a means for replacing sensitive transactioninformation with a “token” containing encrypted transaction informationthat is secured against deciphering by a hacker (or a merchant) becausedecryption key storage and decryption service is provided remotely fromthe storage location of the encrypted transaction information. Thisprotects against a hacker accessing both said encrypted sensitiveinformation and the corresponding decryption key when compromising asingle system.

Often a merchant may have multiple locations that work together, or amerchant may operate a franchise location that works together with otherfranchise locations, and as such current systems may limit thesemerchants from all relying upon a single token. Thus, accountinformation has to be individually input by each of the varied merchantsin order to perform related transactions for a single customer.Multi-merchant tokenization allows utilization of a single token, whichmay include account information, by multiple associated merchant's POSterminal systems.

Virtual electronic payment service providers (VEP entities), such asPayPal, Dwolla, Google Wallet, etc., may act as intermediary paymentagents for purchasers and/or merchants. VEP entities provide servicesthat augment and/or substitute for traditional payment services such aspayment cards and checking accounts.

The electronic payment processing services accessed via POS terminalsystems by brick and mortar merchants are absolutely fundamental totheir businesses. Therefore, it is critically important that theaddition of VEP entity services cause little or no change or disruptionto the use of “traditional card brand” (TCB) payer services such ascredit cards and debit cards. Furthermore, to avoid aggravatingpurchasers, the interface for the new VEP entity services shouldintegrate intuitively and relatively seamlessly with a given POSterminal system's existing purchaser user interfaces.

A given VEP entity may potentially offer an ever expanding set ofservices to purchasers. Further, since there is little barrier to entryinto the Internet side of the VEP entity market, the number of VEPentities may continue to grow. And finally, there is no standardizationof services or operation between VEP entities—for example, one VEPentity may require a 10 digit telephone number to identify a purchaserwhile another may require an email address. Clearly brick and mortarmerchants—and therefore their POS terminal system vendors—need a way toeasily, securely and inexpensively add support for selected VEP entitiesto their POS terminal systems. And they need to do this whilecontrolling and limiting VEP entity access to their customers.

Payment management service providers as established electronic paymentaggregators for brick and mortar merchants' POS terminal systems are anatural and logical choice for centralizing and localizing changes (andtherefore minimizing costs) arising from the addition of VEP entityservices.

It is therefore apparent that an urgent need exists for systems andmethods for improved security and streamlined transaction paymentprocessing including support for virtual electronic payment. Suchsystems will have the added benefit of decentralizing sensitive accountdata in a manner which increases security of user data, while shiftingrisks away from the payment service and expanding said payment serviceto process virtual electronic payments.

SUMMARY

To achieve the foregoing and in accordance with the present invention,systems and methods for distributed enhanced payment processing withmulti-merchant tokenization are provided. Such systems and methodsenable processing of virtual electronic payment (VEP) in addition totraditional credit card and debit card payment secured by multi-merchanttokenization. Such systems have the added benefit of providing a broaderrange of payment related services.

In one embodiment, a distributed enhanced payment processing system isconfigured to process virtual electronic payment. The system includes amerchant point of sale (POS) terminal system, a remote paymentmanagement system and a remote virtual electronic payment (VEP) entitysystem.

The POS terminal system initiates a request for a transaction thatincludes receiving a payment amount from a purchaser, and receiving apurchaser account identifier, a virtual electronic payment indicator,and a merchant ID via a payment client installed in the POS terminalsystem. The purchaser account identifier includes at least one of aprimary account number, a unique purchaser alias and a purchaserbiometric identifier. Subsequently, the POS terminal system outputs thetransaction to the remote payment management system.

The remote payment management system validates the merchant ID againstmerchant logs, ensuring that the merchant has been configured fortokenization, generates a token for the transaction, wherein the tokenincludes the purchaser account identifier, an expiration, and a groupID. The payment management system then provides the purchaser accountidentifier, a merchant account identifier, and the payment amount to theremote virtual electronic payment (VEP) entity system. Upon receiving aresponse from the remote VEP entity system, the payment managementsystem outputs the response and the token to the POS terminal system.

In some embodiments, the transaction can be encrypted, and the remotepayment management system is configured to decrypt the transaction. Thetoken can also be encrypted. A group ID enables particular merchants toredeem the token and the remote payment management system associatesmerchants to the group ID. The remote payment management system can beconfigured to query a database for merchant configuration. The remotepayment management system declines the transaction if the merchantconfiguration does not match the transaction, and updates the databasefor changes in merchant configuration.

The remote payment management system can also be configured to receivethe token from the merchant point of sale terminal system and validatethe merchant ID against merchant logs to ensure that the merchant isconfigured for tokenization. The remote payment management systemdecrypts the token, compares the group ID to the merchant ID in themerchant logs, and provides the purchaser account identifier, themerchant account identifier and the payment amount to the remote VEPentity system. Upon receiving a second response from the remote VEPentity system, the payment management system outputs the second responseto the merchant point of sale terminal system.

Note that the various features of the present invention described abovemay be practiced alone or in combination. These and other features ofthe present invention will be described in more detail below in thedetailed description of the invention and in conjunction with thefollowing figures.

BRIEF DESCRIPTION OF THE DRAWINGS

In order that the present invention may be more clearly ascertained,some embodiments will now be described, by way of example, withreference to the accompanying drawings, in which:

FIG. 1 is an example schematic block diagram for a system formulti-merchant tokenization, in accordance with some embodiments;

FIG. 2 is an example schematic block diagram for a more detailed view ofcomponents within the tokenization and payment management system, inaccordance with some embodiments;

FIG. 3 is an example schematic block diagram for the tokenizerencryption service, in accordance with some embodiments;

FIG. 4 is an example process flow diagram for multi-merchanttokenization, in accordance with some embodiments;

FIGS. 5-7 are example flowcharts for methods for multi-merchanttokenization, in accordance with some embodiments;

FIGS. 8A and 8B are example schematic block diagrams for mechanisms forsecure transactions, in accordance with some embodiments;

FIGS. 9A and 9B are example illustrations for computer systemsconfigured to embody the multi-merchant tokenization system, inaccordance with some embodiments;

FIG. 10 is a System Level Block Diagram of a Distributed EnhancedPayment (DEP) Processing System in accordance with an embodiment of thepresent invention; and

FIG. 11 is a Top Level Logic Flow Diagram in accordance with a DEPProcessing System embodiment; and

FIG. 12 is an exemplary screen shot of a payer choice payment controlsubscreen in accordance with a DEP Processing System embodiment; and

FIG. 13 is an exemplary screen shot of a payer list configurationfacility screen in accordance with a DEP Processing System embodiment;and

FIG. 14 is a Logic Flow Diagram that further decomposes Step 1160 ofFIG. 11 so as to describe the processing of VEP in accordance with a DEPProcessing System embodiment; and

FIG. 15 is a Logic Flow Diagram that further decomposes Step 1180 ofFIG. 11 so as to describe the processing of VEP in accordance with a DEPProcessing System embodiment.

DETAILED DESCRIPTION

The present invention will now be described in detail with reference toseveral embodiments thereof as illustrated in the accompanying drawings.In the following description, numerous specific details are set forth inorder to provide a thorough understanding of embodiments of the presentinvention. It will be apparent, however, to one skilled in the art, thatembodiments may be practiced without some or all of these specificdetails. In other instances, well known process steps and/or structureshave not been described in detail in order to not unnecessarily obscurethe present invention. The features and advantages of embodiments may bebetter understood with reference to the drawings and discussions thatfollow.

The following discussion relates to methods and systems formulti-merchant tokenization in a payment processor. Such systems andmethods increase security for electronic transactions, reduce risksborne by the payment processor, and allow for seamless multi-merchanttransactions without the need to repeatedly collect user account data.

Note that the following disclosure includes a series of subsections.These subsections are not intended to limit the scope of the disclosurein any way, and are merely for the sake of clarity and ease of reading.As such, disclosure in one section may be equally applied to processesor descriptions of another section if and where applicable.

Also note that particular consideration is made to credit cardtransactions due to the prevalence of these transactions. Despite thisreference to credit cards, the disclosed systems and methods can applyequally well to any payment methods where sensitive information is beingtransferred. This may include debit transactions, gift cardtransactions, PayPal transactions, smart card transactions, mobileapplication transactions, and the usage of loyalty cards, to name but afew. Effectively, any circumstance where account numbers, or othersensitive information, is being transferred may be employed within thescope of the disclosed systems and methods.

I. Multi-Merchant Tokenization Systems

To facilitate this discussion, FIGS. 8A and 8B provide example blockdiagrams for methods for securely handling transaction payments, inaccordance with some embodiments. In FIG. 8A, the point of sale terminal102 may collect credit card information (or other sensitive paymentinformation) and transfer the data securely to the payment system(s)106, at 800 a. Intermediary in this transaction is a payment processorwhich ensures validity of the request, and generates a multi-merchanttoken. The payment system(s) 106 returns a transaction response securelywith the token generated by the payment processor to the merchant.

By relying upon a token, the merchant no longer has to send the creditcard information for subsequent transactions and may instead utilize thetoken for follow-up activities. For example, a restaurant may initiallyrun a transaction for the cost of a meal, and perform a follow-uptransaction using the token for processing the tip. Another example mayinclude recurring transactions for a gym membership. A retailer may usetokens for returns or price adjustments rather than resending sensitivetransaction information.

In contrast to current tokenization systems, the presently disclosedsystems and methods transfer a token with a unique makeup (includingencrypted card data) that enables distributed storage of sensitiveinformation, as well as the ability for multiple merchants to share thetoken for transactions. This may be of particular use in franchise orrelated businesses, where a customer's payment information may beprocessed by multiple merchants.

For example, a customer may purchase a good from location A from afranchise retailer. The customer then decides to return the item tolocation B which is within the same franchise, but may not be owned bythe same entity. Instead of denying the transaction, or re-running thecard using the presently disclosed system, the token may be leveraged toperform the transaction.

FIG. 8B illustrates a schematic block diagram illustrating end to end(E2E) encryption, at 800 b. End to end encryption protects sensitiveinformation from malware loaded upon a point of sale terminal, and maybe employed in conjunction with multi-merchant tokenization.

In these systems, the card information is encrypted at the reader head,upon collection. Thus, the information conveyed from the reader to therest of the POS system is already secure. Since the POS system may beinfected by malware, this early encryption ensures that the data remainssecure from the very start. While the currently disclosed systems andmethods can be employed with end to end encryption, this is not arequired feature to employ the tokenization disclosed herein.

The secure data is then transmitted to the payment system(s) 106, andthe response may be returned in an encrypted format. Since the data isnever in the clear, E2E payment methods ensures added security frompotential vulnerability at the point of sale terminal 102. Further, whenutilized in conjunction with multi-merchant tokens, the system'ssecurity is even more robust.

Turning to FIG. 1, an example schematic block diagram for a system formulti-merchant tokenization is provided, shown generally at 100. In thisexample block diagram, a purchaser 101 may be seen interacting with thepoint of sale terminal 102 in order to pay for a purchase, or otherwisesettle a transaction. Typically the purchaser 101 provides amagnetically stored account number and expiration in the form of acredit card, but as previously discussed any form of sensitive paymentinformation may be utilized, in some embodiments.

The point of sale 102 may include a fixed reader coupled to a terminal,an integrated cash register system, mobile payment application, or thelike. As noted above, the point of sale terminal 102 may encrypt thecollected data at the reader head in order to ensure security.Alternatively the initial encryption may be performed in software deeperin the point of sale terminal 102, in some embodiments. Softwareencryption, however, increases vulnerability to security breach if thepoint of sale terminal 102 has been compromised. Regardless of locationof initial encryption, an encryption protocol may be employed, in someembodiments. This encryption protocol typically includes a merchant ID,amount for the transaction, passwords and an encrypted portion. Theencrypted potion may be in the following format, in some embodiments:

  <encryption>   <block>   <key>   <serial number> </encryption>

Note that while a specific encryption protocol is presented here,alternate known encryption schemas may be readily employed in alternateembodiments.

The point of sale terminal 102 may be capable of providing the collectedaccount information (and other sensitive information) to a paymentservice(s) 104 in the tokenization and payment management system 120(payment processor). This transfer of data may be performed over theinternet or via a dial in connection. The payment service(s) 104 mayinclude a plurality of systems for receiving the data, dependent upontransmission mechanism and data type, as will be discussed in greaterdetail below. The payment service(s) 104 does an initial check forencryption of the data. If the received data is not encrypted, it may betransferred immediately to payment system(s) 106 for transfer of funds,or directly to entities such as Visa, MasterCard, etc. Payment system(s)106 may include entities such as Global Card Bank, for example. However,where encryption is present, and tokenization is desired, the paymentservice(s) 104 may transfer the information to a tokenizer encryptionservice 110 for processing. The payment service(s) 104 validates theencrypted block, encrypted key and reader serial number lengths. It alsovalidates the merchant's ID with a stored database of terminal IDs.

The tokenizer encryption service 110 validates credentials andidentifies keys for the encrypted data. The tokenizer encryption service110 may leverage a data tier 114 populated by analytics 116 system andCRM application(s) in order to perform validation and identification ofkeys. The data is then submitted to a hardware security module 108 fordecryption and the generation of a token. The token includes a primaryaccount number (PAN), a group ID (GID), an expiration date for thetoken, and an expiration date for the card.

In some embodiments, the expiration date of the token may be varieddepending upon if the token is designated as a single use token, or forrecurring transactions (i.e., a subscription). For example, a 1 year and2 year expiration may be provided for a single use and recurring token,respectively. This allows for a longer validity period where themerchant is anticipating reuse of the token, and ensures that tokens arenot stored unnecessarily long for single use tokens.

The token, which is encrypted, and clear text of the data supplied bythe point of sale terminal 102 are returned to the tokenizer encryptionservice 110, and subsequently to the payment service(s) 104. The paymentservice(s) 104 transfers the clear text to the payment system(s) 106 fora transaction response. The response is then provided, along with thetoken, back to the merchant. The merchant may then store the encryptedtoken in a local database for later transactions.

Unlike current tokenization technology, the PAN (primary account number)is stored as part of the token, with the merchant, in encrypted form.The merchant cannot access the PAN without the keys maintained withinthe hardware security module 108. Thus, for account information to becompromised, both the merchant system and the tokenization and paymentmanagement system 120 would need to be breached. In all other knowntoken based systems, the PAN is stored exclusively upon the paymentprocessor's system, enabling a hacker to collect account information bybreaching a single system.

Additionally, unlike other token based systems, the present systemincludes a GID (group ID) which enables more than one merchant toutilize the token. The data tier 114 maintains a copy of merchant IDsand correlates them with one or more GIDs. When a token is supplied tothe system during a later transaction, the GID in the token is comparedagainst the merchant ID listed in the data tier 114. If they match, thenthe tokenization and payment management system 120 may process thetoken.

FIG. 2 is an example schematic block diagram for a more detailed view ofcomponents within the tokenization and payment management system, inaccordance with some embodiments. In this example block diagram,encrypted data 202 from the point of sale terminal 102 is seen beingdelivered to the payment service(s) 104 via any of a dial accessconnector 204, internet socket 206 or web services 208. When data isdelivered to the dial access connector 204, it may pass through a dialaccess concentrator 210 prior to being provided to a server 214. If datapasses through the internet socket 206 or web services 208, it may besupplied to the server 214.

In addition to the server 214, other servers may be included, inalternate embodiments, in order to handle alternate inputs. For example,in embodiments where gift cards or loyalty cards are being processed,the system may include a gift card server or loyalty card server.Generally, the system is designed to be scalable to take any number ofpayment types, as is desirable for any particular scenario.

The server 214 determines if token is present and/or if data isencrypted. If not encrypted and the merchant is not setup fortokenization, the clear text data is transferred to the paymentsystem(s) 106 (such as Global Card Bank, Visa, etc.) for approval ordeclining. Otherwise, if the data includes a token or encrypted data, itmay be provided to the tokenizer encryption service 110, as previouslydiscussed.

FIG. 3 is an example schematic block diagram for the tokenizerencryption service 110, in accordance with some embodiments. Thiscomponent may include two distinct modules: an incoming switch gatelogic module 302 and an encryption service business logic 304. Theincoming switch gate logic module 302 may validate credentials of themerchant, and the encryption service business logic 304 may identifykeys for the data. The encryption service business logic 304 may accessthe data tier 114 and one or more hardware security module 108 a and 108b. More than one hardware security module 108 a and 108 b may beemployed for redundancy supporting failover and load balance.

Lastly, FIG. 4 is an example process flow diagram for multi-merchanttokenization system, in accordance with some embodiments. Here it isseen that a purchaser 101 makes an electronic payment 402 via a point ofsale terminal 102. The transaction request built by the point of saleterminal 102 includes an indication requesting tokenization, in thisexample.

The transaction is submitted to the tokenization and payment managementsystem 120, in this example, where the transaction data is checked forthe token indicator (at 404). The merchant ID included in thetransaction data is also compared against records to determine if themerchant is configured for tokenization. If the token indicator ispresent, and the merchant ID matches the ability to performtokenization, then the transaction is set to be routed throughtokenization logic, and is sent to the payment system(s) 106 forauthorization (at 406).

If the merchant ID does not match the token indicator in thetransaction, then a decline is sent back to the merchant (at 408). Thisis a sanity check that ensures that both the transaction and merchantconfiguration are in alignment prior to approving a transaction. Oncethe transaction is declined, the merchant may contact the tokenizationand payment management system 120 to confirm correct setup if theybelieve the decline was in error.

If the transaction is approved by the payment system(s) 106, then thetransaction may be sent through the tokenization logic (at 414). Inalternate embodiments, the transaction is sent through the tokenizationlogic prior to approval by the payment system(s) 106, and the token isattached to the response by the payment system(s) 106 regardless ofapproval status. As noted above, the token contemplated herein includesthe primary account number, token expiration, card (or account number)expiration, and a group ID.

Once the token is assembled, it is inserted into a token field in thetransaction response (at 416). The response is provided to the merchantwhere the approval is received, and the merchant retains the tokeninstead of the primary account number.

II. Multi-Merchant Tokenization Methods

Now that embodiments of the basic system architecture have beendescribed, FIG. 5 is presented to illustrate one embodiment of a methodfor multi-merchant tokenization, shown generally at 500. In this exampleprocess, the point of sale sends a request with the cardholder's data tothe server (at 502). The server may determine if the request includes arecurring frequency element (at 504). If the request is for a recurringtoken, logic for a recurring billing token may be utilized (at 508).Alternatively, if the request is for a normal single use token, logicfor this token may be utilized (at 506). Generally, recurring tokens maydiffer from normal tokens by having a longer period before they expire.

Next, the token request is compared against the merchant's setup (asstored in a database) to make sure that the token request is inalignment to the merchant's configuration (at 510). If the merchant doesnot match the token request, the transaction may be declined (at 512).Otherwise, if there is a match between the request and the merchant'sconfiguration, the system determines if a token is being requested (at514). If no token is requested, the entire tokenization logic may bebypassed and the system may forward the transaction to the paymentsystem(s) 106 without tokenization (at 520). In alternate embodiments,all transactions will be processed for a token regardless if a requestfor tokenization is present. In these embodiments, merchants that areconfigured to accept tokens will receive them if they have submitted acorrectly formatted transaction request. In these embodiments, only ifthe request is incorrectly formatted will the tokenization process bebypassed or declined.

However, if tokenization is requested, the server may request a token(at 516) from the hardware security module 108 based upon the frequencyelement (normal or recurring). If the transaction is approved by thecard brand (at 518), then the approval is returned to the merchant (at524), or is otherwise declined (at 522). In some embodiments, regardlessof transaction approval or decline, the token will be provided to themerchant along with the transaction response.

In an alternate method, as shown at 600 of FIG. 6, the point of saleterminal 102 sends a request to the tokenization and payment managementsystem 120 with a token (at 602). The server detects the presence of thetoken, as well the frequency element of the token (at 604). The systemnext determines if the merchant is set up for tokenization by queryingmerchant account information (at 606). If the merchant is not set up fortokenization, the request will be denied (at 610). However, if themerchant is set up for tokenization, then the system may inquire if thefrequency element is for a recurring token (at 608).

When a recurring frequency element is present, the server may modifybilling mode for recurring billing transactions (at 612). After this, orif no recurring element is present, the tokenizer encryption service 110requests decryption of the token from the hardware security module 108to retrieve account numbers, expiration dates, group ID, and optionallythe generation of an updated token (at 614). In some embodiments, everytransaction may include updates of the token. This ensures tokens neverbecome stale; however, alternate embodiments may keep existing tokens,or only update upon request, in some cases.

The decrypted token information is used to get approval from the paymentsystem(s) 106 (at 616). An approval response (at 618) or decliningresponse (at 610) may be provided back to the point of sale terminal102. In cases where the token has been updated, the new token mayaccompany the response regardless of if it was approved. This new tokenmay then be stored within the merchant's system for later use.

As previously noted, due to the presence of a group ID within the token,the system may also undergo a check to determine if the merchant islinked to the group ID. If so, the merchant is authorized to use thetoken. If not, the transaction may be declined.

FIG. 7 provides yet another flow diagram for an embodiment formulti-merchant tokenization of transactions, shown generally at 700. Inthis example process, the point of sale sends an end to end request tothe server (at 702). The server detects the end to end transaction (at704) and ensures that the merchant is configured for such transactionsby referencing merchant account data (at 706). If the merchant is notconfigured for end to end transactions, then the transaction is declined(at 708). However, if the merchant is set up for end to endtransactions, the process then determines if the initial request isencrypted (at 710). Subsequently, the system determines if the merchantis configured for tokenization (at 712).

If the request was not encrypted, or if the merchant is not set up fortokenization, then the transaction is declined (at 708). However, if themerchant is configured for tokenization and the request was encrypted,the server modifies the billing mode (at 714) for recurring transactions(if the transaction is a recurring event), and the data is decrypted (at716). The decrypted data is supplied to a payment system(s) 106 forapproval (at 718) and if approved, the data may be returned to themerchant (at 720). Otherwise the transaction may be declined (at 708).

III. System Embodiments

FIGS. 9A and 9B illustrate a Computer System 900, which is suitable forimplementing embodiments of the present invention. FIG. 9A shows onepossible physical form of the Computer System 900. Of course, theComputer System 900 may have many physical forms ranging from a printedcircuit board, an integrated circuit, and a small handheld device up toa huge super computer. Computer system 900 may include a Monitor 902, aDisplay 904, a Housing 906, a Disk Drive 908, a Keyboard 910, and aMouse 912. Disk 914 is a computer-readable medium used to transfer datato and from Computer System 900.

In addition to the standard desktop, or server, computer systemillustrated, it is fully within the scope of this disclosure that anycomputer system capable of the required storage and processing demandswould be suitable for embodying the present invention. This may includetablet devices, smart phones, pin pad devices, and any other computerdevices, whether mobile or even distributed on a network (i.e., cloudbased).

FIG. 9B is an example of a block diagram for Computer System 900.Attached to System Bus 920 are a wide variety of subsystems.Processor(s) 922 (also referred to as central processing units, or CPUs)are coupled to storage devices, including Memory 924. Memory 924includes random access memory (RAM) and read-only memory (ROM). As iswell known in the art, ROM acts to transfer data and instructionsuni-directionally to the CPU and RAM is used typically to transfer dataand instructions in a bi-directional manner. Both of these types ofmemories may include any suitable of the computer-readable mediadescribed below. A Fixed Disk 926 may also be coupled bi-directionallyto the Processor 922; it provides additional data storage capacity andmay also include any of the computer-readable media described below.Fixed Disk 926 may be used to store programs, data, and the like and istypically a secondary storage medium (such as a hard disk) that isslower than primary storage. It will be appreciated that the informationretained within Fixed Disk 926 may, in appropriate cases, beincorporated in standard fashion as virtual memory in Memory 924.Removable Disk 914 may take the form of any of the computer-readablemedia described below.

Processor 922 is also coupled to a variety of input/output devices, suchas Display 904, Keyboard 910, Mouse 912 and Speakers 930. In general, aninput/output device may be any of: video displays, track balls, mice,keyboards, microphones, touch-sensitive displays, transducer cardreaders, magnetic or paper tape readers, tablets, styluses, voice orhandwriting recognizers, biometrics readers, or other computers.Processor 922 optionally may be coupled to another computer ortelecommunications network using Network Interface 940. With such aNetwork Interface 940, it is contemplated that the Processor 922 mightreceive information from the network, or might output information to thenetwork in the course of performing the above-described multi-merchanttokenization. Furthermore, method embodiments of the present inventionmay execute solely upon Processor 922 or may execute over a network suchas the Internet in conjunction with a remote CPU that shares a portionof the processing.

In addition, embodiments of the present invention further relate tocomputer storage products with a computer-readable medium that havecomputer code thereon for performing various computer-implementedoperations. The media and computer code may be those specially designedand constructed for the purposes of the present invention, or they maybe of the kind well known and available to those having skill in thecomputer software arts. Examples of computer-readable media include, butare not limited to: magnetic media such as hard disks, floppy disks, andmagnetic tape; optical media such as CD-ROMs and holographic devices;magneto-optical media such as floptical disks; and hardware devices thatare specially configured to store and execute program code, such asapplication-specific integrated circuits (ASICs), programmable logicdevices (PLDs) and ROM and RAM devices. Examples of computer codeinclude machine code, such as produced by a compiler, and filescontaining higher level code that are executed by a computer using aninterpreter.

IV. Enhancements

The Distributed Enhanced Payment (DEP) Processing System—is directed tonovel methods and systems for acquiring, translating, communicating,securing, storing, retrieving, aggregating and post-processingelectronic payment information (EPI) pertaining to a given individualpurchaser via a given merchant's POS terminal system; utilizing secure,distributed and re-usable multi-merchant tokenization (as describedpreviously herein) to store and/or retrieve some or all of said EPI;and/or securely communicating some or all of said EPI utilizing cleartext and/or tokenization included in a given payer authorization requestcommunicated to a payer chosen by a given purchaser—with such a requesttransacted in such a way that creditworthiness may be verified and/orfunds transferred between said purchaser's funding account and acorresponding transacting merchant's account in the amount of a“requested payment” as may be indicated by the EPI. In someauthorization requests, the requested payment may be for a purchase andthus result in the debiting of funds from the purchaser's fundingaccount and crediting to the transacting merchant's account. In someauthorization requests, the requested payment may be for a full orpartial refund and thus result in the debiting of funds from thetransacting merchant's account and crediting to the purchaser's fundingaccount. For a given authorization request, the amount of the requestedpayment may be utilized to check for the availability of credit and/orfunds for an anticipated but not yet realized purchase—i.e., apre-authorization—and result in zero change to the fund level in thepurchaser's funding account due to that pre-authorization. In someauthorization requests, such as for a check-in transaction, therequested payment may be left unvalued or may have a value that may beignored.

In some embodiments, purchase payment, refund and pre-authorizationauthorization requests may be utilized for VEP entities as well as forTCB payers. However, processing VEP may utilize a check-in transactionto identify and authenticate a given purchaser and said purchaser with abroader range of services than TCB payer services may provide.Competition with VEP entities may cause TCB payers to also support acheck-in transaction; or to acquire or be acquired by or merge with aVEP entity that does. Therefore, despite references to VEP and VEPentities, the systems and methods disclosed herein may apply equallywell to any payment methods where sensitive information may betransferred. This may include debit transactions, credit cardtransactions, gift card transactions, PayPal transactions, smart cardtransactions, mobile application transactions, and the usage of loyaltycards, to name but a few.

In some embodiments, electronic payment information—EPI—required by aVEP entity and/or TCB payer may include but not be limited to: purchaserpayment credential(s), transaction description, and payment requestinformation. More specifically, EPI may include but not be limited to:purchaser's primary account identifying information and/or purchaserauthenticating information; authorization request type (e.g., check-in,pre-authorization, purchase payment, refund); transacting merchant'saccount identifying information and/or credential(s); POS identifyinginformation such as location and terminal number; transactionidentifying information such as date, time, SKU, quantity and price; andpayment request information such as requested payment amount,transacting merchant's account identifying information, as well asidentifying information and/or credential(s) corresponding to paymentmanagement system 120 requesting payment as the merchant's intermediary.

In some embodiments, EPI may include TCB payer or VEP entity identifyinginformation that may be utilized for associating a given authorizationrequest to the appropriate payment entity such as a VEP entity or TCBpayer.

In some embodiments, if the primary account identified in the EPI may bea VEP primary account from a VEP entity such as PayPal, Dwolla, orGoogle Wallet, the VEP primary account may reference in turn a differentpre-associated purchaser funding account, for example a MasterCardaccount or a bank checking account, from which the requested payment mayactually be debited (or credited). Some VEP entity's services may bereferred to colloquially as an ‘electronic wallet’ or ‘e-wallet’ orsimilar term evoking the notional image of a virtual payment containingand/or dispensing entity.

In some embodiments, purchaser payment credential(s) required by a VEPentity and/or TCB payer may include but not be limited to: primaryaccount number (PAN), personal identification number (PIN), paymentcard/credential(s) expiration date, purchaser's name, purchaser'sbilling postal code. Some VEP entities may utilize a unique purchaseridentifier that may operate as a substitute for the actual PAN, i.e., aunique purchaser alias. For example, a given purchaser utilizing a givenVEP entity may type in said purchaser's ten digit phone number and alsoa corresponding multi-digit ‘secret’ PIN. The VEP entity may use suchpurchaser authenticating information to lookup the corresponding PAN;and from that PAN determine the corresponding purchaser funding account.Depending on the VEP entity, one or more unique purchaser identifier(s)may be utilized as a substitute for the actual PAN, including but notlimited to a telephone number, an email address, a social network‘handle’, a postal address, a VEP approved user name, or a third partyissued account or identification number. The VEP entity may leverage thediligence of a third party, e.g., Gmail, to assure that the substitutedpurchaser identifier is unique to the purchaser within the identifierspace of that third party. Many VEP entities may require purchaserauthenticating information including a PIN or password in addition tothe purchaser identifier, and may require unique identifier andPIN/password pairings. It should be noted that a purchaser potentiallymay use the same substitute purchaser identifier and/or PIN/password formore than one VEP entity. For example, a given purchaser may use thesame pairing of phone number: 650-567-9153 and PIN: 5653 for both PayPaland Dwolla and yet be uniquely identified and authenticated for theseparate purposes of each of those VEP entities. Therefore, unlike thePAN of a TCB payer account, a purchaser's payment credential(s) may notinherently identify a unique corresponding VEP entity. Also in contrast,TCB payer services operate by identifying the funding account ratherthan the purchaser, i.e., an essential component of purchaser paymentcredential(s) for TCB payers is the primary account number (PAN), whichfor credit cards typically may be the same as the funding accountnumber, whereas for debit cards, the PAN typically may be utilized bythe TCB payer to lookup the separate funding account number.

To facilitate discussion, FIG. 10 shows an exemplary structural blockdiagram of a Virtual Electronic Payment processing system 1000, which insome embodiments may be utilized by a given purchaser 101 to conductelectronic payment related transactions. Tender 1015 may be physicallyexchanged or may be presented in a virtual form for electronic exchangeon said purchaser's behalf by third parties such as VEP entity system(s)105 and/or payment system(s) 106. Purchaser 101 may directly utilize aPOS terminal system 102; and/or another party or parties (notshown)—performing on the purchaser's behalf and/or on the transactingmerchant's behalf (e.g., a checking clerk)—may utilize said POS terminalsystem 102 to assist said purchaser 101. To avoid reiterating the abovein the description that follows, references to a purchaser 101 utilizinga given POS terminal system 102 may apply equally to party(s) utilizingsaid POS terminal system 102 on the purchaser's behalf as indicatedabove.

A DEP Processing System 1000 may in some embodiments utilize adistributed system facility—a Payment Client 1025 a—integrated with aPOS terminal system 102 and operating on a POS processor 1025 andutilizing a Payment Depository 1028 to cache and/or recordinformation—including multi-merchant tokenized EPI as describedpreviously—related to transaction payment and/or related to otherauthorization requests. Furthermore, Payment Client 1025 a may in someembodiments operate POS input device(s) 1022 and POS display device(s)1024 in coordination with—but independent of—third party POS systemsoftware (not shown) running on POS processor 1025 such that said thirdparty sourced POS system software may be isolated from informationtransmitted to POS display device(s) 1024 or received from POS inputdevice(s) 1022 by Payment Client 1025 a. In this way, Payment Client1025 a may interact with a given purchaser 101 to securely process saidpurchaser's electronic payment and/or payment related transaction insuch a way that Payment Client 1025 a's functioning may appear topurchaser 101 to be part of a single fully integrated POS terminalsystem 102.

A DEP Processing System 1000 further may in some embodiments include apayment management system 120 accessed from a given POS terminal system102 via a communication facility 1081. As previously detailed, such apayment management system 120 may serve as a secure informationrepository and tokenizer. Additionally, payment management system 120may operate as an electronic payment transaction normalizing andaggregating intermediary between POS terminal system 102 and VEP entitysystem(s) 105 accessed via a communication facility 1085. Paymentmanagement system 120 may provide facilities including but not limitedto storage, retrieval, validation and tracking of: tokens, decryptionkeys, and correlations between merchant IDs and group IDs.

As well as supporting processing of VEP authorization requests, in someembodiments DEP Processing System 1000 may also support processing ofTCB payer authorization requests wherein payment management system 120may utilize a communication facility 1087 to communicate with paymentsystem(s) 106.

In some embodiment(s), VEP entity system(s) 105, may utilizecommunication facility 1086 to communicate with payment system(s) 106.For example, PayPal may debit a given purchase payment from apurchaser's MasterCard credit card funding account.

In some embodiments, some or all of communication facilities 1081, 1085,1086, and 1087 may utilize common underlying facilities. For example,one or several of said communication facilities may utilize theInternet, while other of said communication facilities may utilize acommon private network.

Referring further to FIG. 10, in some embodiments, Payment Client 1025 aand third party sourced POS system software may each be described as a“control entity”. In some embodiments, both control entities mayconcurrently display information on POS display device(s) 1024 thuscreating a “blended display”. The portion(s) of the blended display thatmay be sourced from Payment Client 1025 a may be referred to as “paymentcontrol subscreen(s)”. In some embodiments, a payment controlsubscreen(s) may occupy a portion of or the entire display of a givenPOS display device(s) 1024 and may over-write whatever was previouslydisplayed in the affected area of said POS display device(s) 1024. Theoperation of the payment control subscreen(s) may be coordinated betweenPayment Client 1025 a and POS system software so as not to unwittinglyoverwrite each other's display information. In some embodiments, to makesuch coordination easier to implement, a ‘toggling’ regime may beutilized whereby one or the other control entity operates POS input anddisplay device(s)—1022 and 1024 respectively—while the other controlentity may be in a ‘dormant’ state awaiting control to be toggled backto it. In some embodiments, as previously described, POS input device(s)1022 may be configured to encrypt input information—including but notlimited to purchaser payment credential(s) input at the reader head—suchthat POS system software as well as any potential malware on a POSterminal system 102 may be incapable of directly accessing such securedinput information.

In some embodiments, Payment Client 1025 a may concurrently operate morethan one separate POS input device(s) 1022 and/or POS display device(s)1024 to process a given purchaser 101's transaction. For example, thechecking clerk's POS display device(s) 1024 may be different than agiven purchaser's and may display more or different information. PaymentClient 1025 a may thus concurrently support different versions ofpayment control subscreens for the checking clerk and purchaser 101respectively. For example, the checking clerk's display screen mayinclude a photograph to help visually verify the identity of a givenpurchaser 101.

In some embodiments, a single device may provide facilities of both POSinput device(s) 1022 as well as POS display device(s) 1024—for example a‘pen-pad’.

In some embodiments, Payment Client 1025 a may exclusively operate POSinput device(s) 1022 and/or POS display device(s) 1024. For example,more primitive devices such as legacy pen-pads may be difficult orundesirable to operate using shared control with POS system software. Insome embodiments, Payment Client 1025 a may act in part as a proxy or asa virtual device providing an indirect means for POS system software todisplay information on POS display device(s) 1024 and read informationfrom POS input device(s) 1022. Such ‘virtualization’ of POS inputdevice(s) 1022 and/or POS display device(s) 1024 may make it easier fora POS system vendor to upgrade a merchant's POS terminal system withdifferent POS input device(s) 1022 and/or POS display device(s) 1024.

In some embodiments, Payment Client 1025 a may conduct some or all ofthe processing of the purchaser payment credential(s) in coordinationwith, but independent of POS system software. The degree to whichPayment Client 1025 a may share processing of the purchaser paymentcredential(s) with POS system software may be determined by apre-configured profile—a “persona”—that may be pre-configured by theappropriate third party POS system vendor and/or POS system softwaredeveloper(s) supporting a given POS terminal system 102. Depending onsaid pre-configuration of the persona, Payment Client 1025 a may byvarying degree share purchaser payment credential(s) with or isolatepurchaser payment credential(s) from POS system software—effectivelyproviding varying levels of Payment Client 1025 a autonomous operationand purchaser payment credential(s) security. Additionally, said personamay be pre-configured to establish the degree of coordination of controlof POS processor 1025, POS input device(s) 1022, and POS displaydevice(s) 1024 between Payment Client 1025 a and POS system software.The levels of security provided by various Payment Client 1025 apersonas may be devised so as to be compliant with third party securityaudit requirements including from organizations such as PCI (not shown)as well as operators of VEP entity system(s) 105 and/or paymentsystem(s) 106.

In some embodiments, POS terminal system 102 may obtain some or all ofthe EPI from the purchaser 101 utilizing POS display device(s) 1024and/or POS input device(s) 1022 and/or from previously storedtransaction information and/or other records. For example, such EPI maybe stored at POS terminal system 102 within a multi-merchant token, asdescribed previously. POS system software may provide said EPI toPayment Client 1025 a such that Payment Client 1025 a may acquire EPIfor a given purchaser 101 and communicate such EPI to payment managementsystem 120 via a communication facility 1081.

In some embodiments, DEP Processing System 1000 utilizing paymentmanagement system 120 may record the details of a payment transactionincluding but not be limited to; EPI, a transaction outcome indication,i.e., ‘approved’ or ‘declined’, and an “authorization code” (if any). Insome embodiments, some or all of such recorded details, or an identifierfor such recorded details, may be included in a multi-merchant token.Such a multi-merchant token may be communicated to POS terminal system102, where it may be stored as described previously. In someembodiments, to protect a given purchaser 101's privacy, portions of agiven transaction record included in a token may be redacted and/orencrypted.

In some embodiments, the EPI may be encrypted in part or in full at thereader head, or otherwise within a given POS input device(s) 1022, or byPOS system software prior to access to the EPI by Payment Client 1025 a.Furthermore, in some embodiments, portions or all of encrypted EPI maynot be decrypted by payment management system 120, but rathercommunicated in raw encrypted and/or multi-merchant tokenized form aspart of a given authorization request communicated to a given VEP entitysystem(s) 105 or given payment system(s) 106. In some embodiments, someor all of a given multi-merchant token may be exchanged with a given VEPentity system(s) 105 or given payment system(s) 106 and may be used insubsequent authorization requests such as for a refund transaction.

Given the rapid rate of advancement and cost reduction relative todisplay technology, some POS terminal systems 102 may utilize relativelyprimitive low-pixel count monochromatic POS display device(s) 1024 whileother POS terminal systems 102 may utilize high-pixel density color POSdisplay device(s) 1024 with display screens similar to those utilized inhundreds of millions of smart phones and tablet computers. Some POSinput device(s) 1022 may utilize relatively crude pressure or proximitysensing technology while other POS input device(s) may utilize‘intelligent’ touch sensors that automatically translate complex sets ofpurchaser movements into one or a series of ‘gesture command’ code(s).In some embodiments, a given purchaser 101 may utilize the purchaser'sown personal communication device, such as a smart phone or tabletcomputer, as POS input and/or display device(s)—1022 and 1024respectively. Such an increasingly broad range of innovative POSperipheral device technology potentially inter-mixed with relativelyprimitive legacy devices may place unwelcome development, support andsecurity audit burdens on numerous third party developers of POS systemsoftware. Payment Client 1025 a may decrease such burdens by assumingsome or all of the direct control of such POS input and/or displaydevice(s), including those devices dedicated specifically to paymentprocessing such as ‘pen pads’.

In some embodiments, “purchase item(s)” (not shown), i.e., good(s)and/or services(s), may be selected and paid for by a given purchaser101. The purchase item(s) selected by a given purchaser 101 may bescanned utilizing POS terminal system 102 to create a “ticket” (notshown) listing the purchase item(s) and the amount of payment requestedto compensate the transacting merchant in exchange for said purchaseitem(s).

In some embodiments, the purchaser 101 may combine several forms ofpayment to compensate the transacting merchant for the purchase item(s).For example, purchaser 101 may combine coupon(s), store creditvoucher(s) and perhaps some cash along with virtual electronic payment.In some embodiments, payment may be made via more than one of: VEPentity system(s) 105 and/or payment system(s) 106. For example, arestaurant bill payment may be split between a Google Wallet account anda Visa credit card account.

In some embodiments, Payment Client 1025 a may be utilized to facilitatepre-authorization of a contemplated purchase. In some embodiments, sucha pre-authorization transaction request may include a requested paymentamount, which may approximate the payment amount of an anticipatedpurchase, and that may be utilized to verify that a correspondingpurchase payment transaction request with a similar requested paymentamount may likely be approved. For example, a restaurant owning merchantmay pre-authorize the estimated cost of drinks and dinner before runninga tab for a given party of diners.

In some embodiments, a purchaser 101 may ‘check in’ with a chosen VEPentity by utilizing Payment Client 1025 a to select said chosen VEPentity and communicate purchaser payment credential(s) via paymentmanagement system 120 to VEP entity system(s) 105 of said chosen VEPentity. VEP entity system(s) 105 may utilize the said purchaser paymentcredential(s) to authenticate purchaser 101 and subsequently communicateto payment management system 120 a transaction response approving ordeclining the check-in authorization request. The “transaction outcome”(i.e., approved or declined) communicated in said transaction responsemay be communicated by payment management system 120 to Payment Client1025 a where said transaction outcome may be displayed to purchaser 101via POS display device(s) 1024.

In some embodiments, the transaction response communicated from a VEPentity system(s) 105 may include a “payment entity specified” (PES)token, which may include encrypted transaction related information forwhich the decryption key is held exclusively by said VEP entitysystem(s). Similar to a multi-merchant token exchanged between a POSterminal system 102 and the payment management system 120, a PES tokenmay be utilized in subsequent related transaction request(s) andtransaction response(s)—such as for a refund transaction—wherein the PEStoken is exchanged between payment management system 120 and VEP entitysystem(s) 105 in place of corresponding clear text transactioninformation. In some embodiments, the transaction information includedin a multi-merchant token may be the same or different from thetransaction information included in a PES token. In some embodiments, amulti-merchant token may include some or all of a corresponding PEStoken.

In some embodiments, a purchaser 101 may present previously purchaseditem(s) to the merchant for a refund or for a payment adjustment. Saidpurchaser 101 may also provide a receipt from the original transactionor provide detail(s) of the original transaction—such as SKU,transaction date, chosen payer and/or purchaser payment credential(s).Said merchant may use one or more of such details to retrieve a recordof the original transaction via POS terminal system 102. For example, atransaction identifier taken from such a receipt may be utilized byPayment Client 1025 a in order to retrieve a correspondingmulti-merchant token that may have been stored by POS terminal system102—as previously described—as part of the original transaction. PaymentClient 1025 a may communicate said multi-merchant token—included in arefund transaction request—to payment management system 120. Paymentmanagement system 120 may decrypt said multi-merchant token to extractEPI corresponding to the original transaction and/or to extract atransaction identifier corresponding to a stored transaction record fromwhich EPI may be retrieved. EPI extracted thusly from a multi-merchanttoken or retrieved from a stored transaction record may be utilized bypayment management system 120 to prepare an authorization request.

In some embodiments, Payment Client 1025 a attempting to process arefund transaction may be unable to directly retrieve a record of theoriginal purchase transaction from POS terminal system 102—perhapsbecause the original purchase was made at a different location.Consequently, Payment Client 1025 a may communicate a refundtransaction—including details of the original transaction supplied bypurchaser 101 and/or a receipt—to payment management system 120. Paymentmanagement system 120 may utilize said details of the originaltransaction to search for a corresponding stored transaction record,which may be utilized to prepare an authorization request. In someembodiments, if unable to directly retrieve such a transaction record,payment management system 120 may query VEP entity system(s) 105 and/orpayment system(s) 106 to retrieve a record of the original transaction.Such a retrieved record may contain only a portion of the EPI containedin the corresponding original authorization request. Also such aretrieved record of the original transaction may include encryptedinformation. In some embodiments, payment management system 120 mayutilize information from such a retrieved record to prepare anauthorization request. In some embodiments, payment management system120 may utilize information from such a retrieved record to search for acorresponding transaction record stored previously by payment managementsystem 120, which may be utilized by payment management system 120 toprepare an authorization request.

In some embodiments, Payment Client 1025 a may facilitate utilization ofa display device(s) 1024 to search for and view transaction recordsstored by payment system 120 so as to manually locate a transactionrecord(s) of an original transaction(s) corresponding to an intendedrefund transaction. EPI from such a transaction record(s), once located,may be utilized by payment management system 120 to prepare anauthorization request for a refund transaction.

In some embodiments of DEP Processing System 1000, payment managementsystem 120 may support interfaces to various VEP entity system(s) 105wherein said VEP entity system(s) may utilize interface schemes that mayvary from VEP entity to VEP entity.POS terminal system 102.

Referring to FIG. 11, in some embodiments, a given purchaser 101 mayutilize Payment Client 1025 a, via a given POS terminal system 102, toperform payment related transactions such as: check-in,pre-authorization, purchase payment, and refund. The ordering of stepsin the processing of a payment related transaction may have numerousembodiments; therefore, FIG. 11 represents an exemplary embodiment.

Referring further to FIG. 11, at step 1110, POS terminal system 102 maydetermine the transaction type based on input from purchaser 101utilizing POS input device(s) 1022.

At step 1120, in some embodiments POS terminal system 102 may utilizePOS display device(s) 1024 to offer a given purchaser 101 a selection ofone or more tender option(s) from a set of such tender option(s)supported by POS terminal system 102. POS terminal system 102 may usePOS input Device(s) 1022 to determine a given purchaser's selection oftender option(s). Tender option(s) may include but not be limited to:cash, bank check, store credit, credit card, debit card, and/or VEP. Inthe example of a refund—the tender type may be determined automaticallybased on the tender utilized in the corresponding original transactionpayment.

At step 1130, in some embodiments, a given purchaser 101 may selectand/or cause to be automatically selected an electronic payment tenderoption that requires authorization from VEP entity system(s) 105 and/orpayment system(s) 106 remote from POS terminal system 102.Alternatively, that purchaser 101 may opt for one or more forms oftender that do not require such remote authorization—say cash and/orstore credit voucher(s) and/or coupon(s)—in which case POS terminalsystem 102 may process the payment locally and the electronic paymentprocessing services accessed utilizing Payment Client 1025 a and/orpayment management system 120 may not be required for that processing.

Referring to step 1140, in some embodiments, Payment Client 1025 a mayutilize POS display device(s) 1024 and POS input device(s) 1022 toprovide a given purchaser 101 a selection of payer(s) and determine saidpurchaser's choice of payer. In the descriptions that follow, whicheverof VEP entity system(s) 105 or payment system(s) 106 that may beselected for a given authorization request—such choice may be referredto collectively as “chosen payer system(s)” in order to avoid therepeated recitation of the payer choice options cited above.

FIG. 12 provides an exemplary illustration of a payment controlsubscreen 1200 offering a list of payers from which a given purchaser101 may choose. In that example, some of the payers include TCB payers:American Express 1250, MasterCard 1260, Visa 1270 and Discover 1280; andinclude some VEP entities: PayPal 1220, Google Wallet 1230, and Dwolla1240. Purchaser 101 may decide not to choose any of the payers offeredby Payment Client 1025 a and may choose instead to exit payment controlsubscreen 1200 without choosing a payer. An ‘exit’ selection 1290 may belabeled in numerous ways such as ‘cancel’, ‘exit’, ‘back’ or otherwording or symbology that may indicate to purchaser 101 that paymentcontrol subscreen 1200 may be exited without choosing a payer.

FIG. 13 provides an exemplary illustration of a payer list configurationfacility screen 1300 whereby a merchant may configure which payers aredisplayed in the payer choice payment control subscreen 1200. In someembodiments, the payer list configuration facility (not shown) maygenerate a ‘payer list’ that may be stored in Payment Depository 1028 ofPOS terminal system 102 for use by Payment Client 1025 a at such time asa payer choice payment control subscreen 1200 may be displayed to agiven purchaser 101. In some embodiments, the payment list configurationfacility may be accessed utilizing POS input devices(s) 1022 and POSdisplay device(s) 1024. In some embodiments, the payment listconfiguration facility may be network accessible.

The payer choice payment control subscreen 1200 and the correspondingpayment interpreter configuration screen 1300 may be pre-configurableand/or otherwise modifiable for a given POS terminal system 102 vianetwork accessed updates such that the presence, ordering, visualprominence and/or visual representation of the various payers—asdisplayed via payer choice payment control sub-screen 1200—may bealtered by the appropriate POS system vendor and/or POS system softwaredeveloper(s).

In some embodiments, the persona pre-configuration facility—utilized bythe appropriate supporting POS vendor and/or POS system softwaredeveloper(s)—, may additionally facilitate the pre-configuration of thepayer options subsequently configured by the merchant utilizing paymentinterpreter configuration screen 1300 and displayed via payer choicepayment control sub-screen 1200.

Referring further to FIG. 11, at step 1150, in some embodiments, PaymentClient 1025 a may determine from POS terminal system 102 the requestedpayment amount and include it with the EPI. For a check-in transaction,in some embodiments, the requested payment amount need not be evaluated.For a pre-authorization transaction, the requested payment amount maycommonly be the amount of an anticipated future purchase andcorresponding purchase payment transaction request. For a purchasepayment, the requested payment amount may be the cost of the purchaseditem(s). For a refund, the requested payment amount may be the amount ofthe full or partial refund.

Referring to step 1160, in some embodiments, Payment Client 1025 a mayutilize POS display device(s) 1024 and POS input device(s) 1022 toreceive payment credential(s) from a given purchaser 101. Paymentcredential(s) may vary depending on said purchaser's chosen payer,therefore Payment Client 1025 a may prompt for the appropriate paymentcredential(s) required by said chosen payer. In some embodiments,purchaser 101 may be offered more than one facility for providingpayment credential(s) and Payment Client 1025 a may receive said paymentcredential(s) from whichever POS input device(s) 1022 corresponds to agiven purchaser's choice of input facility. For example, a givenpurchaser 101 may have the choice of payment card swipe, wirelesscommunication from personal electronic device, optically scanned inputof a bar code or QR code, or manually typed credential(s) entry using akeypad. In the example of a refund, transaction identifying informationmay be input to POS terminal system 102 and utilized by Payment Client1025 a to reference stored EPI from the corresponding originaltransaction information record (not shown)—including purchaser paymentcredential(s)—that may be retrieved and utilized by Payment Client 1025a for inclusion in the EPI.

Given that some merchants operate multiple physical locations—forexample Home Depot—a purchaser 101 may make a purchase payment at onelocation and subsequently request a corresponding refund at a differentlocation of the same merchant. Payment management system 120 mayfacilitate such a distributed sequence of transactions by providingcentrality for the storage and subsequent retrieval of transactionrecords.

FIG. 14 describes step 1160 in greater detail by depicting someembodiments of receiving purchaser credential(s).

At step 1410, in some embodiments, for a transaction such as a refund,EPI including purchaser credential(s) may be retrieved in part or inwhole from a stored transaction information record such as for apurchase payment.

At step 1420, if a previous related transaction(s) may be identified andsuccessfully looked up, said previous related transaction(s)' retrievedEPI—including purchaser credential(s)—may be utilized in processing thecurrent related transaction, instead of receiving purchasercredential(s) from purchaser 101.

At step 1430, in some embodiments, purchaser credential(s) may includeaccount identifying information or purchaser identifying informationdepending on requirements of the chosen payer system(s). TCB payersutilize a unique primary account number as part or all of the purchaserpayment credential(s). Similarly, some VEP entities may issue a cardwith a machine readable PAN. Typically paired with purchaser secretinformation—e.g., a PIN manually entered by purchaser 101 via POS inputdevice(s) 1022—card sourced VEP purchaser payment credential(s) mayappear very much like those of a debit card. However, numerous VEPentities may require or offer a given purchaser 101 the opportunity ofproviding purchaser payment credential(s) without the use of a paymentcard—for example utilizing a key pad on POS input device(s) 1022 toenter them manually or communicating purchaser payment credential(s)from a smartphone or similar personal electronic device.

At step 1440, in some embodiments, if account identifying informationmay be required by the chosen payer system(s), for example a 16-digitPAN, POS display device(s) 1024 may be utilized to prompt purchaser 101for said account identifying information. POS input device(s) 1022 maybe utilized by Payment Client 1025 a to receive the identifyinginformation from purchaser 101.

At step 1450, in some embodiments, if purchaser identifying information,for example a 10-digit telephone number, may be required by the chosenpayer system(s), POS display device(s) 1024 may be utilized to promptpurchaser 101 for said purchaser identifying information. POS inputdevice(s) 1022 may be utilized by Payment Client 1025 a to receive thepurchaser identifying information from purchaser 101.

At step 1460, in some embodiments, purchaser credential(s) may includepurchaser secret information depending on requirements of the chosenpayer system(s). Some chosen payer system(s) may not require a purchasersecret. For example, some credit card payers require only the PANacquired at step 1440 above.

At step 1470, in some embodiments, if purchaser secret information maybe required by the chosen payer system(s), for example a 4-digit PIN orperhaps a 5-digit billing zip code, POS display device(s) 1024 may beutilized to prompt purchaser 101 for said purchaser secret information.POS input device(s) 1022 may be utilized to receive purchaser secretinformation from purchaser 101.

Referring again to FIG. 11, at step 1170, in some embodiments, PaymentClient 1025 a may communicate a transaction request to paymentmanagement system 120 utilizing communication facility 1081. Saidtransaction request may include EPI received from purchaser 101 via POSinput device(s) 1022 and/or EPI retrieved from transaction informationrecords) stored at POS terminal system 102. Furthermore, saidcommunicated transaction request may include the choice of payer andtransaction type, which may be utilized by payment management system 120in the preparation of a corresponding authorization request to becommunicated to the chosen payer system(s). In addition to informationincluded in said transaction request, such a corresponding authorizationrequest may be prepared by payment management system 120 utilizing EPIretrieved from stored transaction information record(s) of paymentmanagement system 120. Furthermore, in the example of a refundtransaction, payment management system 120 may include a retrieved PEStoken in such an authorization request, which may allow the chosen payersystem(s) to retrieve EPI from said PES token or from correspondingstored record(s) of previous related transaction(s). Accordingly,purchaser payment credential(s) may be included directly in EPI includedin such an authorization request; and/or purchaser payment credential(s)may be retrieved from stored record(s) by the chosen payer system(s)based on information such as PES token(s) included in such anauthorization request.

At step 1180, in some embodiments, an attempt to process a paymentrelated transaction may be made on behalf of POS terminal system 102 bypayment management system 120 communicating an authorization request tothe chosen payer system(s).

FIG. 15 describes step 1180 in greater detail by depicting someembodiments of requesting authorization of a payment relatedtransaction.

At step 1540, in some embodiments, payment management system 120 maydetermine if the chosen payer system(s) may be communicative. Forexample, communicativity with a given chosen payer system(s) may beverified by communicating a given authorization request and receiving acorresponding transaction response; or by separate facilities thathandshake or otherwise derive an indication of active communicativitywith chosen payer system(s), including but not limited to a transactionresponse to a prior authorization request.

If the chosen payer system(s) may not be communicative, at step 1550 insome embodiments, payment management system 120 may process a givenpurchaser 101's transaction request directly. For example, particularlyfor high-volume payers such as Visa, payment management system 120 may‘stand-in’ for the non-communicative chosen payer system(s)—i.e.,approve the authorization request—and subsequently ‘settle’ with saidnon-communicative chosen payer system(s) when communication may bere-established. Alternatively, payment management system 120 may simplydecline the authorization request and direct purchaser 101 via PaymentClient 1025 a to select a different payer choice utilizing POS displaydevice(s) and POS input device(s)—1024 and 1022 respectively.

If the chosen payer system(s) may be communicative, at step 1560 in someembodiments, payment management system 120 may request processing of thepayment related transaction by communicating a correspondingauthorization request to the chosen payer system(s). As describedpreviously, a given VEP entity or TCB payer may have unique requirementsfor the communication of an authorization request. For example: specificinformation included with an authorization request, communicationprotocol(s) and/or data format(s) utilized for an authorization request,PES token(s) utilized in an authorization request and/or in acorresponding transaction response, as well as additional securityprocedures. In an example where purchaser 101 may have chosen a VEPentity as payer, payment management system 120 may communicate with VEPentity system(s) 105 via communication facility 1085. Alternatively,where purchaser 101 may have chosen a TCB payer, payment managementsystem 120 may communicate with payment system(s) 106 via communicationfacility 1087. The chosen payer system(s) may communicate to paymentmanagement system 120 in response to an authorization request with atransaction response approving or declining said authorization request.In the example of an approval, chosen payer system(s) may communicate aconfirming authorization code possibly included in or represented by aPES token.

In some embodiments, transaction responses may be returned in adifferent order than the order in which authorization requests may havebeen communicated to a given VEP entity system(s) 105 or a given paymentsystem(s) 106. Therefore, a given transaction response received bypayment management system 120 may include an authorization requestidentifier peering said transaction response to said correspondingauthorization request. For example, such an authorization requestidentifier may be a multi-merchant token created by payment managementsystem 120, or perhaps a PES token created by a VEP entity system(s) 105or a payment system(s) 106. The specific composition and format of suchan authorization request identifier may be determined by, and thereforevary according to, requirements of a given VEP entity or TCB payer.

In some embodiments, payment management system 120 may include a giventransaction response in full or in part in a corresponding storedtransaction record. Payment management system 120 may generate andutilize a unique transaction identifier so as to subsequently identifyand retrieve such a stored transaction record. In some embodiments, sucha transaction identifier may also include identifying subcomponentsgenerated by or associated with POS terminal system 102, paymentinterpreter 1025 a and/or the chosen payer system(s). In someembodiments such a transaction identifier may include part or all of amulti-merchant token and/or a PES token.

At step 1570, payment management system 120 may communicate a“transaction outcome response” including a ‘transaction approved’indication or a ‘transaction declined’ indication to Payment Client 1025a. Payment Client 1025 a may determine based on said indication whatsort of “outcome message” to display to purchaser 101. Additionally, insome embodiments, such a transaction outcome response may include theidentifier of a corresponding stored transaction record such that saidtransaction record identifier may be stored by a given transacting POSterminal system 102 and/or included in ticket information used toproduce a receipt for a given purchaser 101. So for example, atransaction record of an approved purchase payment transaction may bestored by payment management system 120 and a corresponding transactionrecord identifier may be communicated to POS terminal system 102 via atransaction outcome response and included in a given purchaser'sreceipt. Said purchaser 101, for the purposes of acquiring a refund, maysubsequently provide said transaction record identifier from saidreceipt and POS terminal system 102 may utilize said transaction recordidentifier to request a refund transaction via Payment Client 1025 a asdescribed previously. In some embodiments, such a transaction record mayinclude the EPI from the corresponding authorization request, which maysubsequently be utilized to prepare a new authorization requestcorresponding to a previous transaction, as in this example—a refundauthorization request corresponding to a previous purchase paymenttransaction. Payment management system 120 may include a copy of acorresponding authorization code in a given transaction record. Paymentmanagement system 120 may forward a copy of said transaction record toPayment Client 1025 a along with or including a transaction outcomeindication (i.e., approved or declined), EPI and/or other transactionidentifying information that may identify the corresponding paymentrelated transaction to Payment Client 1025 a and the POS terminal system102.

At step 1580 in some embodiments, if ‘transaction approved’ isindicated, Payment Client 1025 a may display an outcome message topurchaser 101 utilizing POS display device(s) 1024 indicating approvalof the transaction. Furthermore, Payment Client 1025 a may inform POSterminal system 102 of the status of the purchaser's transaction request(i.e., approved) and may provide a copy of the confirming authorizationcode should the authorization request be approved. POS terminal system102 may utilize POS display device(s) 1024 such as a printer to producea receipt for purchaser 101 that may serve as evidence of thetransaction and may include a transaction identifier that may beutilized for subsequent related transactions such as a refund.

At step 1590, in some embodiments if ‘transaction declined’ isindicated—Payment Client 1025 a may display an outcome message topurchaser 101 utilizing POS display device(s) 1024 indicating thetransaction was declined. In some embodiments, payment management system120 may store a transaction record for a given transaction response thatdeclines a given authorization request.

Referring again to FIG. 11 at step 1190, in some embodiments, paymentmanagement system 120 may post-process the transaction. For example,payment management system 120 may store a record of a given transactioninformation including the EPI and/or the corresponding authorizationrequest and transaction response in a data base such as data tier 114and may associate a unique transaction identifier with said record. Theinformation thus recorded may be analyzed subsequently for utilizationin supplemental activities such as a loyalty program, targeted productmarketing, or otherwise to develop measurements to help manage andimprove DEP Processing System 1000.

Many additions and modifications are possible. In some embodiments, aPOS terminal system 102 may be comprised of more than one POS terminalat a given merchant location, wherein said POS terminals may benetworked together to operate within a single POS terminal system 102.Such a POS terminal system 102 with multiple POS terminals may utilize acentralized shared Payment Depository 1028 and communication facility1081.

In some embodiments, a given purchaser 101 may provide purchaser paymentcredential(s) such as for a VEP entity account or a debit card accountor a credit card account prior to making any purchases. For example, apre-authorization may be run utilizing said credential(s) to verify thelikelihood of payment for purchases that purchaser 101 may beanticipated to subsequently make. A multi-merchant token may be created,as described previously, and said token may be retained by PaymentClient 1025 a by storing it in Payment Depository 1028. The informationencoded in said token and/or referenced by it may be utilizedsubsequently to submit an authorization request via payment managementsystem 120 to a chosen payer system(s) without requiring purchaser 101to provide purchaser payment credential(s) again. Operation such as thismay sometimes be utilized for ‘running a tab’.

In some embodiments, DEP Processing System 1000 may support aconfiguration facility such that Payment Client 1025 a may be configuredto operate with POS input device(s) 1022 and/or POS display device(s)1024 different from those previously operated with a given POS terminalsystem 102.

In some embodiments, utilizing network accessed updates, Payment Client1025 a may provide operation and control support for new and enhancedPOS input device(s) 1022 and POS display device(s) 1024. For example, anenhanced POS input device may facilitate purchaser credentialing and/orauthentication by bio-metric measurement and/or reception of purchasertransported or embedded identification ‘tags’. Such tags may be embeddedin clothing, jewelry, body enhancements, or embedded sub-dermally ordeeper. Nanotechnology and biomechanical tags may be supported as well.A number of biometric technologies are already available includingfinger print scans, retinal scans, and facial, vocal, and speech patternrecognition. It may be within reason to anticipate DNA sequencing basedidentification. In some embodiments, DEP Processing System 1000 mayutilize payment management system 120 to record biometric measurementsmade of a given purchaser 101 at a given POS. Additionally, paymentmanagement system 120 may be utilized to authenticate said measurementsagainst biometric information associated with said specific purchaser101 that may have been premeasured or recorded previously—possiblyutilizing other POS terminal system(s) 102. In some embodiments, suchpre-measured biometric information may be stored by payment managementsystem 120 or for greater security may be stored by a third party system(not shown). In some embodiments, biometric measurements may beencrypted immediately at the reader head and via end to end (E2E)encryption be utilized by payment management system 120 in an encryptedform and/or communicated securely to an aforementioned third partysystem. In some embodiments, such a third party system may authenticatea given purchaser against biometric pre-measurements maintained securelyby said third party system. Additionally, a given purchaser may beidentified by a personal device that may serve to vouch for purchaser101 and provide authentication, credentialing, and/or geo-positionupdates on a periodic basis. Many scanning sensor devices that may beutilized as POS input device(s) 1022 utilize various frequencies ofradiation from sound up through visible light and higher to receivesignals. Some such scanning devices may operate in multiple frequencyranges and may combine numerous readings and measurements into acomposite identification/authentication.

In some embodiments, Payment Client 1025 a may include an‘auto-configuration’ facility whereby Payment Client 1025 a may use oneor more input/output operations to determine the identity of a given POSinput device(s) 1022 and/or POS display device(s) 1024 and havingidentified such device(s), Payment Client 1025 a may automaticallyconfigure itself to configure and/or operate said device(s).

In some embodiments, DEP Processing Systems 1000 may provide and/orfacilitate a credential(s) translation service whereby a purchaser mayenter purchaser payment credential(s) for a different payer other thanthe chosen payer—for example by swiping a Visa credit card when thechosen payer is Dwolla. In some embodiments, payment management system120 may make and/or facilitate said translation using systems andmethods including but not limited to: utilizing existing transactioninformation records from previous transactions stored in PaymentDepository 1028 and/or payment management system 120 to prepare thepurchaser payment credential(s) required by the chosen payer; orquerying the chosen payer and requesting said chosen payer attempt atranslation based on records they have access to. Such a credential(s)translation may yield a portion of purchaser payment credential(s) andstill require a given purchaser 101 to directly provide additionalpurchaser payment credential(s). For example, the aforementioned Visacard may be read by POS input device(s) 1022 and a given purchaser 101'sVisa account number read from said card may be translated to derive thatpurchaser's Dwolla primary account number or account referencing numbersuch as a ten digit phone number. In this example, purchaser 101 may berequired to input the PIN required by Dwolla. To protect a givenpurchaser's EPI, PES tokens with encrypted account information may beexchanged between payment management system 120 and the chosen payersystem(s).

In some embodiments, applicable transaction fees if any may be deductedby DEP processing system 1000 from a given transaction payment and saidtransaction fees may be credited to the appropriate entity such as theoperator of payment management system 120 and/or a given purchaser 101'schosen payer.

In some embodiments, DEP Processing System 1000 utilizing paymentmanagement system 120 and/or Payment Client 1025 a may act as proxy fora chosen payer so as to conduct a dynamic authentication of a givenpurchaser 101 using for example a challenge/response sequence based onone of several purchaser pre-configured challenge/responses.

In some embodiments, DEP Processing System 1000 utilizing Payment Client1025 a may provide support at the POS for more than one human naturallanguage—for example Spanish in addition to English. Similarly, in someembodiments, spoken language support may be available for visuallyimpaired purchasers. In some embodiments, such ‘supplemental’ languagefeatures may be enabled or disabled utilizing a configuration facilityanalogous to the payer choice selection facility exemplified by FIG. 15.

In some embodiments, Payment Client 1025 a may incorporate facilitiesfor network-accessed feature updates. Such updates would allow for addedfeature support for new transaction types, technologies and/or relateddevices. For example, a Payment Client 1025 a may be updated to controla newly introduced Near Field Communications (NFC) device.

In some embodiments, Payment Client 1025 a may coordinate display andinput control via interpretable language such as XML so as to allow POSsystem software and/or the developers of POS system software to modifyportions of the XML or augment it with CSS or similar facilitiesallowing changes to features, such as fonts and colors, so as to allow aclose match of ‘look and feel’ between screens controlled by POS systemsoftware and payment control subscreens controlled by Payment Client1025 a.

In some embodiments, the interface(s) used by Payment Client 1025 a tocommunicate and interoperate with payment management system 120 may beexposed, e.g., with ongoing documented and maintained API(s), such thatPOS system software developers may directly access said interface(s). Insome embodiments, a given POS developer may choose not to utilize or tointegrate Payment Client 1025 a into POS terminal system 102 and maychoose instead to utilize said interface(s), which may otherwise provideaccess to services to Payment Client 1025 a, thus allowing POS systemsoftware to perform the equivalent functions of Payment Client 1025 a,but with more control by POS system software over the purchaserexperience and the purchaser entered data.

In some embodiments, Payment Client 1025 a may execute as a ‘native app’or as a ‘web app’ on individual purchasers' 101 smart phones, tabletcomputers, and similar network connected personal communication andcomputing devices (not shown). In some embodiments, such an ‘appversion’ Payment Client 1025 a may communicate using a mechanism such asremote procedure call to expose an API(s) to POS system software. A‘docking facility’ may provide support for credential(s) exchange andtokenization so as to provide trusted peering with a given ‘app version’of Payment Client 1025 a and to provide security against threats such as‘man in the middle’ attacks.

In some embodiments, an app version of Payment Client 1025 a may‘tunnel’ POS terminal system 102 utilizing encrypted communications withpayment management system 120.

In some embodiments, Payment Client 1025 a may operate on paymentmanagement system 120, for example as a body of PHP code, with a genericagent (not shown) such as a browser integrated with POS system software.In alternative embodiments, Payment Client 1025 a may operate on anetwork-accessible web server.

In some embodiments, an authorization request may be prepared by PaymentClient 1025 a (rather than payment management system 120) andcommunicated via payment management system 120 to the chosen payersystem(s).

Referring to FIG. 11, in alternative embodiments, steps 1140, 1150, and1160 may occur in varying permutations of ordering.

In some embodiments, DEP Processing System 1000 may provide unique frauddetection, fraud suppression and/or fraud alert facilities. Paymentmanagement system 120, as an aggregation and distribution facilitybetween numerous merchant POS terminal systems 102 and a number of VEPentity systems 105 and payment systems 106 may be uniquely situated tocollect, store, aggregate, analyze and distribute information regardingboth legitimate and fraudulent payment related transactions. Inparticular, the distributed presence of Payment Clients 1025 a withinnumerous POS terminal systems 102 may provide payment management system120 the ability to acquire fraud related data from location(s) wherefraud may actually be physically committed. For example, a given PaymentClient 1025 a may operate an imaging system as part of POS inputdevice(s) 1022, allowing an image of a fraudulent purchaser to beacquired at the POS. More sophisticated biometric measuring POS inputdevice(s) 1022 may be able to directly identify a given fraudulentpurchaser. In another example, Payment Client 1025 a may provide afacility for a given checking clerk to ‘flag’ a transaction as ‘possiblyfraudulent’ should said clerk have a suspicion about the behavior of agiven purchaser 101. Payment Client 1025 a may also provide a fraudalert facility whereby an alert may be displayed on POS displaydevice(s) 1024 of checking clerk(s) at a POS location where a givenpurchaser 101 may be attempting utilization of a payment account thatmay be suspected to be compromised. The cumulative effect ofdistributing fraud vigilance facilities to physical POS locations may beto suppress fraudulent payment attempts at merchant locations.

In some embodiments, DEP Processing System 1000 may record transactioninformation including but not limited to: EPI, purchase ticketinformation, and/or POS identifying information. Such recordedtransaction information may be stored by Payment Client 1025 a inPayment Depository 1028 and/or by payment management system 120. In someembodiments, payment management system 120 may be utilized as a storefor aggregations of such recorded transaction information such that suchrecords may be retained longer than may otherwise be practical ordesirable for such records to be stored at a given POS terminal system102.

In some embodiments, DEP Processing System 1000 may utilize POS displaydevice(s) 1024 and POS input device(s) 1022 to provide payment relatedservices sourced from payment management system 120 directly. Forexample, following a check-in transaction establishing the identity of agiven purchaser 101, payment management system 120 may provideelectronic coupons as partial payment for a given purchase. In someembodiments, for example, DEP Processing System 1000 may thuslyfacilitate ‘turn-key’ merchant loyalty programs.

In some embodiments, the operation of Payment Client 1025 a and/or the‘look and feel’ of Payment Client 1025 a payment control subscreens mayconfigured after Payment Client 1025 a may be executing on POS terminalsystem 102. In some embodiments, Payment Client 1025 a may be configuredvia “configuration subscreens” operated by Payment Client 1025 autilizing POS input device(s) 1022 and POS display device(s) 1024. Theresulting configuration changes may be stored utilizing PaymentDepository 1028. In alternate embodiments, configuration may befacilitated via network accessible configuration software executing on asystem remote and separate from POS terminal system 102—for example, thepayment management system 120. Such a remote configuration system maysupport numerous POS terminal systems 102 such that one configurationmay be applied to one or more POS terminal systems 102—facilitatingconfigurations that may differ between POS terminal systems or may bethe same for two or more POS terminal systems. In some embodiments, agiven configuration configured utilizing such a remote configurationsystem may be stored so as to be accessible via payment managementsystem 120 and may be communicated to a given POS terminal system 102utilizing communication facility 1081.

In some embodiments, the payment management system 120 may encrypt agiven stored transaction record and include the corresponding decryptionkey in a multi-merchant token communicated to the transacting POSterminal system 102. Payment system 120 may discard its copy of theplain text decryption key, such that the decryption key from themulti-merchant token may be required in order to subsequently decryptthe transaction record stored at payment system 120.

In sum, the present invention provides a system and methods formulti-merchant tokenization of transaction payments augmented by andintegrated with processing of virtual electronic payments (VEP). Theadvantages of such a system include the ability to provide anon-disruptive solution for processing virtual electronic payments thatmay be quickly and cost-effectively integrated with existing POSterminal systems from numerous POS system vendors and with a widevariety of POS input and POS display device configurations withoutinterfering with or significantly altering the existing processing ofother types of payment. Additionally, support for a given VEP entity maybe directly configured on or off by a given merchant without requiringsoftware reconfiguration by a POS system vendor. And furthermore, the‘look and feel’ of said processing of VEP may be configured and/oradapted to integrate relatively seamlessly with existing POS systemsoftware so as to appear to the purchaser and to the merchant to be justanother feature seemingly provided by the POS system vendor.

While this invention has been described in terms of several embodiments,there are alterations, modifications, permutations, and substituteequivalents, which fall within the scope of this invention.

It should also be noted that there are many alternative ways ofimplementing the methods and systems of the present invention. It istherefore intended that the following appended claims be interpreted asincluding all such alterations, modifications, permutations, andsubstitute equivalents as fall within the true spirit and scope of thepresent invention.

What is claimed is:
 1. A computer-implemented method for electronic transaction information conversion comprising: receiving, at a remote payment management system, a transaction from a point of sale (POS) terminal of a merchant, the transaction comprising a transaction amount, purchaser payment credentials comprising an encrypted primary account number, and a payer ID associated with a first payer system selected at the POS terminal; determining, by the remote payment management system, the selected first payer system based on the payer ID; determining, by the remote payment management system, that the primary account number is associated with a second payer system different from the first payer system based upon decrypting the primary account number to retrieve account information; based on the determining that the primary account number is associated with the second payer system, translating, by the remote payment management system, the primary account number to a primary account number associated with the payer ID of the selected first payer system, wherein the translation includes utilizing transaction records from previous transactions to derive the primary account number associated with the selected first payer system; routing, by the remote payment management system, the transaction amount and the translated primary account number associated with the payer ID to the selected first payer system; receiving, at the remote payment management system, an approval response approving the transaction from the selected first payer system; and outputting the received approval response to the POS terminal.
 2. The method of claim 1, wherein the transaction is encrypted at a reader head of the POS terminal.
 3. The method of claim 1, further comprising: verifying, by the remote payment management system, a communication with the selected first payer system, the verification includes communicating an authorization request to receive a corresponding transaction response; determining, by the remote payment management system, that communication with the selected first payer system cannot be established; and based on the determining that communication with the selected first payer system cannot be established: processing, by the remote payment management system, the transaction; generating, by the remote payment management system, an approval response for the transaction; outputting, by the remote payment management system at a first time, the generated approval response to the POS terminal; and routing, by the remote payment management system at a second time later than the first time, the transaction amount and the primary account number associated with the payer ID to the selected first payer system, wherein communication with the selected first payer system is established at the second time, and wherein the transaction amount is settled with the selected first payer system.
 4. The method of claim 1, wherein the determining, by the remote payment management system, that the primary account number is associated with the second payer system comprises: identifying the second payer system from a transaction record previously stored in a payment repository in communication with the POS terminal.
 5. The method of claim 4, wherein the translating, by the remote payment management system, the primary account number to the primary account number associated with the payer ID comprises: requesting the selected first payer system to translate the primary account number to the primary account number associated with the payer ID based on one or more transaction records accessible by the selected first payer system, wherein a portion of the purchaser payment credentials is translated and the purchaser is required to provide additional purchaser payment credentials.
 6. The method of claim 1, wherein the transaction further comprises a merchant identifier, and wherein the merchant identifier is validated by comparing against a plurality of merchant logs to determine the merchant is configured for tokenization.
 7. The method of claim 6, further comprising: determining the POS terminal is configured to process tokens by validating the merchant identifier against the plurality of merchant logs; generating, by the remote payment management system, an encrypted token for the transaction, the encrypted token comprising the primary account number associated with the payer ID, an expiration date, and a group ID, wherein the merchant is associated with the group ID to redeem the tokens upon determining the merchant's configuration matches the transaction; and outputting, by the remote payment management system, the encrypted token with the received approval response to the POS terminal.
 8. The method of claim 7, further comprising: receiving, by the remote payment management system, the encrypted token from the POS terminal; retrieving the primary account number associated with the payer ID, the expiration date, and the group identifier by decrypting, by the remote payment management system, the encrypted token; comparing, by the remote payment management system, the group identifier to the merchant identifier in the merchant logs; providing, by the remote payment management system, the primary account number associated with the payer ID, the transaction amount, and a merchant account identifier to the selected first payer system; receiving, by the remote payment management system, a second approval response from the selected first payer system; and outputting, by the remote payment management system, the second approval response to the POS terminal.
 9. A system for electronic transaction information conversion comprising: one or more processors; and a storage device storing instructions which, when executed by the one or more processors, cause the one or more processors to perform a method comprising: receiving a transaction from a point of sale (POS) terminal of a merchant, the transaction comprising a transaction amount, purchaser payment credentials comprising an encrypted primary account number, and a payer ID associated with a first payer system selected at the POS terminal; determining the selected first payer system based on the payer ID; determining that the primary account number is associated with a second payer system different from the first payer system based upon decrypting the primary account number to retrieve account information; based on the determining that the primary account number is associated with the second payer system, translating the primary account number to a primary account number associated with the payer ID of the selected first payer system, wherein the translation includes utilizing transaction records from previous transactions to derive the primary account number associated with the selected first payer system; routing the transaction amount and the translated primary account number associated with the payer ID to the selected first payer system; receiving an approval response approving the transaction from the selected first payer system; and outputting the received approval response to the POS terminal.
 10. The system of claim 9, wherein the transaction is encrypted at a reader head of the POS terminal.
 11. The system of claim 9, wherein the method further comprises: verifying a communication with the selected first payer system, the verification includes communicating an authorization request to receive a corresponding transaction response; determining that communication with the selected first payer system cannot be established; and based on the determining that communication with the selected first payer system cannot be established: processing the transaction to generate an approval response for the transaction; outputting, at a first time, the generated approval response to the POS terminal; and routing, at a second time later than the first time, the transaction amount and the primary account number associated with the payer ID to the selected first payer system, wherein communication with the selected first payer system is established at the second time, and wherein the transaction amount is settled with the selected first payer system.
 12. The system of claim 9, wherein the determining that the primary account number is associated with the second payer system comprises: identifying the second payer system from a transaction record previously stored in a payment repository in communication with the POS terminal.
 13. The system of claim 12, wherein the translating the primary account number to the primary account number associated with the payer ID comprises: requesting the selected first payer system to translate the primary account number to the primary account number associated with the payer ID based on one or more transaction records accessible by the selected first payer system, wherein a portion of the purchaser payment credentials is translated and the purchaser is required to provide additional purchaser payment credentials.
 14. The system of claim 9, wherein the transaction further comprises a merchant identifier, and wherein the merchant identifier is validated by comparing against a plurality of merchant logs to determine the merchant is configured for tokenization.
 15. The system of claim 14, wherein the method further comprises: determining the POS terminal is configured to process tokens by validating the merchant identifier against the plurality of merchant logs; generating an encrypted token for the transaction, the encrypted token comprising the primary account number associated with the payer ID, an expiration date, and a group ID, wherein the merchant is associated with the group ID to redeem the tokens upon determining the merchant's configuration matches the transaction; and outputting the encrypted token with the received approval response to the POS terminal.
 16. The system of claim 15, wherein the method further comprises: receiving the encrypted token from the POS terminal; retrieving the primary account number associated with the payer ID, the expiration date, and the group identifier by decrypting the encrypted token; comparing the group identifier to the merchant identifier in the merchant logs; providing the primary account number associated with the payer ID, the transaction amount, and a merchant account identifier to the selected first payer system; receiving a second approval response from the selected first payer system; and outputting the second approval response to the POS terminal.
 17. A non-transitory computer readable medium for electronic transaction information conversion, the non-transitory computer readable medium storing instructions which, when executed by one or more processors, cause the one or more processors to perform a method comprising: receiving a transaction from a point of sale (POS) terminal of a merchant, the transaction comprising a transaction amount, purchaser payment credentials comprising an encrypted primary account number, and a payer ID associated with a first payer system selected at the POS terminal; determining the selected first payer system based on the payer ID; determining that the primary account number is associated with a second payer system different from the first payer system based upon decrypting the primary account number to retrieve account information; based on the determining that the primary account number is associated with the second payer system, translating the primary account number to a primary account number associated with the payer ID of the selected first payer system, wherein the translation includes utilizing transaction records from previous transactions to derive the primary account number associated with the selected first payer system; routing the transaction amount and the translated primary account number associated with the payer ID to the selected first payer system; receiving an approval response approving the transaction from the selected first payer system; and outputting the received approval response to the POS terminal.
 18. The non-transitory computer readable medium of claim 17, wherein the method further comprises: verifying a communication with the selected first payer system, the verification includes communicating an authorization request to receive a corresponding transaction response; determining that communication with the selected first payer system cannot be established; and based on the determining that communication with the selected first payer system cannot be established: processing the transaction to generate an approval response for the transaction; outputting, at a first time, the generated approval response to the POS terminal; and routing, at a second time later than the first time, the transaction amount and the primary account number associated with the payer ID to the selected first payer system, wherein communication with the selected first payer system is established at the second time, and wherein the transaction amount is settled with the selected first payer system.
 19. The non-transitory computer readable medium of claim 17, wherein the determining that the primary account number is associated with the second payer system comprises: identifying the second payer system from a transaction record previously stored in a payment repository in communication with the POS terminal.
 20. The non-transitory computer readable medium of claim 19, wherein the translating the primary account number to the primary account number associated with the payer ID comprises of: requesting the selected first payer system to translate the primary account number to the primary account number associated with the payer ID based on one or more transaction records accessible by the selected first payer system, wherein a portion of the purchaser payment credentials is translated and the purchaser is required to provide additional purchaser payment credentials. 