Browse Prior Art Database

Method to acquire a temporary credit card number.

IP.com Disclosure Number: IPCOM000032317D
Original Publication Date: 2004-Oct-31
Included in the Prior Art Database: 2004-Oct-31
Document File: 1 page(s) / 29K

Publishing Venue

IBM

Abstract

This concept will help alleviate some credit card fraud by having the shopper acquire a temporary credit card number that can be used for some predefined period of time, such as 1 hour. This concept does not require the user to log on to a site to acquire the temporary credit card number, it is displayed on the users credit card device.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 62% of the total text.

Page 1 of 1

Method to acquire a temporary credit card number .

This concept will utilize technology such as used by RSA SecurID. The users credit card will be equipped with technology that is synchronized with the issuer and a display that shows the current valid credit card number. This number can be used by the user to purchase goods on-line or in person. The device can be separate from the credit card, but it is important to note that they can be one unit. This concept does not require the user to sign on to a web site, enter their user id and password and then remember the new temporary number. The number is always shown on the display with a countdown to indicate how much time is left on the temporary number. The credit card device can also have USB technology to enable the user to quickly and easily enter the temporary credit card number in an on-line form.

It's important to note that the user has to have possession of the card which makes fraudulent use more difficult. If the card is lost or stolen, the user just has to call it in and the card is made unusable.

The technology used can be similar to RSA SecurID but instead of an ID, it is generating a full credit card number.

When the card is issued, the user has to call in to activate the card assuring no fraudulent use. When activated, the software running at the issuer is synchronized with the technology in the credit card thus generating unique credit card numbers that are time sensitive.

The credit card device can...