Dr. Anderson graduated from the University of Tennessee College of Medicine at Memphis in 1971. He works in Cookeville, TN and specializes in Family Medicine and Internal Medicine.
Larry Routhenstein - Orlando FL 32839 Roy L. Anderson - Glendale CA 92120 William R. Bryant - Manasas VA 20109 Jacob Y. Wong - Goleta CA 93117
International Classification:
G06K 500
US Classification:
235380, 235375
Abstract:
A method for providing secure transactions generates a Secure Card Number (âSCNâ) for a first entity that is transferred with a first entity identifier to a second entity and then to a money source that verifies that the transaction is valid by use of the first entity identifier and the SCN. The SCN includes a Transaction Information Block (âTIBâ) used for invoking one or more restrictions on use of the SCN, a Counter Block, and an encrypted Personal Identification Number (âPINâ) Block. The SCN is transferred to the money source in an account number or a non-account data field. The TIB can be used by the money source to determine which of multiple account numbers associated with the first entity should be used for the first transaction. The money source can also use the TIB to determine whether the device which generated the SCN has a changed status condition, such as a low battery condition or an invalid user entry status. The low battery condition may be determined either by a diagnostic program or by an empirical record of the number of transactions presented for authorization.
Larry Routhenstein - Orlando FL, US Roy L. Anderson - Glendale CA, US Jacob Y. Wong - Goleta CA, US
Assignee:
PRIVASYS, INC. - Tiburon CA
International Classification:
G06K 5/00
US Classification:
235380
Abstract:
An electronic card ha a power source, a user selection mechanism operable to allow a user to select a customization variable for a single transaction, a processor for generating a transaction specific data packet that includes a card number and a customized number and an electronic communication device operable to cause the data packet to be read by a read head of a magnetic strip reader. The electronic communication device is operable to dynamically convey the transaction specific data packet to a read head of a magnetic card reader so that the transaction specific data packet is read by the read head. The transaction specific data packet is dynamically generated for use by the card for the single transaction of the card and the customized number is determined based upon the customization variable selected by the user selection mechanism.
Methods For Customizing Secured Transactions That Are Verified By A Money Source
Larry Routhenstein - Orlando FL, US Roy L. Anderson - Glendale CA, US Jacob Y. Wong - Goleta CA, US
Assignee:
PRIVASYS, INC. - Tiburon CA
International Classification:
G06Q 20/40
US Classification:
705 71, 705 64
Abstract:
Methods for providing secure transactions in which a customization parameter and an encrypted transaction validation code are received from a user to positively identify a transaction for a user who has a first entity identifier. The validation code and first entity identifier are used by a money source which electronically verifies that the transaction is valid by use of the first entity identifier and the validation code while the first transaction is customized through use of the customization parameter.
Larry Routhenstein - Orlando FL, US Roy L. Anderson - Glendale CA, US Jacob Y. Wong - Goleta CA, US
Assignee:
PRIVASYS, INC. - Tiburon CA
International Classification:
G06Q 20/40
US Classification:
705 75
Abstract:
Methods in which an encrypted transaction validation code is received which positively identifies a first transaction for a first entity, the first entity having a first entity identifier, and the first transaction is electronically verified as being valid by use of the first entity identifier and the validation code. The first entity identifier can be transferred as an account number and the validation code transferred to the money source in a non-account data field. A money source can validate the validation code by duplicating the encryption process used to create the validation code and by then comparing the result to the validation code received. The validation code can be, at least in part, encrypted, and a money source can validate the validation code by duplicating a validation code encryption process and by then comparing the result to the validation code received.