Patents by Inventor Phillip Lavender

Phillip Lavender has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11777733
    Abstract: Techniques are described for managing master keys for token requestors to use in generating cryptograms such as TAVVs. A processor computer generates a first master key for a token requestor, the first master key being generated based on (a) a second master key managed by the processor computer and (b) an identifier of the token requestor. The processor computer transmits, to a token requestor computer corresponding to the token requestor, the first master key. The processor computer receives, from the token requestor computer, a request for a token. Responsive to receiving the request for the token, the processor computer transmits the token to the token requestor computer; and receives, from the token requestor computer, an authorization request message comprising the token and a cryptogram generated by the token requestor computer using the first master key and the token.
    Type: Grant
    Filed: August 13, 2019
    Date of Patent: October 3, 2023
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Jalpesh Chitalia, Eduardo Lopez, Christian Flurscheim, Sayeed Mohammed, Christian Aabye, Christoffel Jacobs, Phillip Lavender
  • Publication number: 20230009884
    Abstract: An authentication request message from a user conducting an interaction at a resource provider computer is received. It is determined that data representing an indication that the resource provider is trusted by the user and including a trusted marker is present in a database. Authentication to the user is provided, and information indicating that the user has been authenticated and the trusted marker are sent so that authorization request message for the interaction that includes the trusted marker is generated. The trusted marker is validated, and the authorization request message including information related to the interaction and the validated trusted marker is sent to an authorizing entity computer.
    Type: Application
    Filed: September 19, 2022
    Publication date: January 12, 2023
    Applicant: Visa International Service Association
    Inventors: Mark Nelsen, David William Wilson, Guido Mangiagalli, Anjana Neera Surin, Sayeed Mohammed, Alan Johnson, Phillip Lavender, Glenn Powell
  • Publication number: 20230004974
    Abstract: A method includes a network processing computer receiving an authorization request message comprising a token and a cryptogram during an interaction between a resource provider and a user. The network processing computer determines user credentials associated with the token. The network processing computer then determines a plan identifier based on the authorization request message. The network processing computer provides the plan identified to an authorizing entity computer.
    Type: Application
    Filed: December 14, 2020
    Publication date: January 5, 2023
    Inventors: Amy Poon, Anuja Seton, Phillip Lavender, Xiaodong Jiang, Shivam Tickoo, Thomas Bellenger, Udit Batra
  • Patent number: 11496481
    Abstract: A system and method of establishing a resource provider as a trusted listing are disclosed. The method includes receiving, by a directory server computer, an indication from a user that a resource provider is trusted. The directory server computer is programmed to provide a first level of authentication. The method then includes storing, in a database, data representing the indication from the user that the resource provider is trusted. The method then includes receiving an authentication request message from the user conducting an interaction at the resource provider computer and determining that the data representing the indication from the user that the resource provider is trusted is present. In response to determining, the method includes providing a second level of authentication to the user before the user is allowed to complete the interaction. The second level of authentication is lower than the first level.
    Type: Grant
    Filed: April 24, 2019
    Date of Patent: November 8, 2022
    Assignee: Visa International Service Association
    Inventors: Mark Nelsen, David William Wilson, Guido Mangiagalli, Anjana Neera Surin, Sayeed Mohammed, Alan Johnson, Phillip Lavender, Glenn Powell
  • Publication number: 20210383378
    Abstract: A method and system for authorizing a secure transaction using a portable device is disclosed. The method includes an authorization process performed in real-time that includes two phases: an authentication phase and a transaction processing phase. In the authentication phase, a resource provider system may receive a cryptogram from a portable device and verify the cryptogram. Upon the resource provider system obtaining an authentication response indicator, the transaction processing phase may include the resource provider system generating and transmitting an authorization request message to a processing computer. The resource provider system may then receive an authorization response message from the processing computer including an authorization response indicator, which completes the authorization process.
    Type: Application
    Filed: October 23, 2019
    Publication date: December 9, 2021
    Inventors: Blake McCoy, Andreas Aabye, Paul Tait, Phillip Lavender, Lily Cai
  • Publication number: 20210344672
    Abstract: Systems and methods are provided to enable a user to conduct a transaction using their credentials stored on a secure server computer (e.g., a computer associated with a partner such as another merchant) by merely presenting their authentication data at a physical location via an auxiliary device. An auxiliary device may be provided for interfacing with a partners backend server (e.g., the secure server computer). In some embodiments, biometric authentication may provide a mechanism for a true seamless and potentially frictionless (in the case of modalities that do not require physical contact) interaction. Payment can occur without any need for a card, phone, wearable, or any other user device as long as the auxiliary device is able to recognize the user and retrieve a credential that can be linked to that user.
    Type: Application
    Filed: October 8, 2019
    Publication date: November 4, 2021
    Inventors: Kyle Joseph Drechsler, Christopher Jones, Gayathri Venkat, Gavin Shenker, Raul Leyva, Janardana Sarma, Phillip Lavender, Leila Movahedian, Pinesh Roy, Eduardo Lopez
  • Publication number: 20210243194
    Abstract: A system and method of establishing a resource provider as a trusted listing are disclosed. The method includes receiving, by a directory server computer, an indication from a user that a resource provider is trusted. The directory server computer is programmed to provide a first level of authentication. The method then includes storing, in a database, data representing the indication from the user that the resource provider is trusted. The method then includes receiving an authentication request message from the user conducting an interaction at the resource provider computer and determining that the data representing the indication from the user that the resource provider is trusted is present. In response to determining, the method includes providing a second level of authentication to the user before the user is allowed to complete the interaction. The second level of authentication is lower than the first level.
    Type: Application
    Filed: April 24, 2019
    Publication date: August 5, 2021
    Applicant: Visa International Service Association
    Inventors: Mark NELSEN, David William WILSON, Guido MANGIAGALLI, Anjana Neera SURIN, Sayeed MOHAMMED, Alan JOHNSON, Phillip LAVENDER, Glenn POWELL
  • Publication number: 20210176062
    Abstract: Techniques are described for managing master keys for token requestors to use in generating cryptograms such as TAVVs. A processor computer generates a first master key for a token requestor, the first master key being generated based on (a) a second master key managed by the processor computer and (b) an identifier of the token requestor. The processor computer transmits, to a token requestor computer corresponding to the token requestor, the first master key. The processor computer receives, from the token requestor computer, a request for a token. Responsive to receiving the request for the token, the processor computer transmits the token to the token requestor computer; and receives, from the token requestor computer, an authorization request message comprising the token and a cryptogram generated by the token requestor computer using the first master key and the token.
    Type: Application
    Filed: August 13, 2019
    Publication date: June 10, 2021
    Inventors: Jalpesh Chitalia, Eduardo Lopez, Christian Flurscheim, Sayeed Mohammed, Christian Aabye, Christoffel Jacobs, Phillip Lavender
  • Publication number: 20200336315
    Abstract: A method for validating an interaction is disclosed. A first interaction cryptogram can be generated by a first device using information about a first party to the interaction and a second party to the interaction. A second interaction cryptogram can be generated by a second device also using information about the first party to the interaction and the second party to the interaction. Verifying each cryptogram can validate that the interaction details have not been changed, and that both the first party and second party legitimately authorized the interaction.
    Type: Application
    Filed: July 2, 2020
    Publication date: October 22, 2020
    Inventors: Phillip Lavender, Vikram Modi, Glenn Leon Powell
  • Patent number: 10742419
    Abstract: A method for validating an interaction is disclosed. A first interaction cryptogram can be generated by a first device using information about a first party to the interaction and a second party to the interaction. A second interaction cryptogram can be generated by a second device also using information about the first party to the interaction and the second party to the interaction. Verifying each cryptogram can validate that the interaction details have not been changed, and that both the first party and second party legitimately authorized the interaction.
    Type: Grant
    Filed: March 10, 2017
    Date of Patent: August 11, 2020
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Phillip Lavender, Vikram Modi, Glenn Leon Powell
  • Publication number: 20170272253
    Abstract: A method for validating an interaction is disclosed. A first interaction cryptogram can be generated by a first device using information about a first party to the interaction and a second party to the interaction. A second interaction cryptogram can be generated by a second device also using information about the first party to the interaction and the second party to the interaction. Verifying each cryptogram can validate that the interaction details have not been changed, and that both the first party and second party legitimately authorized the interaction.
    Type: Application
    Filed: March 10, 2017
    Publication date: September 21, 2017
    Inventors: Phillip Lavender, Vikram Modi, Glenn Leon Powell