Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for verification, authentication, and notification of transactions

a verification and authentication system technology, applied in the field of fraud prevention and fraud “ early warning” notifications for transactions, can solve the problems of inherently insecure transmission and/or storage of private information, limited fraud and theft opportunities, and low fraud prevention and fraud prevention rates, so as to reduce transactional risk, reduce fraud risk, and minimize the effect of effor

Inactive Publication Date: 2011-01-20
EVANS ALEXANDER WILLIAM
View PDF24 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

"The invention provides a system and method for verifying and authenticating transactions, particularly remote or electronic transactions, involving multiple parties. The system can notify and communicate with the parties involved in the transaction, using a variety of communication links and media. The system can also adapt its behavior based on the transaction's parameters and the information about the parties and their potential interests. The technical effects of the invention include improved accuracy and completeness of authentication and verification, increased security, and improved efficiency in communicating with the parties involved in the transaction."

Problems solved by technology

As regards question 3, the most relatively secure environment for purchase transactions remains a merchant's store, in which a buyer and seller can interact face to face, multiple forms of identification can be reviewed, and the opportunities for theft of private information are generally limited.
Here, the opportunities for fraud and the theft of private information are relatively high.
Further, there is a prevailing public perception that electronic purchasing environments (for example, virtual storefronts or Internet auctions) are inherently insecure in regard to the transmission and / or storage of private information.
In some cases the burden of implementing, learning and using falls on the merchant or other provider of goods, services, or funds, as well as the account holder.
In the case of credit card transactions, the merchant is then charged back for the value of the disputed transaction and may also be charged a dispute investigation fee, resulting in a loss of profits and goods.
Such systems and methods do not protect against card theft or hacking (should such CVV2 / CVC2 / CID data flow from the consumer to the merchant or card processor electronically, or are stored on an intermediate system), because they authenticate only that certain data from the physical card match data stored in the authorization system, without authenticating the identity of the card holder / user, and without verifying the intentions of the true card owner or other co-authorizing party (if different).
Further, they do not provide the advantage of notification of the true card owner or other co-authorizing or auditing parties of the occurrence of a transaction, and in particular a high-risk transaction.
Finally, such systems and methods also fail to provide for any additional automated data gathering, authentication, and verification for and by the party regarding the opening, closing, or modification of an account remotely.
Such a system and method have the advantage of partially isolating private payment information across two different communication links, but do not address the problem of notification or authentication of the legitimate account holders or other parties having a potential interest in the transaction, nor verification of the intent and approval of said legitimate account holders or other parties having approval authority for the transaction.
Such a system and method, which require purchasers to take additional proactive steps to complete remote transactions, have had limited adoption by consumers and merchants due to the complexity they add to all affected transactions.
This system and method are further limited to collecting payment data, such as a credit card number, for processing by the merchant's point-of-sale or ordering system, under the purchasing party's control.
They do not provide for any additional data gathering, authentication, and verification for and by the party attempting to collect payment or open, close, or modify an account remotely, nor for and by any third party whose approval is normally required to conclude the transaction.
As has been noted, systems and methods based on dummy transaction or account number codes have had limited consumer acceptance because of the complexity to set up and use them.
Nor do such systems and methods provide for any additional data gathering, authentication, and verification for and by the party attempting to collect payment or open, close, or modify an account remotely, nor for and by any third party whose approval is normally required to conclude the transaction.
As has been noted, systems and methods of this type have extremely narrow application because of the need for the affected parties' physical presence, the associated cost of implementation and on-going support, and general public concerns over personal privacy when biometric devices are employed.
However, such systems and methods do not provide protection against the use of stolen account information, nor against the use of stolen dummy account information such as said telephone number and PIN.
Nor do such systems and methods provide for any additional data gathering, authentication, and verification for and by the party attempting to collect payment or open, close, or modify an account remotely; nor for and by any third party whose approval is normally required to conclude the transaction.
Because the PIC is communicated through the same process and media as the transaction itself, said personal identification code, particularly for e-commerce transactions, is vulnerable to theft via hacking of the merchant's systems or interception of the merchant's communications to the payment-processing bank or applicable credit card processing network.
Such systems and methods also fail to provide for any additional data gathering, authentication, and verification for and by any third party whose approval is normally required to conclude the transaction.
Therefore, the utility of this method is limited to cases wherein both a purchaser and a merchant are independently willing and able to establish an advance relationship with, exchange private information (such as account information for the purchaser and merchant processing information for the merchant) with, and allow debiting / crediting of their accounts by, such a processing center prior to entering into a purchase transaction between themselves.
The method is also limited to purchases, and particularly to purchases involving a single customer and a single merchant.
The need for a preparatory process occurring over the second network, the need to use the second network to perform all steps to prepare and conclude a transaction other than the step of the customer's placing of his / her order, and the need to establish a processing center, also limit the utility of this method.
Because the purchaser does not actually supply his / her payment information to the merchant, the method further creates an opportunity for fraud perpetrated within processing center, stemming from its unique position of trust between the two other parties.
If, however, the processing center is not independent of the merchant, then any utility derived from the separation of the processing center from the merchant, such as the assurance to the customer that his / her private account information need never be transmitted directly to the merchant, is lost.
The method also adds the complication of the merchant having to provide a new and additional or alternative form of customer identification information to the processing center in order to receive a customer's payment.
The method also fails to provide for any additional automated data gathering, authentication, and verification for and by a party regarding non-purchase transactions, such as the opening, closing, or modification of an account remotely; nor for and by any third party whose approval is normally required to conclude a purchase transaction.
The method also fails to address purchases or non-purchase transactions initiated other than via a network.
Additional weaknesses and limitations of the prior art in general include:
This solution is therefore highly limited in the scope of its application.
Systems and methods using CVV2 / CVC2 / CID codes: Systems and methods utilizing such codes are presently limited to credit card accounts only, do not protect against the loss or theft, such as by hacking, of credit or debit-and-credit cards or card account numbers along with such codes, and do not prevent the fraudulent creation or subsequent modification of an account.
Systems and methods using verification of private knowledge: Such systems and methods are vulnerable to theft of private information via hacking, and identity theft.
This is particularly troublesome internationally, where the most common type of private knowledge checking in the U.S. for credit card transactions, namely, an account's billing addresses, is rarely possible today abroad.
Systems and methods using smart cards: While smart cards add password (PIN) features and can also create dummy credit card numbers usable for one transaction only, systems and methods utilizing smart cards require the installation and use of a smart card reader by the user, and have thus had limited adoption by consumers.
Systems and methods using digital signature information (“E-Wallets”): As with smart cards, systems and methods for e-wallets require specialized software to be installed on the computing device of the e-wallet's owner, and therefore have not been widely adopted by consumers.
Other limitations and weaknesses in the prior art: Notification of a transaction, and any interaction with the actual party or parties who are truly authorized to conclude and approve it, as opposed to interaction with parties who are perpetrating fraud by representing themselves as said actual, authorized parties, is generally left unaddressed by the prior art.
Prior art which attempts to address the objective of verification of a transaction before it is concluded adds prohibitive requirements for the establishment, registration with, and use of intermediaries such as processing centers between customers and merchants, fails to address the objectives of notification and approval of or by third-parties, and fails to address the class of transactions comprising the opening, closing, and modification of accounts.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for verification, authentication, and notification of transactions
  • System and method for verification, authentication, and notification of transactions
  • System and method for verification, authentication, and notification of transactions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074]FIG. 2. Application Programming Interface Generalized Schema

[0075]FIG. 3. Networking Configuration

[0076]FIG. 4. Remote Transaction Engine Communications Interfaces—Data Messaging Layer

[0077]FIG. 5. Rules Database View

[0078]FIG. 6. Profiles Database Views

[0079]FIG. 7. Party-Transaction Group Profiles Database View

[0080]FIG. 8. Communications Sequence Patterns Database View

[0081]FIG. 9. Scripts Database View

[0082]FIG. 10. Message Templates Database View

[0083]FIG. 11. Communications Subsystems: Telephony

[0084]FIG. 12. Communications Subsystems: E-mail

[0085]FIG. 13. Communications Subsystems: Instant Messaging

[0086]FIG. 14. Communications Subsystems: Fax

[0087]FIG. 15. Communications Subsystems: Paging

[0088]FIG. 16. Communications Subsystems: Wireless Text Messaging / Short Message Service

[0089]FIG. 17. Communications Subsystems: Wireless Telephony

[0090]FIG. 18. Communications Subsystems: IP Telephony

[0091]FIG. 19. Communications Subsystems: Internet Data Protocols—HTTP / HTTPS using H...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system and method for verifying, authenticating, and providing notification of a transaction, such as a commercial or financial transaction, with and / or to at least one party identified as engaging in the transaction and / or identified as having a potential interest in the transaction or type of transaction, are provided. A central system accepts information regarding a transaction, including information about at least one party identified as engaging in the transaction, such as by a credit account number or Social Security number or merchant account number, and / or identified as having a potential interest in the transaction. Based on the information regarding the transaction and any supplemental information the central system determines, the central system communicates with and / or to at least one party and / or additional or alternative parties, via at least one communications device or system having a communications address, such as a telephone number or Short Message Service address, predetermined as belonging to the at least one party and / or additional or alternative parties. Via said communications, at least one party having an interest or a potential interest in the transaction may be notified of it, and may further be enabled or required to supply additional verifying or authenticating information to the central system. If the transaction was initiated or engaged in via a communications link, such as via the Internet, said communications preferably occur over at least one different communications link and / or protocol, such as via a wireless voice network. The central system may then compute a result based on the outcomes of said communications, and may then transmit the result to the user and / or to a second system or device.

Description

PARENT CASE TEST[0001]This application is a continuation (CON) application of U.S. patent application Ser. No. 10 / 354,609, filed Jan. 30, 2003, entitled “System and Method for Verification, Authentication, and Notification of a transaction,” which claims priority to U.S. Provisional No. 60 / 354,275 with filing date Feb. 4, 2002, both of which are incorporated herein by reference in their entireties.BACKGROUND OF THE INVENTION[0002]1. Field of the Invention[0003]The invention relates to fraud prevention and fraud “early warning” notifications for transactions, in particular remote and / or electronic transactions such as “e-commerce” and “m commerce” transactions wherein it is desirable to authenticate and verify one or more parties' identities and intentions before the transaction is concluded and / or to notify one or more parties of the occurrence of the transaction.[0004]2. Description of the Related Art[0005]In a transaction in which security is a concern, such as an electronically c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06Q40/00G06Q20/10G06Q20/38G06Q20/40G06Q30/06G06Q40/02
CPCG06Q20/10G06Q20/382G06Q20/40G06Q20/401G06Q40/00G06Q40/025G06Q30/06G06Q20/386G06Q40/03G06Q20/3255G06Q20/4014
Inventor EVANS, ALEXANDER WILLIAM
Owner EVANS ALEXANDER WILLIAM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products