User positive approval and authentication services (UPAAS)
First Claim
1. A method for issuers of retail payment and identification instruments to request and receive approval from users of these instruments in real time to authenticate the users, comprising:
- sending a request, from an issuer host, to a user comprising a request for the user to provide information of a data connected device during a registration process wherein this information is associated with a user ID and used for processing a user approval request and response;
sending download instructions for a user application to the user for the user to download the user application to the data connected device over a wired or wireless communication protocol;
providing the user with an ability to activate the user application using a one-time authentication key or a method selected by the issuer;
receiving, at the issuer host, a transaction authorization request from at least one of a network or an acquirer, the transaction authorization request comprising information describing a presently-unapproved transaction;
sending the user approval request in real time requesting the user to approve or decline the transaction and prompting the user to enter a user verification method key, wherein the issuer host is further programmed to create and send the user approval request to the user once the transaction authorization request is received from the at least one of the network or the acquirer and before the transaction authorization request is processed for approval by the issuer host;
capturing the user verification method key for approved transactions, wherein subject to the issuer host discretion the user verification method contains information known only to the user; and
sending the user approval response to the issuer host for approval by the issuer.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention provides Users of Retail Payment and Identification instruments with the ability to review transaction details and approve transaction by capturing UVM in User controlled environment and Issuers of these instruments with the ability to positively authenticate Users in Issuer controlled environment. The invention accounts for real time legacy or non-legacy processing systems to provide an authorization request from POA to Issuer Host. The invention introduces two UPAAS components—User Gateway and User Application. The UPAAS User Gateway is implemented in an Issuer controlled environment enabling interface between Issuer legacy Host and UPAAS User Applications. The UPAAS User Application can be implemented on any device supporting communication protocol such as TCP/IP without any hardware changes enabling the User to login to UPAAS User Gateway, review and approve or decline a specific transaction in real time by entering UVM, such as PIN, for User authentication purposes.
31 Citations
5 Claims
-
1. A method for issuers of retail payment and identification instruments to request and receive approval from users of these instruments in real time to authenticate the users, comprising:
-
sending a request, from an issuer host, to a user comprising a request for the user to provide information of a data connected device during a registration process wherein this information is associated with a user ID and used for processing a user approval request and response; sending download instructions for a user application to the user for the user to download the user application to the data connected device over a wired or wireless communication protocol; providing the user with an ability to activate the user application using a one-time authentication key or a method selected by the issuer; receiving, at the issuer host, a transaction authorization request from at least one of a network or an acquirer, the transaction authorization request comprising information describing a presently-unapproved transaction; sending the user approval request in real time requesting the user to approve or decline the transaction and prompting the user to enter a user verification method key, wherein the issuer host is further programmed to create and send the user approval request to the user once the transaction authorization request is received from the at least one of the network or the acquirer and before the transaction authorization request is processed for approval by the issuer host; capturing the user verification method key for approved transactions, wherein subject to the issuer host discretion the user verification method contains information known only to the user; and sending the user approval response to the issuer host for approval by the issuer. - View Dependent Claims (2, 3, 4, 5)
-
Specification