Mobile communications message verification of financial transactions
First Claim
Patent Images
1. A method comprising:
- receiving a transaction verification message at a wireless device associated with a wireless device ID from a mobile identity verification system, when a first verification value meets predetermined criterion, wherein the transaction verification message is not sent to the wireless device when the first verification value does not meet the predetermined criterion, and wherein the first verification value is generated by evaluating a transaction based on the wireless device ID and a transaction location of the transaction; and
transmitting, by the wireless device to the mobile identity verification system, a message response confirming authorization of the transaction, wherein the mobile identity verification system re-evaluates the transaction based on the message response, thereby generating a second verification value based at least in part on the first verification value and the message response, wherein the second verification value is statistically determined and indicates a second probability that the transaction is fraudulent, wherein generating the second verification value includes adding or subtracting a predetermined value with respect to the first verification value, and wherein the mobile identity verification system electronically sends the second verification value to a transaction processor, the transaction processor performing an action based on the second verification value.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method for verifying a secure transaction by evaluating the transaction, generating a first verification value for the transaction, sending an electronic mobile message to a wireless device associated with the transaction, receiving a response from the wireless device to the electronic mobile message associated with the transaction and generating a new second verification value for the transaction based on the response is provided. The second verification value may be used to validate or invalidate the secure transaction.
77 Citations
18 Claims
-
1. A method comprising:
-
receiving a transaction verification message at a wireless device associated with a wireless device ID from a mobile identity verification system, when a first verification value meets predetermined criterion, wherein the transaction verification message is not sent to the wireless device when the first verification value does not meet the predetermined criterion, and wherein the first verification value is generated by evaluating a transaction based on the wireless device ID and a transaction location of the transaction; and transmitting, by the wireless device to the mobile identity verification system, a message response confirming authorization of the transaction, wherein the mobile identity verification system re-evaluates the transaction based on the message response, thereby generating a second verification value based at least in part on the first verification value and the message response, wherein the second verification value is statistically determined and indicates a second probability that the transaction is fraudulent, wherein generating the second verification value includes adding or subtracting a predetermined value with respect to the first verification value, and wherein the mobile identity verification system electronically sends the second verification value to a transaction processor, the transaction processor performing an action based on the second verification value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A wireless device comprising:
-
a processor; and a non-transitory computer readable medium coupled to the processor, the computer readable medium comprising code, executable by the processor for implementing a method comprising receiving a transaction verification message at a wireless device associated with a wireless device ID from a mobile identity verification system, when a first verification value meets predetermined criterion, wherein the transaction verification message is not sent to the wireless device when the first verification value does not meet the predetermined criterion, and wherein the first verification value is generated by evaluating a transaction based on the wireless device ID and a transaction location of the transaction, and transmitting, by the wireless device to the mobile identity verification system, a message response confirming authorization of the transaction, wherein the mobile identity verification system re-evaluates the transaction based on the message response, thereby generating a second verification value based at least in part on the first verification value and the message response, wherein the second verification value is statistically determined and indicates a second probability that the transaction is fraudulent, wherein generating the second verification value includes adding or subtracting a predetermined value with respect to the first verification value, and wherein the mobile identity verification system electronically sends the second verification value to a transaction processor, the transaction processor performing an action based on the second verification value. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification