Detection of unauthorized account transactions
First Claim
1. A method for detecting unauthorized use of an account comprising:
- receiving a first request from a vendor to authorize an account transaction;
sending a second request for authorization to an account holder;
receiving a first electronic response from the account holder providing a personal identification number selected from a normal personal identification number and a duress personal identification number; and
initiating remedial actions if the duress personal identification number is received.
3 Assignments
0 Petitions
Accused Products
Abstract
Account transaction protection is provided during the automated authorization process of a charge account, a debit account, a personal account or a business account. After a vendor asks the authorization service provider to approve a pending transaction, the authorization service provider automatically contacts an account holder asking for approval or refusal of the pending transaction. The contact is made by telephone, or computer network, such as the Internet. After entering a PIN to establish identity, the account holder approves or rejects the pending transaction after receiving a validation request message detailing the facts of the transaction. The PIN may be a normal PIN or a duress PIN. If the duress PIN is used, indicating the account holder is under duress to approve the pending transaction, the service provider notifies the authorities. Similarly, if the account holder indicates that refusal is due to unauthorized use, the service provider contacts the authorities.
-
Citations
47 Claims
-
1. A method for detecting unauthorized use of an account comprising:
-
receiving a first request from a vendor to authorize an account transaction;
sending a second request for authorization to an account holder;
receiving a first electronic response from the account holder providing a personal identification number selected from a normal personal identification number and a duress personal identification number; and
initiating remedial actions if the duress personal identification number is received. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer program product comprising:
-
receiving instructions for receiving a first request from a vendor to authorize an account transaction;
sending instructions for sending a second request for authorization to an account holder;
receiving instructions for receiving a first electronic response from the account holder providing a personal identification number selected from a normal personal identification number and a duress personal identification number; and
initiating instructions for initiating remedial actions if the duress personal identification number is received. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39)
-
-
40. A system for detecting unauthorized use of an account comprising:
-
means for receiving a first request from a vendor to authorize an account transaction;
means for sending a second request for authorization to an account holder;
means for receiving a first electronic response from the account holder providing a personal identification number selected from a normal personal identification number and a duress personal identification number; and
means for initiating remedial actions if the duress personal identification number is received. - View Dependent Claims (41, 42, 43, 44, 45, 46, 47)
-
Specification