System and methods for authenticating and monitoring transactions
First Claim
1. A method for evaluating transactions associated with one or more transaction systems, the method comprising:
- providing a central control;
receiving identification information associated with a user at the central control, wherein the identification information includes contact information related to the user;
receiving a transaction request from a third party;
matching the transaction request to the user; and
alerting the user of the transaction request.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for evaluating transactions. Various of the methods include providing a central control and receiving identification information associated with a user at the central control. In some cases, the identification information includes user contact information. In addition, a transaction request is received from a third party and matched to the user, and the user is alerted of the transaction request. Various systems include an interactive monitoring system that includes a central control coupled to a communication network. The central control includes a memory and a processor. Further, the memory includes instructions executable by the processor to receive contact information and account information related to a user, receive a transaction request including the account information from a third party, match the transaction request to the user, access the contact information associated with the user, and alert the user of the transaction request according to the contact information.
-
Citations
23 Claims
-
1. A method for evaluating transactions associated with one or more transaction systems, the method comprising:
-
providing a central control;
receiving identification information associated with a user at the central control, wherein the identification information includes contact information related to the user;
receiving a transaction request from a third party;
matching the transaction request to the user; and
alerting the user of the transaction request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An interactive monitoring system, the system comprising:
-
a central control coupled to a communication network, wherein the central control comprises a memory and a processor; and
wherein the memory comprises instructions executable by the processor to;
receive contact information and account information related to a user;
receive a transaction request from a third party, wherein the transaction request comprises the account information;
match the transaction request to the user;
access the contact information associated with the user; and
alert the user of the transaction request according to the contact information. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method for authenticating a user in a financial transaction, the method comprising:
-
receiving identification information associated with a user at a central control, wherein the identification information includes contact information and account information related to the user;
receiving a transaction request from a third party, wherein the transaction request comprises the account information related to the user;
matching the transaction request to the user;
providing an acceptance request to the user;
receiving a response to the acceptance request; and
based at least in part on the response, providing an authorization to the third party. - View Dependent Claims (22)
-
-
23. A method for detecting potential identity theft, the method comprising:
-
receiving at least contact information and a social security identification number related to a user at a central control;
receiving a transaction request from a third party, wherein the transaction request comprises the social security number related to the user;
matching the transaction request to the user; and
based at least in part on the transaction request, alerting the user of a potential identity theft.
-
Specification