Secure authentication and payment system
First Claim
Patent Images
1. A method of securely conducting transactions over a network, comprising the steps of:
- A. receiving a telephone call over the telephone network that seeks to initiate a transaction with a target;
B. obtaining at least a Caller ID defining the telephone from which the call is being placed;
C. authenticating the call by checking at least the Caller ID associated with the call against Caller IDs in a database of registrants'"'"' Caller IDs; and
D. proceeding with the transaction only if at least said caller id matches that of an entity that is registered in said database.
2 Assignments
0 Petitions
Accused Products
Abstract
A transaction and payment and processing system securely conducts transactions over the public telephone network. The transactions may be between and among entities of any type such as individuals, merchants, utilities, banks, etc. Nothing more than access to a telephone is required after initial registration of a user.
166 Citations
58 Claims
-
1. A method of securely conducting transactions over a network, comprising the steps of:
-
A. receiving a telephone call over the telephone network that seeks to initiate a transaction with a target;
B. obtaining at least a Caller ID defining the telephone from which the call is being placed;
C. authenticating the call by checking at least the Caller ID associated with the call against Caller IDs in a database of registrants'"'"' Caller IDs; and
D. proceeding with the transaction only if at least said caller id matches that of an entity that is registered in said database. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 51, 52, 53, 54)
-
-
11. A method of securely conducting transactions over a network, comprising the steps of:
-
A. receiving, at a second location on a telephone network, a call placed at a first location on the network and identifying a transaction to be undertaken;
B. at a second location on the network, obtaining, from a source other than the initiator of said call, at least a Caller ID defining the telephone from which the call was initiated;
C. authenticating the call by checking at least the Caller ID associated with the call against Caller IDs in a database of Caller IDs; and
D. proceeding with the transaction only if at least said Caller ID matches that of an entity that is contained in said database. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. The method of claim 18 in which said transaction is completed only on approval by the entity which is to make said payment.
-
19. Apparatus for facilitating transactions over a telephone network, comprising:
-
A. a data store for storing a database of at least authorized call initiators, said database containing, for each entity authorized to engage in said transactions, at least a primary identifier identifying telephone instruments that are authorized for use in said transactions and a secondary identifier;
B. a stored program data processor for processing transactions directed to it, said apparatus being connected to store data in said database and to retrieve it therefrom;
C. an interface between said telephone network and said processor for receiving and transmitting data between said network and said processor;
D. said processor programmed to;
(1) receive said primary and said secondary identifiers from said telephone network via said interface and to authenticate said identifiers against said database; and
(2) further said transaction on authentication. - View Dependent Claims (20, 21)
-
-
22. A method of transferring resources from one entity to another comprising the steps of:
-
A. accepting from an originator a message identifying a target B. authenticating said message by means of at least a geographically unique telephone identifier;
C. transferring a resource from said originator to said target responsive to authentication of said message. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 55)
-
-
35. A method of selling resources, comprising the steps of
A. accepting from an originator a message identifying a resource to be purchased; -
B. authenticating said message by means of at least a geographically unique telephone identifier;
C. authorizing the transfer of a resource to said originator responsive to authentication of said message. - View Dependent Claims (36, 37, 38, 39, 40, 41)
-
-
42. A method of facilitating transactions between an initiator and a target, comprising the steps of:
-
A. receiving a call in connection with a transaction to be initiated, said call identifying an entity to be held accountable for the transaction;
B. searching a database for information concerning telephone devices in said database associated with said entity;
C. placing a call to a telephone device registered to said entity in order to authenticate said entity. - View Dependent Claims (43, 44, 45, 46, 47, 48, 49, 50)
-
-
56. A method of securely conducting transactions over a network, comprising the steps of:
-
A. receiving a telephone call over the telephone network that seeks to initiate a transaction with the called party;
B. obtaining from the caller an identifier unique to either the caller or the intended recipient;
C. communicating said identifier to an entity that is enabled to authenticate the identifier by checking said identifier against at least the Caller ID associated with the identifier in a database accessible to said entity; and
D. proceeding with the transaction only if at least said Caller ID matches that of an entity that is registered in said database. - View Dependent Claims (57, 58)
-
Specification