Contingency network access for accounts or information
First Claim
Patent Images
1. A contingency security code system including:
- an entry point device, said entry device coupled to one or more networks and for gaining access to an account through said one or more networks, said entry point device requiring a first security code for said access;
contingency recognition logic coupled with said one or more networks, wherein said contingency recognition logic will activate if a second security code is entered into said entry point device;
contingency implementation logic coupled with said one or more networks, wherein said contingency implementation logic executes a set of instructions;
wherein said first and second security codes are distinguished from each other.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention teaches an improved security system for accounts or information accessed over a local or wide area network, where the account holder is provided with an alternate security code, usually related to a PIN. During an assault, kidnapping, intimidation or other adverse event, the alternate security or access code/identifier can be placed into the system without the detection of a third party, implementing a contingency scenario and an alternate transaction or access to take place. The contingency instruction protect the assets or information available over the network and executing instructions to protect the account holder by and/or deception of a third party observer.
22 Citations
81 Claims
-
1. A contingency security code system including:
-
an entry point device, said entry device coupled to one or more networks and for gaining access to an account through said one or more networks, said entry point device requiring a first security code for said access;
contingency recognition logic coupled with said one or more networks, wherein said contingency recognition logic will activate if a second security code is entered into said entry point device;
contingency implementation logic coupled with said one or more networks, wherein said contingency implementation logic executes a set of instructions;
wherein said first and second security codes are distinguished from each other.
-
-
2. A system for banking over a network which includes a set of automatic teller machines (ATMs) coupled with a communication system that allow said set of ATMs to access at least one bank account, wherein said at least one account may be accessed by inserting an access card into one of said set of ATMs and providing a personal identification number (PIN),
wherein the improvement includes placing a device coupled to said network which recognizes an alternate PIN entered into one of said set of ATMs and intervenes to provide instructions on said network for providing an alternate withdrawal limit that can be to said at least one bank account when said alternate PIN is entered.
-
9. A method for protecting valuable assets or information accessible over a network by at least a security code and an identification codes, including the acts of:
-
mapping said security and identification codes to at least one diversionary identification code;
storing said mapping on an intercept system, said intercept system connected to said network and including data storage and a computer system;
when said diversionary identification code is entered into an access device, said diversionary identification code instructs said access device to route the access transaction to said intercept system;
when said access transaction is routed to said intercept system, said intercept system compares at least one diversionary identification code said mapping;
wherein if said mapping indicates that said transaction proceed normally, said intercept system routes said access transaction such that said access transaction proceeds normally;
wherein if said mapping indicates that said access transaction meets a contingency criteria, said access transaction will be processed by said intercept system according to a set of contingency instructions. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A process for protecting the characteristics of a transaction for access to assets or information corresponding to an account held by an account custodian, including a credit card account, including the steps of:
-
mapping at least one identification code to at least one diversionary identification code;
storing said mapping on an intercept system, said intercept system connected to said network and including data storage and a computer system;
when said diversionary identification code is entered into an access device, said diversionary identification code instructs said access device to route the access transaction to said intercept system;
when said access transaction is routed to said intercept system, said intercept system compares at least one diversionary identification code said mapping;
wherein if said mapping indicates that said access transaction meets a masking criteria, said access transaction will be processed by said intercept system according to a set of masking instructions, wherein said masking instruction include contacting said account custodian via a network with masked transaction information. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31)
-
-
32. A system for protecting the identity of a transaction conducted at least partially over a network, including:
-
a replacement transaction device in the form of a card with data at least corresponding to account information and a contingency transaction identifier;
a proxy transaction system connected to said network;
wherein when said replacement transaction device is used, said proxy transaction server is activated, said proxy transaction service contacting an account custodian over a network in order to process said transaction;
wherein said transaction is only known via said network to said account custodian through said proxy transaction system.
-
-
33. A contingency security code system including:
-
an entry point device, said entry device coupled to one or more networks and for gaining access to an account through said one or more networks, said entry point device requiring a first security code for said access;
contingency recognition logic coupled with said one or more networks, wherein said contingency recognition logic will activate if a second security code is entered into said entry point device;
contingency implementation logic coupled with said one or more networks, wherein said contingency implementation logic executes a set of instructions;
wherein said first and second security codes are distinguished from each other.
-
-
34. A system for banking over a network which includes a automatic teller machines (ATMs) coupled with a network communication system that allow said ATMs to access at least one bank account, wherein said at least one account may be accessed by inserting an card carrying magnetically or digitally encoded information into one of said set of ATMs and providing a primary personal identification number (PIN) and a corresponding primary account number, wherein the improvement includes:
mapping a contingency identifier and contingency PIN to placing a device coupled to said network which recognizes an alternate code PIN entered into one of said set of ATMs and intervenes to provide instructions on said network for providing a contingency transaction in which only partial access to said at least one bank account is possible when said alternate PIN is entered. - View Dependent Claims (35, 36, 37, 38, 39, 40)
-
41. A method for assisting in the protection an account located with an account custodian, said account with valuable assets or information accessible over a network, including the steps of:
-
providing a user with a first account, said account accessible over a network with a security device and a personal identification code;
providing a user with a contingency identifier, said contingency identifier distinguished from said personal identification code;
providing an access pathway to a emergency account when said contingency identifier is used in a transaction;
wherein accessing said emergency account causes pre-determined instructions to be implemented. - View Dependent Claims (79, 80, 81)
-
-
42. An account protection system including a magnetic card with a magnetic storage that includes a diversionary code for use in a financial transaction involving a personal security identifier or ATM withdrawal further including:
-
an intercepting system that can detect said diversionary code;
said intercepting system capable of matching a diversionary code to a corresponding contingency identifier, said contingency identifier distinguished from said personal security identifier;
wherein if said diversionary code does correspond to said contingency identifier, said intercepting system does not process said financial transaction. - View Dependent Claims (77, 78)
-
-
43. A method for protecting information available over a network and physically located in storage with an account custodian, wherein said information is accessed by at least a first security identifier known and entered by a user, including the acts of:
-
providing said user with a second security identifier, said second security identifier distinguishable from said first security identifier;
when said second security identifier is entered into said network and detected by said account custodian, said account custodian provides access to alternate information, said alternate information distinguished from said information, whereby it would not be apparent to an observer other than said user that said alternate information is not said information. - View Dependent Claims (73, 74, 75, 76)
-
-
44. A contingency security code system including:
-
a biometric entry point device including a biometric detector, said entry device coupled to one or more networks and for gaining access to an account through said one or more networks, said entry point device requiring a first detection result security code for said access;
contingency recognition logic coupled with said one or more networks, wherein said contingency recognition logic will activate if a second security codedetection result is entered detected by into said entry point device; and
contingency implementation logic coupled with said one or more networks, wherein said contingency implementation logic executes a set of instructions;
wherein said first and second security codes detection results are distinguished from each other and said second detection result allows said access.
-
-
45. A method for providing contingency security access comprising the acts of:
-
configuring a biometric security device, said biometric security device including a biometric detector and a computing module, such that said biometric security device recognizes at least a first pattern and a second pattern, said pattern known to at least one accessor;
implementing a first set of instructions executable on said computing module such that when said first pattern is detected by said biometric security device, access is allowed;
implementing a second set of instruction executable on said computer module, such that when said second pattern is detected by said biometric security device, a contingency set of procedures are implemented, wherein said contingency procedures are intentionally activated by said accessor. - View Dependent Claims (46, 47, 48, 49)
-
-
50. A method for activating contingency steps with a biometric security access device comprising the acts of:
-
configuring a biometric access sensor in said biometric security access device, such that said biometric access device recognizes a primary biometric input and a at least one alternate biometric input, wherein said primary and said at least one alternate biometric input are distinguishable by said biometric access device; and
activating a contingency set of instructions by providing said at least one alternate biometric input to said biometric access sensor. - View Dependent Claims (51, 52, 53, 54, 55, 57, 58, 59, 60, 61, 62)
-
-
63. A system for banking over a network which includes a set of automatic teller machines (ATMs) coupled with a communication system that allow said set of ATMs to access at least one bank account maintained by an account custodian, wherein said at least one account may be accessed by inserting an access card into one of said set of ATMs and providing a primary personal identification number (PIN) and a corresponding primary account number,
wherein the improvement includes: mapping a contingency identifier and contingency PIN to placing a device in between the interface to the account custodian and an account processing system, wherein said device recognizes an alternate code PIN entered into one of said set of ATMs and intervenes to provide instructions in said account custodian'"'"'s system for providing an alternate withdrawal limit that can be to said at least one bank account when said alternate PIN is entered. - View Dependent Claims (64, 65, 66, 67, 68, 69)
-
70. A method for protecting account holders during a transaction over a network including the steps of:
-
providing said account holder with a contingency access code;
placing contingency instructions on said network;
coupling a detection device to said network, wherein said detection device is able to detect where said contingency access code is entered during said transaction over a network; and
executing said contingency instructions when said contingency access code is entered.
-
-
71. An improved security access system which includes a security entry device including;
-
alternate security code entry means, capable of being entered into said security entry device;
alternate security code detection means coupled to said security entry device; and
alternate security instruction means responsive to said alternate security code detection means.
-
-
72. A method for providing security with an individual having access to a network including the steps of:
-
a step for placing a contingency code on a network, said individual informed of said contingency code; and
a step for protecting assets accessible over said network, when said contingency code is detected over said network.
-
Specification