Network-based verification and fraud-prevention system
First Claim
1. A method for authenticating a person requesting a service, comprising the steps of:
- (a) soliciting an account identification from the person;
(b) using an automatic funds transfer protocol and the account identification to make a deposit in the account, and entering a unique code in a field of the protocol that is retrievable from the account after the deposit is made;
(c) soliciting from the person, after the deposit has been made, the code entered into the field of the protocol; and
(d) matching the code returned by the person with the code entered into the field to make the deposit, a successful match authenticating the person.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method authenticates a person requesting a service by soliciting an account identification from the person, using an automatic funds transfer protocol and the account identification to make a deposit in the account, entering a unique code in a field of the protocol that is retrievable from the account after the deposit is made, soliciting from the person, after the deposit has been made, the code entered into the field of the protocol, and matching the code returned by the person with the code entered into the field to make the deposit, a successful match authenticating the person. Transactions are also triggered by conditions in monitored accounts.
-
Citations
14 Claims
-
1. A method for authenticating a person requesting a service, comprising the steps of:
-
(a) soliciting an account identification from the person;
(b) using an automatic funds transfer protocol and the account identification to make a deposit in the account, and entering a unique code in a field of the protocol that is retrievable from the account after the deposit is made;
(c) soliciting from the person, after the deposit has been made, the code entered into the field of the protocol; and
(d) matching the code returned by the person with the code entered into the field to make the deposit, a successful match authenticating the person. - View Dependent Claims (2, 3)
-
-
4. A system for authenticating a person seeking a service, comprising:
-
a network-connected server accessible by the person seeking the service;
a first mechanism operable by the server for receiving information from the person, including a solicited account identification; and
a second mechanism operable by the server for utilizing a funds transfer protocol to make a deposit into the account identified by the person;
wherein in operation of the second mechanism a unique code, retrievable by the person from the account identified after the deposit is made, is inserted in a field of the fund transfer protocol for the deposit made. - View Dependent Claims (5, 6)
-
-
7. A method for condition-triggered transfer of funds, comprising steps of:
-
(a) establishing, by a third-party enterprise, identity for and access to two or more accounts associated with one person, the third-party enterprise other than an enterprise hosting one of the accounts;
(b) creating a profile authorized by the person, the profile relating account conditions with desired transactions; and
(c) accomplishing transactions according to conditions occurring in one or more of the accounts. - View Dependent Claims (8, 9, 10)
-
-
11. A system for condition-triggered transfer of funds, comprising:
-
a network-connected server;
a profile associating conditions in one or more accounts, associated with a particular person, with desired transactions;
a first mechanism for monitoring conditions in the one or more accounts; and
a second mechanism for accomplishing transactions according to conditions occurring in one or more of the accounts. - View Dependent Claims (12, 13, 14)
-
Specification