Authenticating Wireless Person-to-Person Money Transfers
First Claim
1. A method comprising:
- receiving an electronic request for a value exchange transaction, wirelessly transmitted from a user device;
receiving with the electronic request a transmitted key associated with the electronic request;
determining whether the transmitted key exists in a transactions table;
if the transmitted key is not in the transactions table, inputting the transmitted key and value exchange transaction into the transaction table, and processing the value exchange transaction;
if the transmitted key is in the transactions table, not acting on the value exchange transaction.
2 Assignments
0 Petitions
Accused Products
Abstract
A technique is used to ensure the authenticity of a wireless transmission source which is requesting a transaction to be performed by a system. The transaction may be a person-to-person money transfer or other value exchange transaction. The wireless transmission source may be a mobile phone or other similar device. The wireless transmission source transmits a key with the transaction request. The system will determine the authenticity of the transmission based on the transmitted key. If the transmission is determined to be authentic, the transaction will be acted upon. Various approaches for determining authenticity are discussed. The technique may also be used to prevent acting upon duplicate transmissions.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving an electronic request for a value exchange transaction, wirelessly transmitted from a user device;
receiving with the electronic request a transmitted key associated with the electronic request;
determining whether the transmitted key exists in a transactions table;
if the transmitted key is not in the transactions table, inputting the transmitted key and value exchange transaction into the transaction table, and processing the value exchange transaction;
if the transmitted key is in the transactions table, not acting on the value exchange transaction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method comprising:
-
receiving an electronic request for a value exchange transaction, wirelessly transmitted from a user device;
receiving a transmitted key associated with the electronic request;
generating an expected key;
comparing the transmitted key to the expected key; and
if the transmitted key matches the expected key, processing the value exchange transaction. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification