Method and Apparatus for Managing Transactions
First Claim
Patent Images
1. A method comprising:
- receiving account access information from a user;
accessing the account using the received access information;
harvesting data from a web page associated with the account; and
authenticating the user'"'"'s ability to access the account based on the obtained information.
4 Assignments
0 Petitions
Accused Products
Abstract
A system receives account access information from a user. The account is then accessed using the received access information. Data is harvested from a web page associated with the account or received from another financial data source. The user'"'"'s ability to access the account is authenticated based on the obtained information.
128 Citations
58 Claims
-
1. A method comprising:
-
receiving account access information from a user;
accessing the account using the received access information;
harvesting data from a web page associated with the account; and
authenticating the user'"'"'s ability to access the account based on the obtained information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method comprising:
-
receiving financial account access information from a user;
obtaining information regarding the financial account from a financial data source; and
authenticating the user'"'"'s ability to access the financial account based on the obtained information. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A method of authenticating a user'"'"'s ability to access a financial account, the method comprising:
-
making a first transfer associated with the financial account;
requesting the user to identify the amount of the first transfer;
confirming the user'"'"'s ability to access the financial account if the user correctly identifies the amount of the first transfer; and
denying the user'"'"'s ability to access the financial account if the user does not correctly identify the amount of the first transfer. - View Dependent Claims (25, 26, 27, 28, 29, 30)
-
-
31. A user authentication method for allowing the user access to a user account at one of a plurality of financial institutions, the method comprising:
-
a third-party financial management system collecting user information;
the third-party financial management system collecting user financial account information, wherein the third-party financial management system is coupled among the user and the plurality of financial institutions via at least one network;
the third-party financial management system collecting information about the plurality of financial institutions;
defining a set of authentication rules to authenticate the user;
the third-party financial management system receiving a request from the user to access a user account, wherein the request includes authentication information from the user;
the third-party financial management system applying the authentication rules to determine whether to authenticate the user;
when the user is successfully authenticated, retrieving risk information related to the user, wherein risk information comprises historical data related to user transactions;
when the user is successfully authenticated, the third-party financial management system determining whether to allow access to the user account, wherein access includes the third-party financial management system executing a requested transaction on behalf of the user. - View Dependent Claims (32, 33, 34, 35, 36, 37)
-
-
38. A financial management system, comprising:
-
a communication interface through which the financial management system communicates via at least one network with a plurality of financial institutions and with a user device;
a transaction execution module configurable to execute user-requested transactions with the plurality of financial institutions on behalf of the user; and
an authentication and risk analysis module configured to collect risk information comprising historical data related to user-requested transactions, and further configured to authenticate the user when the user requests a transaction. - View Dependent Claims (39, 40, 41, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52)
-
-
42. The system of 41, wherein the risk information further comprises:
-
previous transaction history;
previous session history, including duration of account access;
account set-up history;
time elapsed since last transaction;
time elapsed since account added;
affiliations of an account with other users;
comparison of a geographic location of the request and geographic locations of previous requests, including determining distance between geographic locations, times of transactions executed from particular geographic locations, and types of connections used at particular geographic locations.
-
-
53. A computer-readable medium having stored thereon instructions, that when executed, cause a user-authentication method to be performed, the method comprising:
-
a third-party financial management system collecting user information;
the third-party financial management system collecting user financial account information, wherein the third-party financial management system is coupled among the user and the plurality of financial institutions via at least one network;
the third-party financial management system collecting information about the plurality of financial institutions;
defining a set of authentication rules to authenticate the user;
the third-party financial management system receiving a request from the user to access a user account, wherein the request includes authentication information from the user;
the third-party financial management system applying the authentication rules to determine whether to authenticate the user;
when the user is successfully authenticated, retrieving risk information related to the user, wherein risk information comprises historical data related to user transactions;
when the user is successfully authenticated, the third-party financial management system determining whether to allow access to the user account, wherein access includes the third-party financial management system executing a requested transaction on behalf of the user. - View Dependent Claims (54, 55, 56, 57, 58)
-
Specification