SYSTEM FOR PERSONAL AUTHORIZATION CONTROL FOR CARD TRANSACTIONS
1 Assignment
0 Petitions
Accused Products
Abstract
An authorization system allows for cardholder-provided parameters to a personal authorization subsystem. The parameters can be selected by the cardholder to limit the authorizations that would otherwise be granted on the card. The parameters can indicate limits by frequency, dollar amount, merchant, geographic location, time of day, combinations thereof, or the like. Authorization for a given transaction, even where authorized by an issuer and a network operator, might be denied based on self-constraints set by the cardholder. In some variations, messages are sent to the cardholder based on constraints set by the cardholder and transactions might be approved and messaged, or denied and messaged.
65 Citations
19 Claims
-
1-2. -2. (canceled)
-
3. A system comprising:
-
an authorization subprocessor configured to deny a transaction based on a plurality of user selected authorization parameters and constraints; an authorization parameter table database coupled to the authorization subprocessor; and an interface coupled to the authorization parameter table database, wherein the interface is configured to be in communication with a telephone, wherein the telephone allows a user to select a combination of authorization constraints from a plurality of authorization constraints, and allows the user to select authorization parameters associated with the selected authorization constraints, wherein the selected authorization constraints and the selected authorization parameters are used by the authorization subprocessor to determine whether or not a transaction is authorized. - View Dependent Claims (4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
receiving from a telephone, user selections of a combination of authorization constraints from a plurality of authorization constraints; receiving from the telephone, user selections of authorization parameters associated with the user selected constraints; and storing the user selected authorization constraints and the user selected authorization parameters in an authorization parameter table database, wherein an authorization subprocessor uses the user selected authorization constraints and the user selected authorization parameters to determine if a conducted transaction is authorized or not. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A device comprising:
a telephone, wherein the telephone is configured to receive user selections of a combination of authorization constraints from a plurality of authorization constraints, receive user selections of authorization parameters associated with the user selected constraints, and store the user selected authorization constraints and the user selected authorization parameters in an authorization parameter table database, wherein an authorization subprocessor uses the user selected authorization constraints and the user selected authorization parameters to determine if a conducted transaction is authorized or not. - View Dependent Claims (16, 17, 18, 19)
Specification