METHOD FOR SECURE USE OF IDENTIFICATION CARDS
First Claim
1. A method for improving the security of a transaction based on the use of an identification card having card data thereon, the card data identifying account information pertaining to the authorized user of the identification card, the method comprising:
- storing issuer secondary security data in association with account information;
receiving a transaction approval request from a vendor, the transaction approval request including the card data and transaction secondary identification (secondary ID) data;
comparing the transaction secondary ID data to the stored issuer secondary security data; and
refusing the transaction if the transaction secondary ID data does not correspond to the stored issuer secondary security data.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for approving or refusing a transaction is based on the use of an identification card having card data thereon, the card data identifying account information pertaining to the authorized user of the identification card. The method includes storing issuer secondary security data in association with the account information. A transaction approval request is received from a vendor, the transaction approval request including the card data and transaction secondary identifier (secondary ID) data. The transaction is refused if the transaction secondary ID data does not correlate properly to the stored issuer secondary security data. Optionally, a post-transaction confirmation request is issued if the transaction is not refused.
41 Citations
14 Claims
-
1. A method for improving the security of a transaction based on the use of an identification card having card data thereon, the card data identifying account information pertaining to the authorized user of the identification card, the method comprising:
-
storing issuer secondary security data in association with account information; receiving a transaction approval request from a vendor, the transaction approval request including the card data and transaction secondary identification (secondary ID) data; comparing the transaction secondary ID data to the stored issuer secondary security data; and refusing the transaction if the transaction secondary ID data does not correspond to the stored issuer secondary security data. - View Dependent Claims (2, 4, 5, 6, 7)
-
-
3. The method of claim 3 wherein the secondary ID document is a driver'"'"'s license.
-
8. A method for improving the security of a transaction based on the use of an identification card having card data thereon, the card data identifying account information pertaining to the authorized user of the identification card, the method comprising:
-
receiving a transaction approval request from a vendor; approving the transaction; issuing a post-transaction confirmation request after the transaction is approved; and taking remedial action upon receipt of a repudiation response to the post-transaction confirmation request or upon lack of a response to the post-transaction confirmation request. - View Dependent Claims (9, 10)
-
-
11. A method for improving the security of a transaction based on the use of an identification card having card data thereon, the card data identifying account information pertaining to the authorized user of the identification card, the method comprising:
-
receiving a transaction approval request from a vendor; approving the transaction; issuing a post-transaction confirmation request after the transaction is approved; receiving a response to the post-transaction confirmation request; characterizing the response as a confirmation response or a repudiation response; and recording a confirmation record after receiving a confirmation response to the post-transaction confirmation request or taking remedial action upon receipt of a repudiation response to the post-transaction confirmation request. - View Dependent Claims (12, 13)
-
-
14. A method for improving the security of a transaction based on the use of an identification card having card data thereon, the card data identifying account information pertaining to the authorized user of the identification card, the method comprising:
-
storing issuer secondary security data in association with account information; receiving a transaction approval request from a vendor, the transaction approval request including the card data and transaction secondary identification (secondary ID) data; comparing the transaction secondary ID data to the stored issuer secondary security data; approving the transaction; issuing a post-transaction confirmation request after the transaction is approved; and receiving a response to the post-transaction confirmation request; characterizing the response as a confirmation response or a repudiation response; and recording a confirmation record after receiving a confirmation response to the post-transaction confirmation request or taking remedial action upon receipt of a repudiation response to the post-transaction confirmation request or upon lack of a response to the post-transaction confirmation request.
-
Specification