SYSTEM AND METHOD FOR VERIFYING A USER'S IDENTITY IN ELECTRONIC TRANSACTIONS
First Claim
1. A user identity verification method for verifying the identity of a user by a verifier in the course of an electronic transaction, said user identity verification method comprising the steps of:
- (a) pre-enrolling the user, comprising the steps of;
(a1) assigning to the user a bona fide secure identifier; and
,(a2) storing the bona fide secure identifier in a database that is accessible to the verifier;
(b) pre-enrolling a user communications device, wherein pre-enrolling the user communications device comprises the steps of;
(b1) obtaining a user access number for the user communications device, wherein the user access number can be used to open a communications link with the user communications device; and
,(b2) storing the user access number in a database that is accessible to the verifier,(c) retrieving the user access number from the stored at Step (b2);
(d) opening a communications link between the verifier and the user communications device by using the user access number retrieved at Step (c);
(e) sending an identity verification request (IVR) from the verifier to the user through the communications link opened at Step (d);
(f) inputting by the user a putative secure identifier;
(g) sending through the communications link opened at Step (d) a response to the IVR of Step (e);
(h) retrieving the bona fide secure identifier stored at Step (a2);
(i) comparing the putative secure identifier input at Step (f) with the bona fide secure identifier retrieved at Step (h); and
,(j) allowing the transaction to proceed only if the comparison of Step (i) results in a match between the putative secure identifier and the bona fide secure identifier.
1 Assignment
0 Petitions
Accused Products
Abstract
In an electronic transaction, the invention provides a process and system for blocking a user'"'"'s account until a verifier verifies the identity of the user. The process comprises pre-enrolling the user and the user'"'"'s personal communication device. Optionally, one or more of the user'"'"'s accounts are enrolled.
At the time a transaction is initiated, the verifier sends an identification verification request to the portable communication device of the person initiating the electronic-transaction. The person then verifies his/her identity as the user. Optionally, the user authorizes the amount of the transaction.
Optionally, the verifier issues to the user a proxy transaction card which the user uses to initiate electronic transactions that will be billed to one of the user'"'"'s pre-enrolled accounts. Using information obtained from the user'"'"'s proxy transaction card, the retailer/merchant'"'"'s bank opens a communications link to the verifier, and the verifier then verifies the user'"'"'s identity.
-
Citations
20 Claims
-
1. A user identity verification method for verifying the identity of a user by a verifier in the course of an electronic transaction, said user identity verification method comprising the steps of:
-
(a) pre-enrolling the user, comprising the steps of; (a1) assigning to the user a bona fide secure identifier; and
,(a2) storing the bona fide secure identifier in a database that is accessible to the verifier; (b) pre-enrolling a user communications device, wherein pre-enrolling the user communications device comprises the steps of; (b1) obtaining a user access number for the user communications device, wherein the user access number can be used to open a communications link with the user communications device; and
,(b2) storing the user access number in a database that is accessible to the verifier, (c) retrieving the user access number from the stored at Step (b2); (d) opening a communications link between the verifier and the user communications device by using the user access number retrieved at Step (c); (e) sending an identity verification request (IVR) from the verifier to the user through the communications link opened at Step (d); (f) inputting by the user a putative secure identifier; (g) sending through the communications link opened at Step (d) a response to the IVR of Step (e); (h) retrieving the bona fide secure identifier stored at Step (a2); (i) comparing the putative secure identifier input at Step (f) with the bona fide secure identifier retrieved at Step (h); and
,(j) allowing the transaction to proceed only if the comparison of Step (i) results in a match between the putative secure identifier and the bona fide secure identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system for verifying the identity of a user by a verifier during the course of an electronic transaction, said system comprising:
-
a. a verifier-database (703); b. a verifier-computer (903), wherein said verifier-computer is adapted to write data to and retrieve data from said verifier-database; c. a first verifier communications device (2403) for receiving communications from the user and transmitting communications to the user, wherein said first verifier communications device is accessible to said verifier-computer; d. a user communications device (2303) for receiving communications from the verifier and transmitting communications to the verifier, wherein said user communications device is accessible to the user; e. an input/output (I/O) (503) device that accepts input from the user and displays output to the user; and
,f. a user-computer (603) coupled to said user communication device and coupled to said I/O device, wherein said user-computer is adapted to; i) display on said I/O device an incoming identity verification request (IVR) sent to said user communications device by the verifier-computer through said verifier communications device; ii) acquire the user'"'"'s input to said I/O device, wherein the user'"'"'s input includes a putative secure identifier; and
,iii) send a response to the IVR from said user communications device to said first verifier communications device, wherein at least one of said user-computer and said verifier-computer is adapted to; iv) receive as a first input a bona fide secure identifier retrieved from said verifier-database; v) receive as a second input the putative secure identifier; vi) compare the first input with the second input; and
,vii) produce a confirmation output that indicates whether the first input matches the second input, wherein the electronic transaction is blocked unless the confirmation output indicates the first input and second input match. - View Dependent Claims (17, 18, 19, 20)
-
Specification