AUTHENTICATION FRAMEWORK EXTENSION TO VERIFY IDENTIFICATION INFORMATION
First Claim
1. A non-transitory computer readable medium storing thereon a set of instructions which when executed by a processor cause the processor to:
- send an authorization request to an authentication control server, the authorization request including data associated with a participant in a transaction;
receive an authorization response from the authentication control server, the authorization response including an indicator that indicates portions of the data associated with the participant in the transaction that are verified;
determine if the indicator meets or exceeds a threshold; and
authorize the transaction if the threshold is met or exceeded.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for authenticating parties involved in a transaction are disclosed. Some embodiments of the disclosure are directed to systems and methods for authenticating various identification attributes of a participant in a transaction. The attributes can include items such as the participant'"'"'s name, address, social security number, date of birth, or any other identifying attributes. In some embodiments, all participants in a transaction may have identification information authenticated. The 3-D Secure protocol and framework is extended and enhanced to provide the ability to authenticate the identification details of participants in transactions.
26 Citations
20 Claims
-
1. A non-transitory computer readable medium storing thereon a set of instructions which when executed by a processor cause the processor to:
-
send an authorization request to an authentication control server, the authorization request including data associated with a participant in a transaction; receive an authorization response from the authentication control server, the authorization response including an indicator that indicates portions of the data associated with the participant in the transaction that are verified; determine if the indicator meets or exceeds a threshold; and authorize the transaction if the threshold is met or exceeded. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 17)
-
-
9. A method comprising:
-
sending an authorization request to an authentication control server, the authorization request including data associated with a participant in a transaction; receiving an authorization response from the authentication control server, the authorization response including an indicator that indicates portions of the data associated with the participant in the transaction that are verified; determining, with a server computer, if the indicator meets or exceeds a threshold; and authorizing the transaction if the indicator meets or exceeds the threshold. - View Dependent Claims (10)
-
-
11. A non-transitory computer readable medium storing thereon a set of instructions which when executed by a processor cause the processor to:
-
receive an authorization request, the authorization request including data associated with a participant in a transaction; compare the data associated with the participant in the transaction with data stored by an issuer; and send an authorization response, the authorization response including an indicator that indicates results of the comparison. - View Dependent Claims (12, 13, 14, 15, 16, 18)
-
-
19. A method comprising:
-
receiving an authorization request, the authorization request including data associated with a participant in a transaction; comparing the data associated with the participant in the transaction with data stored by an issuer; and sending an authorization response, the authorization response including an indicator that indicates results of the comparison. - View Dependent Claims (20)
-
Specification