USER AUTHENTICATION AND SECURE TRANSACTION SYSTEM
First Claim
1. A method for providing a user identity authentication system, comprising:
- receiving a request from an individual to create a user-configurable profile in a database;
creating the user-configurable profile, the user-configurable profile comprising data fields for storing user identity data in the data fields;
receiving the user identity data from the individual;
storing the user identity data received from the individual in the user-configurable profile;
receiving a designation, from the individual, identifying at least some of the user identity data as verification data, the verification data used, as a minimum, to authenticate the individual in future transactions between the individual and merchants;
receiving an authentication request from a first merchant to authenticate the individual during a transaction between the individual and the first merchant, the authentication request comprising information provided by the individual to the merchant; and
authenticating the individual at least by comparing the information in the authentication request from the first merchant to the verification data stored in the user-configurable profile.
0 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and apparatus to minimize fraud at the user, merchant, and/or financial institution level. A control computer provides authentication and/or transaction processing. The control computer has access to databases comprising user, merchant, enrollment, transaction, duplicate, and fraudulent activity data. Parties may enroll in the system via an enrollment computer and conduct transactions through the system via a merchant computer. Users are issued hardware identification keys containing an encrypted user code. Access keys can be required in addition to an authorized user key to conduct certain actions. Keys are copy protected and can comprise a computer operating system. The hardware profile of client devices can be recorded. Parties may specify minimum and/or maximum security levels and restrict transactions. Transactions with parties can be authenticated without sending user personal data to the parties. Users can control transfer of information from their personal communication device to other devices.
-
Citations
22 Claims
-
1. A method for providing a user identity authentication system, comprising:
-
receiving a request from an individual to create a user-configurable profile in a database; creating the user-configurable profile, the user-configurable profile comprising data fields for storing user identity data in the data fields; receiving the user identity data from the individual; storing the user identity data received from the individual in the user-configurable profile; receiving a designation, from the individual, identifying at least some of the user identity data as verification data, the verification data used, as a minimum, to authenticate the individual in future transactions between the individual and merchants; receiving an authentication request from a first merchant to authenticate the individual during a transaction between the individual and the first merchant, the authentication request comprising information provided by the individual to the merchant; and authenticating the individual at least by comparing the information in the authentication request from the first merchant to the verification data stored in the user-configurable profile. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 18, 20, 21, 22)
-
-
12. An apparatus for providing a user identity authentication service, comprising:
a network interface; a database for storing a user-configurable profile, the user-configurable profile comprising data fields for storing user identity data in the data fields; and a central processing unit for performing the following functions; receive a request from an individual, over the network interface, to create the user-configurable profile in the database; create the user-configurable profile; receive the user identity data from the individual; store the user identity data received from the individual in the user-configurable profile; receive a designation, from the individual, identifying at least some of the user identity data as verification data, the verification data used, as a minimum, to authenticate the individual in future transactions between the individual and merchants; receive an authentication request from a first merchant to authenticate the individual during a transaction between the individual and the first merchant, the authentication request comprising information provided by the individual to the merchant; and authenticate the individual at least by comparing the information in the authentication request from the first merchant to the verification data stored in the user-configurable profile. - View Dependent Claims (13, 14, 15, 16, 17, 19)
Specification