EFFICIENT AUTHENTICATION OF A USER FOR CONDUCT OF A TRANSACTION INITIATED VIA MOBILE TELEPHONE
0 Assignments
0 Petitions
Accused Products
Abstract
A method and system for authenticating a user for conduct of a transaction initiated by the user via a data-enabled telephone is presented. Efficient use is made of keystrokes on the data-enabled telephone. The data-enabled telephone is capable of initiating telephone calls over a telephone network and of engaging in two-way data communication with a data server in a network and the server enables conduct of the transaction. Caller identification information is received at the server. The information is associated with a telephone call request initiated by the user via the data-enabled telephone to a service number. The caller identification provides basis for authentication of the user and the caller identification information received at the service number is used to address a message to the user. Included in such a message is a logon key for use by the user in accomplishing the transaction. Thus the user can use the logon key to enter into data communication with the server for conduct of the transaction.
-
Citations
29 Claims
-
1-17. -17. (canceled)
-
18. A method of registering a user for a transaction initiated by the user via a data-enabled telephone, the method comprising:
-
receiving a request from the data-enabled telephone to initiate the transaction, wherein the request is sent to a service number; identifying caller identification information associated with the request; checking the caller identification information against a user registration database; determining that the user is not registered; sending the user a message to register; and receiving user registration information from the user. - View Dependent Claims (19, 20, 21, 22, 23)
-
-
24. A method of authenticating a user for a transaction initiated by the user via a data-enabled telephone, the method comprising:
-
receiving a request from the data-enabled telephone to initiate the transaction, wherein the request is sent to a service number and the request contains a key; authenticating the key against a key database and identifying the caller identification information associated with the key; using the authenticated key to accomplish the transaction; and sending a message confirming the accomplished transaction to the user. - View Dependent Claims (25, 26, 27, 28, 29)
-
Specification