System and method for configuring risk tolerance in transaction cards
First Claim
Patent Images
1. A method comprising:
- receiving a security profile configurable by a card party, wherein the security profile comprises one or more requirements;
storing the security profile in a database;
receiving a request to activate a transaction card;
determining whether the request satisfies the security profile'"'"'s one or more requirements.
6 Assignments
0 Petitions
Accused Products
Abstract
A method comprising receiving a security profile configurable by a card party, storing the security profile in a database, receiving a transaction request to activate a transaction card, determining whether the transaction request satisfies the security profile'"'"'s one or more requirements.
-
Citations
28 Claims
-
1. A method comprising:
-
receiving a security profile configurable by a card party, wherein the security profile comprises one or more requirements; storing the security profile in a database; receiving a request to activate a transaction card; determining whether the request satisfies the security profile'"'"'s one or more requirements. - View Dependent Claims (2, 3, 4, 11, 12, 13, 24, 25, 26, 27, 28)
-
-
5-10. -10. (canceled)
-
14. A system comprising:
-
a database; and a processor configured to; receive a security profile associated with and configurable by a card party, wherein the security profile comprises one or more requirements; store the security profile in the database; receive a request to activate a transaction card; determine whether the request satisfies the security profile'"'"'s one or more requirements; activate the transaction card based on the determination that the request satisfies the one or more requirements; and transmit an indication of the activation of the transaction card. - View Dependent Claims (15, 16, 17)
-
-
18. A computer-readable medium encoded with a computer program comprising instructions that when executed cause one or more processors to:
-
receive a security profile associated with and configurable by a card party, wherein the security profile comprises one or more requirements; store the security profile in the database; receive a request to activate a transaction card; determine whether the request satisfies the security profile'"'"'s one or more requirements; activate the transaction card based on the determination that the transaction request satisfies the one or more requirements; and transmit an indication of the activation of the transaction card. - View Dependent Claims (19, 22, 23)
-
-
20-21. -21. (canceled)
Specification