×

COMPUTER PROGRAM AND METHOD FOR ADMINISTERING SECURE TRANSACTIONS USING SECONDARY AUTHENTICATION

  • US 20130239173A1
  • Filed: 03/12/2012
  • Published: 09/12/2013
  • Est. Priority Date: 03/12/2012
  • Status: Abandoned Application
First Claim
Patent Images

1. A non-transitory computer-readable storage medium with an executable program stored thereon for administering secure transactions using secondary authentication, wherein the program instructs a processor to perform the following steps:

  • receiving a transaction request from a user using a first client device;

    determining whether the requested transaction is a type of transaction that is already approved;

    determining whether one or more current parameters of the transaction are within limits that are already established if the type of transaction is already approved;

    transmitting a secondary authentication request to the user to approve the transaction if the current parameters are outside of already established limits or if the type of transaction is not already approved;

    receiving a response to the secondary authentication request from the user;

    determining from the response whether the user approved the transaction;

    aborting the transaction if the user denies the transaction; and

    performing the transaction if the user approves the transaction or if the type of transaction is already approved and the current parameters are within already established limits.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×