COMPUTER PROGRAM AND METHOD FOR ADMINISTERING SECURE TRANSACTIONS USING SECONDARY AUTHENTICATION
First Claim
1. A non-transitory computer-readable storage medium with an executable program stored thereon for administering secure transactions using secondary authentication, wherein the program instructs a processor to perform the following steps:
- receiving a transaction request from a user using a first client device;
determining whether the requested transaction is a type of transaction that is already approved;
determining whether one or more current parameters of the transaction are within limits that are already established if the type of transaction is already approved;
transmitting a secondary authentication request to the user to approve the transaction if the current parameters are outside of already established limits or if the type of transaction is not already approved;
receiving a response to the secondary authentication request from the user;
determining from the response whether the user approved the transaction;
aborting the transaction if the user denies the transaction; and
performing the transaction if the user approves the transaction or if the type of transaction is already approved and the current parameters are within already established limits.
3 Assignments
0 Petitions
Accused Products
Abstract
Administering secure transactions using secondary authentication includes receiving a transaction request from a user using a first client device, determining whether the requested transaction is a type of transaction that is already approved, determining whether one or more current parameters of the transaction are within limits that are already established if the type of transaction is already approved, transmitting a secondary authentication request to the user to approve the transaction if the current parameters are outside of already established limits or if the type of transaction is not already approved, receiving a response to the secondary authentication request from the user, determining from the response whether the user approved the transaction, aborting the transaction if the user denies the transaction, and performing the transaction if the user approves the transaction or if the type of transaction is already approved and the current parameters are within already established limits.
45 Citations
22 Claims
-
1. A non-transitory computer-readable storage medium with an executable program stored thereon for administering secure transactions using secondary authentication, wherein the program instructs a processor to perform the following steps:
-
receiving a transaction request from a user using a first client device; determining whether the requested transaction is a type of transaction that is already approved; determining whether one or more current parameters of the transaction are within limits that are already established if the type of transaction is already approved; transmitting a secondary authentication request to the user to approve the transaction if the current parameters are outside of already established limits or if the type of transaction is not already approved; receiving a response to the secondary authentication request from the user; determining from the response whether the user approved the transaction; aborting the transaction if the user denies the transaction; and performing the transaction if the user approves the transaction or if the type of transaction is already approved and the current parameters are within already established limits. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of administering secure transactions using secondary authentication, the method comprising the steps of:
-
receiving, with a server device, a transaction request from a user using a first client device; determining whether the requested transaction is a type of transaction that is already approved; determining whether one or more current parameters of the transaction are within limits that are already established if the type of transaction is already approved; transmitting a secondary authentication request to the user to approve the transaction if the current parameters are outside of already established limits or if the type of transaction is not already approved; receiving a response to the secondary authentication request from the user; determining from the response whether the user approved the transaction; aborting the transaction if the user denies the transaction; and performing the transaction if the user approves the transaction or if the type of transaction is already approved and the current parameters are within already established limits. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer-readable storage medium with an executable program stored thereon for automatically enrolling users for access to secure data resources, wherein the program instructs a processor to perform the following steps:
-
receiving a user enrollment request from a requester; preparing a verification request that includes a plurality of usernames and a plurality of contact identifiers, each username corresponding to a user and associated with one contact identifier; transmitting the verification request to a third party server device; receiving verification results from the third party server device; and enrolling users whose username and contact identifier were verified by the third party server device. - View Dependent Claims (20, 21, 22)
-
Specification