Method and apparatus for preauthorizing credit card type transactions
First Claim
1. A method for authorizing a transaction by an authorized user, comprising:
- prior to initiating the transaction, storing a pre-set personal identification code for an authorized user in an evaluation system;
providing an authorized user with the pre-set personal identification code;
receiving, in the evaluation system, a first personal identification code which is transmitted to the evaluation system at the request of a person who may or may not be an authorized user;
preauthorizing the transaction when the first personal identification code corresponds to the pre-set personal identification code stored in the evaluation system; and
receiving and storing, in the evaluation system, authorized transaction information in a request;
receiving an identification from the authorized user at a vendor;
receiving a contact from the vendor based on the identification supplied to the vendor after preauthorization;
receiving, in the evaluation system, vendor transaction information of the vendor from the vendor via the contact; and
authorizing the transaction when the vendor transaction information corresponds to the authorized transaction information.
2 Assignments
0 Petitions
Accused Products
Abstract
The method and apparatus for pre-authorizing transactions includes providing a communications device to a vendor and a credit card owner. The credit card owner initiates a credit card transaction by communicating to a credit card company data base, and storing therein, a distinguishing piece of information that characterizes a specific transaction to be made by an authorized user of the credit card at a later time. The information is accepted as "network data" in the data base only if a correct personal identification code (PIC) is used with the communication. The "network data" will serve to later authorize that specific transaction. The credit card owner or other authorized user can then only make that specific transaction with the credit card. Because the transaction is pre-authorized, the vendor does not need to see or transmit a PIC. In addition, if the credit card is lost or stolen, it cannot be used because all sales using the credit card must be pre-authorized using the confidential PIC.
-
Citations
28 Claims
-
1. A method for authorizing a transaction by an authorized user, comprising:
-
prior to initiating the transaction, storing a pre-set personal identification code for an authorized user in an evaluation system; providing an authorized user with the pre-set personal identification code; receiving, in the evaluation system, a first personal identification code which is transmitted to the evaluation system at the request of a person who may or may not be an authorized user; preauthorizing the transaction when the first personal identification code corresponds to the pre-set personal identification code stored in the evaluation system; and receiving and storing, in the evaluation system, authorized transaction information in a request; receiving an identification from the authorized user at a vendor; receiving a contact from the vendor based on the identification supplied to the vendor after preauthorization; receiving, in the evaluation system, vendor transaction information of the vendor from the vendor via the contact; and authorizing the transaction when the vendor transaction information corresponds to the authorized transaction information. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for conducting a transaction by an authorized user, comprising:
-
storing a pre-set personal identification code for a principal authorized user in an evaluation system; providing the principal authorized user with the pre-set personal identification code; receiving, in the evaluation system, a user personal identification; comparing the user personal identification code with the pre-set personal identification code; storing in the evaluation system, when the user personal identification code corresponds to the pre-set personal identification code, user transaction information; receiving, in the evaluation system, at least one of a vendor transaction information and a consumer personal identification code; receiving an identification from the authorized user at a vendor; receiving a contact from the vendor based on the identification supplied to the vendor; and conducting the transaction with the vendor when at least one of the user transaction information stored in the evaluation system or the pre-set personal identification code corresponds to at least one of the vendor transaction information and consumer personal identification code, respectively. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A method for permitting a transaction by an authorized user, comprising:
-
preauthorizing in an evaluation system a request for the transaction of the authorized user for a vendor; supplying the vendor with an identification provided by the authorized user; receiving in the evaluation system after preauthorization a contact from the vendor for authorization of the transaction based on the identification received by the vendor; and authorizing in the evaluation system the transaction in a response to the vendor contact. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. An apparatus for authorizing a transaction by an authorized user comprising:
-
a memory; and an evaluation system that includes the memory, the evaluation system preauthorizing a request of a principal authorized user for the transaction, receiving, after preauthorization, a contact from a vendor based on an identification received by the vendor from the authorized user, and authorizing the transaction in a response to the vendor contact. - View Dependent Claims (25, 26, 27, 28)
-
Specification