Method and apparatus for securing communications
First Claim
1. A method for credit card authorization and approval, comprising:
- (a) verifying, using a host computer, that a communication from a communicating device is being initiated by an authorized credit card user;
(b) selecting and storing, using the host computer, a next transaction specific code;
(c) handing, using the host computer, the next transaction specific code to the communicating device; and
(d) authorizing, using the host computer, a subsequent credit card transaction accompanied by the next transaction specific code.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a method and apparatus for identifying and minimizing the use of cloned communicating devices which communicate with a host device. The method requires that the communicating devices send a transaction specific code and an identification code, along with each communication wherein the transaction specific code changes between each communication. One communicating device, either the authentic device or a fraudulent device might communicate with the host successfully any number of times. However, when a second devices attempts communication whether that device is the authorized device or fraudulent device, the host device will receive a transaction specific code which is inconsistent or out of sequence with that expected by the host. The host device will preferably disallow all further communications involving the particular identification code until the authorized user can be contacted and the transaction specific code reset or even a new set of transaction specific codes are provided. Alternatively, upon detection of the inconsistent transaction specific code, the host computer may prompt the user for information specific to the authorized user that is not stored in the communicating device and would not be readily available to the clone device or the user of the clone device.
42 Citations
17 Claims
-
1. A method for credit card authorization and approval, comprising:
-
(a) verifying, using a host computer, that a communication from a communicating device is being initiated by an authorized credit card user;
(b) selecting and storing, using the host computer, a next transaction specific code;
(c) handing, using the host computer, the next transaction specific code to the communicating device; and
(d) authorizing, using the host computer, a subsequent credit card transaction accompanied by the next transaction specific code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
(e) repeating steps (a) through (d) for each credit card transaction.
-
-
9. The method of claim 1, wherein the transmitted communication passes through a plurality of communicating devices.
-
10. The method of claim 1, wherein the communicating device is a computer.
-
11. The method of claim 1, wherein the transmitted communication passes through a computer network.
-
12. The method of claim 1, wherein the step of transmitting the communication includes a manual entry.
-
13. The method of claim 1, wherein the communication is part of a credit card transaction.
-
14. The method of claim 1, wherein the subsequent credit card transaction does not include an account number for the credit card.
-
15. The method of claim 1, wherein the step of selecting and storing a next transaction specific code includes independently selecting.
-
16. The method of claim 1, wherein the communicating device does not possess the next transaction specific code until after the host computer hands the next transaction specific code to the communicating device.
-
17. The method of claim 1, wherein the credit card user is authorized on a given credit card account, and wherein the subsequent credit card transaction is associated with the given credit card account.
Specification