Two factor authentications for financial transactions
First Claim
1. A method for pre-approving a financial transaction, wherein an issuer computer performs steps comprising:
- a) receiving a request for pre-approval of a financial transaction from a purchaser, prior to initiation of the financial transaction, wherein the request includes card information and at least one restriction;
b) determining whether the card information is authentic and sufficient funds are available;
c) upon determining that the card information is authentic and sufficient funds are available, transmitting a first verification indicia to a target address associated with the purchaser;
d) subsequently, receiving financial transaction information and a second verification indicia from a merchant involved in the financial transaction;
e) determining whether the second verification indicia is authentic based upon whether at least a portion of the second verification indicia matches at least a portion of the first verification indicia;
f) determining whether the at least one restriction is satisfied by the received financial transaction information; and
g) transmitting approval of the financial transaction to the merchant in response to successful authentication of the second verification indicia and the satisfaction of the at least one restriction.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention relates to a method for authenticating financial transactions by using an additional factor which is not present on a physical card, and which is not used in sequential transactions. In one example, a purchaser provides card information to a merchant; the merchant transmits the card information and transaction information to an issuer; the issuer authenticates the card information, and transmits verification indicia to a target address associated with the card information. The purchaser target address may be the telephone number of a mobile telephone of the purchaser or a third party (e.g. parent). The purchaser or third party provides the verification indicia to a merchant; and the merchant transmits the verification indicia back to the issuer. The issuer authenticates that the received verification indicia relative to that sent to the target address, and thus the purchaser is the genuine or authentic person authorized to use card information; and the issuer approves the transaction.
122 Citations
13 Claims
-
1. A method for pre-approving a financial transaction, wherein an issuer computer performs steps comprising:
-
a) receiving a request for pre-approval of a financial transaction from a purchaser, prior to initiation of the financial transaction, wherein the request includes card information and at least one restriction; b) determining whether the card information is authentic and sufficient funds are available; c) upon determining that the card information is authentic and sufficient funds are available, transmitting a first verification indicia to a target address associated with the purchaser; d) subsequently, receiving financial transaction information and a second verification indicia from a merchant involved in the financial transaction; e) determining whether the second verification indicia is authentic based upon whether at least a portion of the second verification indicia matches at least a portion of the first verification indicia; f) determining whether the at least one restriction is satisfied by the received financial transaction information; and g) transmitting approval of the financial transaction to the merchant in response to successful authentication of the second verification indicia and the satisfaction of the at least one restriction. - View Dependent Claims (2, 3, 4)
-
-
5. A method for authenticating a financial transaction, wherein an issuer computer performs steps comprising:
-
a) receiving card information and financial transaction information from a merchant; b) determining whether the card information is authentic and sufficient funds are available for the financial transaction; c) determining whether conditions associated with the card information trigger a required second authentication; d) responsive to determining the card information is authentic, sufficient funds are available and the conditions trigger a second authentication, transmitting a first verification indicia to a target address of a purchaser associated with the card information, and transmitting a false denial to the merchant; e) receiving a second verification indicia from the merchant, responsive to the false denial, wherein the second verification indicia was submitted from the purchaser to the merchant in response to the first verification indicia; f) determining whether the second verification indicia is authentic; and g) transmitting approval of the financial transaction to the merchant in response to successful authentication of the second verification indicia. - View Dependent Claims (6)
-
-
7. A method for authenticating a financial transaction, wherein a merchant point-of-sale terminal performs steps comprising:
-
a) receiving card information at the terminal from a purchaser, and generating transaction information regarding the financial transaction; b) transmitting the card information and the transaction information to an issuer in a first transaction message to the issuer; c) receiving a false denial from the issuer; d) after the purchaser receives a first verification indicia directly from the issuer in response to the transmitted card information and transaction information, receiving a second verification indicia from the purchaser; e) transmitting the second verification indicia to the issuer in a second transaction message to the issuer, responsive to the false denial from the issuer; f) receiving approval from the issuer in response to the issuer successfully authenticating the second verification indicia against the first verification indicia; and g) completing the financial transaction in response to receipt of said approval.
-
-
8. A method for authenticating a financial transaction, wherein an issuer computer performs steps comprising:
-
a) receiving card information and financial transaction information from a merchant; b) determining whether the card information is authentic and sufficient funds are available with respect to an account identified by the card information; c) determining from the financial transaction information, whether or not the financial transaction can be approved without requiring a second authentication; d) upon determining the card information is authentic and sufficient funds are available and determining that the financial transaction can not be approved without requiring a second authentication, using a target address associated with the card information to transmit a first verification indicia through a mobile network to a mobile phone; e) receiving a second verification indicia via the merchant, following delivery of the first verification indicia to the mobile phone, indicating delivery of the second verification indicia to the merchant from the mobile phone or from a user of the mobile phone; f) determining whether the second verification indicia is authentic; and g) transmitting approval of the financial transaction to the merchant in response to successful authentication of the second verification indicia. - View Dependent Claims (9, 10, 11, 12, 13)
-
Specification