Customer controlled account, system, and process
First Claim
1. A process for managing account security implemented across a network, comprising the steps of:
- establishing an account for at least one account holder through a network through a computer associated with a central entity;
establishing at least one access device associated with the account, wherein at least one user is associated with at least one of the access devices for one or more transactions, wherein use of the established access devices is defined by at least one rule defined by the central entity and at least one rule that is controllable by at least a customer associated with the account;
defining a first configuration of the customer-controllable rules including;
receiving from the customer, by the computer, via a user interface presented to the customer, a first input specifying a selection of at least one parameter associated with the customer-controllable rules;
storing the at least one parameter in a database to define the first configuration of the customer-controllable rules;
modifying the customer-controllable rules from the first configuration to a second configuration of the customer-controllable rules, including;
receiving from the customer, by the computer, via the user interface presented to the customer, a second input specifying a selection of at least one parameter associated with the customer-controllable rules;
storing the at least one parameter in the database to define the second configuration of the customer-controllable rules;
responding to a request for a transaction associated with at least one of the established access devices, including, by the computer, accessing the at least one parameter from the database, applying the at least one customer-controllable rule, and transmitting the response over the network, wherein the response is based at least in part on the customer-controllable rules.
1 Assignment
0 Petitions
Accused Products
Abstract
Enhanced access devices, e.g. credit cards and/or check cards, are issued with enhanced security features and processes that allow a customer to control circumstances under which their account can be accessed. If a fraudster tries to access the account without knowledge of the consumer set controls, the system can take remedial action with reduced instances of false positives. An account is typically established for an account holder through a central entity, e.g. an issuer. At least one access device is established for the account, wherein at least one user is associated with the access devices for one or more transactions. Use of the access devices is defined by a set of rules defined by the central entity and a set of rules that are controllable by the customer, typically comprising any of the account holder and the user of the account. The customer can input, control, and/or update at least one parameter associated with the customer-controllable rules. Subsequent authorization of the access devices is then controlled based on the customer input and other controls.
-
Citations
18 Claims
-
1. A process for managing account security implemented across a network, comprising the steps of:
-
establishing an account for at least one account holder through a network through a computer associated with a central entity; establishing at least one access device associated with the account, wherein at least one user is associated with at least one of the access devices for one or more transactions, wherein use of the established access devices is defined by at least one rule defined by the central entity and at least one rule that is controllable by at least a customer associated with the account; defining a first configuration of the customer-controllable rules including; receiving from the customer, by the computer, via a user interface presented to the customer, a first input specifying a selection of at least one parameter associated with the customer-controllable rules; storing the at least one parameter in a database to define the first configuration of the customer-controllable rules; modifying the customer-controllable rules from the first configuration to a second configuration of the customer-controllable rules, including; receiving from the customer, by the computer, via the user interface presented to the customer, a second input specifying a selection of at least one parameter associated with the customer-controllable rules; storing the at least one parameter in the database to define the second configuration of the customer-controllable rules; responding to a request for a transaction associated with at least one of the established access devices, including, by the computer, accessing the at least one parameter from the database, applying the at least one customer-controllable rule, and transmitting the response over the network, wherein the response is based at least in part on the customer-controllable rules. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
Specification