Mobile transaction device security system
First Claim
1. A mobile transaction device security system comprising:
- a memory device;
a communication device; and
a processing device coupled to the memory device, wherein the processing device is configured to;
receive a security protocol from a user, the security protocol comprising a permission module and an authentication module, wherein the permission module comprises instructions on when the user must authenticate an identity of the user to perform a transaction, wherein the instructions are provided by the user and stored in a database;
determine that the user is conducting the transaction;
compare at least one characteristic of the transaction with the instructions provided by the user; and
determine a process for authenticating the user by;
determining if the user must authenticate the user'"'"'s identity based on the comparison of the transaction with the instructions provided by the user,allowing the transaction if the user is not required to authenticate the user'"'"'s identity based on the comparison, andrequiring authentication of the user through the authentication module if the comparison of the transaction to the instructions provided by the user indicates that the transaction cannot proceed without authentication, wherein requiring authentication comprises requesting authentication of the user'"'"'s identity, receiving input from the user, comparing the input to the authentication module, and allowing the transaction if the user is authorized to perform the transaction based on the comparison of the input with the authentication module.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the invention include apparatuses, methods, and computer-program products that provide for a unique financial transaction security system. In one embodiment, the financial transaction security system receives a security protocol from a user. The security protocol includes instructions for allowing transactions without authentication and security features for the user if authentication is necessary. The system then determines that the user is conducting a transaction, compares the transaction to the instructions, and determines whether the transaction can occur without authentication. If the user is required to authenticate his identity, the system requests input from the user, compares the input to the security feature, and determines if the user is authenticated. The user is able to customize both the instructions and the security features to provide greater control over financial transaction security.
228 Citations
30 Claims
-
1. A mobile transaction device security system comprising:
-
a memory device; a communication device; and a processing device coupled to the memory device, wherein the processing device is configured to; receive a security protocol from a user, the security protocol comprising a permission module and an authentication module, wherein the permission module comprises instructions on when the user must authenticate an identity of the user to perform a transaction, wherein the instructions are provided by the user and stored in a database; determine that the user is conducting the transaction; compare at least one characteristic of the transaction with the instructions provided by the user; and determine a process for authenticating the user by; determining if the user must authenticate the user'"'"'s identity based on the comparison of the transaction with the instructions provided by the user, allowing the transaction if the user is not required to authenticate the user'"'"'s identity based on the comparison, and requiring authentication of the user through the authentication module if the comparison of the transaction to the instructions provided by the user indicates that the transaction cannot proceed without authentication, wherein requiring authentication comprises requesting authentication of the user'"'"'s identity, receiving input from the user, comparing the input to the authentication module, and allowing the transaction if the user is authorized to perform the transaction based on the comparison of the input with the authentication module. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer-implemented method of providing financial transaction security, the method comprising:
-
receiving a security protocol from a user, the security protocol comprising a permission module and an authentication module, wherein the permission module comprises instructions on when the user must authenticate an identity of the user to perform a transaction, wherein the instructions are provided by the user and stored in a database; determining that the user is conducting the transaction; comparing at least one characteristic of the transaction with the instructions provided by the user; determining if the user must authenticate the user'"'"'s identity based on the comparison of the transaction with the instructions provided by the user; allowing the transaction if the user does not need to authenticate the user'"'"'s identity based on the comparison; and requiring authentication of the user through the authentication module if the comparison of the transaction to the instructions provided by the user indicates that the transaction cannot proceed without authentication, wherein requiring authentication comprises; requesting authentication of the user'"'"'s identity, receiving input from the user, comparing the input to the authentication module, and allowing the transaction if the user is authorized to perform the transaction based on the comparison of the input with the authentication module. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program product for providing a financial transaction security product, the computer program product comprising:
a non-transitory computer-readable medium comprising; an executable portion for causing a computer to receive a security protocol from a user, the security protocol comprising a permission module and an authentication module, wherein the permission module comprises instructions on when the user must authenticate an identity of the user to perform a transaction, wherein the instructions are provided by the user and stored in a database; an executable portion for causing a computer to determine that the user is conducting the transaction; an executable portion for causing a computer to compare at least one characteristic of the transaction with the instructions provided by the user; an executable portion for causing a computer to determine if the user must authenticate the user'"'"'s identity based on the comparison of the transaction with the instructions provided by the user; an executable portion for causing a computer to allow the transaction if the user does not need to authenticate the user'"'"'s identity based on the comparison; and an executable portion for requiring authentication of the user through the authentication module if the comparison of the transaction to the instructions provided by the user indicates that the transaction cannot proceed without authentication, wherein requiring authentication comprises; requesting authentication of the user'"'"'s identity, receiving input from the user, comparing the input to the authentication module, and allowing the transaction if the user is authorized to perform the transaction based on the comparison of the input with the authentication module. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
Specification