Systems and methods for emergency duress security code and related instructions
First Claim
1. A non-transitory computer-usable medium embodying computer program code, the computer program code including a set of duress instructions corresponding to a duress shared secret data element, said computer program code when executed by a processor cause the processor to perform a method, the method comprising:
- receiving user input data comprising said duress shared secret data element;
processing said duress instructions to generate a first financial transaction from financial account data of a repository of financial account data associated with a user, said first financial transaction comprising financial transaction data, wherein said duress instructions include an indication to use one of funds from a financial account associated with a financial institution and funds from a financial account associated with said user for said first financial transaction;
generating fraud identification data from said financial transaction data and said duress shared secret data element;
processing proceeds of said first financial transaction to tag said proceeds with said fraud identification data; and
processing a rescission transaction to recover said tagged proceeds.
1 Assignment
0 Petitions
Accused Products
Abstract
A system, method, and computer-usable medium are disclosed for identifying transactions resulting from the access of a financial account while a user is under duress. A user provides a duress shared secret. Instructions associated with the duress shared secret are processed and available financial account operations, along with associated financial account information, are displayed according to the associated instructions. The cash or electronic funds proceeds of a financial transaction operation are tagged with electronic fraud identification data. Tagged funds received by a financial institution are processed to extract their associated fraud identification data, which is then used to generate fraud trail data. If the tagged funds are used to originate follow-on financial transactions, they are likewise tagged with fraud identification data, which is likewise used to generate fraud trail data. Tagged funds are recovered by processing a tagged financial transaction to extract its associated fraud identification data, which is then used to query repositories of fraud trail data. Fraud trail data that matches the query is then processed to determine receiving account information. Rescission transactions are performed to recover funds up to the amount of the tagged financial transaction from the receiving account.
-
Citations
30 Claims
-
1. A non-transitory computer-usable medium embodying computer program code, the computer program code including a set of duress instructions corresponding to a duress shared secret data element, said computer program code when executed by a processor cause the processor to perform a method, the method comprising:
-
receiving user input data comprising said duress shared secret data element; processing said duress instructions to generate a first financial transaction from financial account data of a repository of financial account data associated with a user, said first financial transaction comprising financial transaction data, wherein said duress instructions include an indication to use one of funds from a financial account associated with a financial institution and funds from a financial account associated with said user for said first financial transaction; generating fraud identification data from said financial transaction data and said duress shared secret data element; processing proceeds of said first financial transaction to tag said proceeds with said fraud identification data; and processing a rescission transaction to recover said tagged proceeds. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for identifying financial transactions, comprising:
-
a user interface operable to receive input data from a user, said input data comprising a duress shared secret data element; and a computing device with a processor and memory for storing executable instructions, including a set of duress instructions corresponding to said duress shared secret data element, that are executable by the processor, wherein the processor is programmed to; process said duress instructions to generate a first financial transaction from financial account data of a repository of financial account data associated with said user, said first financial transaction comprising financial transaction data, wherein said instructions include an indication to use one of funds from a financial account associated with a financial institution and funds from a financial account associated with said user for said first financial transaction; generate fraud identification data from said financial transaction data and said duress shared secret data element; process proceeds of said financial transaction to tag said proceeds with said fraud identification data; and process a rescission transaction to recover said tagged proceeds. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-usable medium embodying computer program code, the computer program code including a set of duress instructions corresponding to a duress shared secret data element, said computer program code when executed by a processor cause the processor to perform a method, the method comprising:
-
receiving user input data comprising a said duress shared secret data element; processing said duress instructions to generate a financial transaction from financial account data of a repository of financial account data associated with a user, said financial transaction comprising financial transaction data, wherein said duress instructions include an indication to use one of funds from a financial account associated with a financial institution and funds from a financial account associated with said user for said first financial transaction; generating fraud identification data from said financial transaction data and said duress shared secret data element; processing proceeds of said first financial transaction to tag said proceeds with said fraud identification data; and processing a rescission transaction to recover said tagged proceeds. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
-
23. A non-transitory computer-usable medium embodying computer program code, the computer program code including a set of duress instructions corresponding to a duress shared secret data element, said computer program code when executed by a processor cause the processor to perform the method:
-
processing said duress instructions to generate a first financial transaction from financial account data of a repository of financial account data associated with said user, said first financial transaction comprising a first set of said financial transaction data; generating said fraud identification data from said first set of said financial transaction data and said duress shared secret data element, wherein said duress instructions include an indication to use one of funds from a financial account associated with a financial institution and funds from a financial account associated with said user for said first financial transaction; processing proceeds of said first financial transaction to tag said proceeds with said fraud identification data; tracking said fraud identification data through a chain of second financial transactions to generate fraud trail data comprising a second set of said financial transaction data; and processing a rescission transaction to recover said tagged proceeds. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30)
-
Specification