Systems and methods to secure transactions via mobile devices
First Claim
1. A computer-implemented method, comprising:
- receiving in a server computer a request for a transaction between a first party and a second party, the request including an indication of a phone number of the first party and an amount to be paid to the second party;
in response to the request, determining by the server computer a geographical location of a mobile phone at the phone number;
determining, by the server computer, a value indicating a risk of the request being fraudulent, based at least in part on the location; and
after the transaction is confirmed and if the risk as indicated by the value is below a threshold, transmitting by the server computer one or more messages to a telecommunication carrier of the mobile phone to collect, via the telecommunication carrier of the mobile phone, funds in accordance with the amount to be paid to the second party.
7 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided to improve security of payment transactions via mobile communications. In one aspect, a system includes an interchange having a common format processor and a plurality of converters to interface with a plurality of different controllers of mobile communications. The converters are configured to communicate with the controllers in different formats and to communicate with the common format processor in a common format for the confirmation of payment requests, made via mobile phones. The common format processor is to determine a risk of a payment request being fraudulent based on the personal identification information associated with a mobile phone and, after the payment request is confirmed and when the risk is below a threshold, to communicate one or more premium messages to the mobile phone to collect funds to fulfill the payment request.
-
Citations
21 Claims
-
1. A computer-implemented method, comprising:
-
receiving in a server computer a request for a transaction between a first party and a second party, the request including an indication of a phone number of the first party and an amount to be paid to the second party; in response to the request, determining by the server computer a geographical location of a mobile phone at the phone number; determining, by the server computer, a value indicating a risk of the request being fraudulent, based at least in part on the location; and after the transaction is confirmed and if the risk as indicated by the value is below a threshold, transmitting by the server computer one or more messages to a telecommunication carrier of the mobile phone to collect, via the telecommunication carrier of the mobile phone, funds in accordance with the amount to be paid to the second party. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 21)
-
-
19. A computer-readable storage media storing instructions, the instructions causing a computer to perform a method, the method comprising:
-
receiving in a server computer a request for a transaction between a first party and a second party, the request including an indication of a phone number of the first party and an amount to be paid to the second party; in response to the request, determining by the server computer a geographical location of a mobile phone at the phone number; determining, by the server computer, a value indicating a risk of the request being fraudulent, based at least in part on the location; and after the transaction is confirmed and if the risk as indicated by the value is below a threshold, transmitting by the server computer one or more messages to a telecommunication carrier of the mobile phone to collect, via the telecommunication carrier of the mobile phone, funds in accordance with the amount to be paid to the second party.
-
-
20. A system, comprising:
-
a data storage facility to store first personal identification information in association with a mobile phone number of a user; and an interchange coupled with the data storage facility, the interchange including a common format processor and a plurality of converters to interface with a plurality of controllers, the converters configured to communicate with the controllers in different formats, the converters to communicate with the common format processor in a common format, the common format processor to instruct a first controller of the controllers, via a first converter of the converters, to communicate with a mobile phone at the mobile phone number of the user to confirm a payment request and obtain a geographical location, the common format processor to determine a risk of the request being fraudulent based on at least in part on the location and, after the request is confirmed and when the risk is below a threshold, to communicate one or more messages to a telecommunication carrier of the mobile phone to collect, via the telecommunication carrier of the mobile phone, funds in accordance with the request.
-
Specification