System and method for enhanced protection and control over the use of identity
DC CAFCFirst Claim
Patent Images
1. A method for a service provider to control use of an entity'"'"'s financial account to facilitate transactions, comprising:
- setting scope of use, defined by the entity via a network, for the financial account, including at least;
(a) the financial account to either OFF or ON;
(b) for a plurality of individual categories, whether each category is authorized or unauthorized for transactions using the financial account, each category representing a different type of transaction partner; and
(c) a geographical scope reflecting a geographic area in which transactions are authorized;
receiving, via a network from a source other than the entity, an inquiry regarding a proposed transaction that would use the financial account;
determining, relative to the scope of use, whether the financial account may or may not be used for the proposed transaction, comprising;
denying when the financial account is OFF;
denying when the financial account is ON and the proposed transaction falls within a category that is unauthorized;
denying when the financial account is ON, the proposed transaction falls within a category that is authorized and when a location of the proposed transaction is outside of the geographical area;
permitting when (a) the financial account is ON, (b) the proposed transaction falls within a category that is authorized, (c) a location of the proposed transaction is inside the geographical area, and (d) the proposed transaction is not otherwise impermissible; and
responding to the inquiry by providing, via a network to the source, first information based on the result of the determining.
0 Assignments
Litigations
0 Petitions
Accused Products
Abstract
A method of protecting use of an entity'"'"'s identity is provided. The method comprises setting a status of the identity to a first state, the first state defining a scope of permitted use of the identity, changing, in advance of an intended use of the identity, the status to a second state defining a scope of permitted use of the identity that is different from the first state, requesting use of the identity after the changing; and returning, after the requesting, the state back to the first state.
37 Citations
16 Claims
-
1. A method for a service provider to control use of an entity'"'"'s financial account to facilitate transactions, comprising:
-
setting scope of use, defined by the entity via a network, for the financial account, including at least; (a) the financial account to either OFF or ON; (b) for a plurality of individual categories, whether each category is authorized or unauthorized for transactions using the financial account, each category representing a different type of transaction partner; and (c) a geographical scope reflecting a geographic area in which transactions are authorized; receiving, via a network from a source other than the entity, an inquiry regarding a proposed transaction that would use the financial account; determining, relative to the scope of use, whether the financial account may or may not be used for the proposed transaction, comprising; denying when the financial account is OFF; denying when the financial account is ON and the proposed transaction falls within a category that is unauthorized; denying when the financial account is ON, the proposed transaction falls within a category that is authorized and when a location of the proposed transaction is outside of the geographical area; permitting when (a) the financial account is ON, (b) the proposed transaction falls within a category that is authorized, (c) a location of the proposed transaction is inside the geographical area, and (d) the proposed transaction is not otherwise impermissible; and responding to the inquiry by providing, via a network to the source, first information based on the result of the determining. - View Dependent Claims (2, 3, 4, 5, 6, 14, 16)
-
-
7. A method for a service provider to control use of an entity'"'"'s financial account to facilitate transactions, the method being executed on electronic computer hardware in combination with software, the method comprising:
-
setting scope of use, as defined by the entity via a network, for the financial account, including at least; (a) setting a state status of the financial account to either an OFF or ON state; (b) setting a category status for each category of a plurality of categories as either authorized or unauthorized for transactions using the financial account, each category representing a type of transaction partner; and (c) setting a distance from the entity, where the entity'"'"'s financial account can be used within said distance; receiving, via a network from a source other than the entity, an inquiry regarding a proposed transaction on the financial account; determining, relative to the scope of use, a response status to the inquiry reflecting whether the financial account may or may not be used for the proposed transaction, comprising; setting the response status to impermissible when the state status for the financial account is OFF; setting the response status to impermissible when the state status for the financial account is ON and the proposed transaction falls within a category having an unauthorized category status; setting the response status to impermissible when the state status for the financial account is ON, the proposed transaction falls within a category having an authorized category status and the distance from the entity where the entity'"'"'s financial account can be used is outside said distance; setting the response status to permissible when (a) the state status of the financial account is ON, (b) the proposed transaction falls within a category having an authorized category status, (c) the distance from the entity where the entity'"'"'s financial account can be used is within said distance, and (d) the proposed transaction is not otherwise impermissible; and responding to the inquiry by providing, via a network to the source, first information based on the response status of the determining. - View Dependent Claims (8, 9, 10, 11, 12, 15)
-
-
13. A method of protecting use of an entity'"'"'s financial account, the method being executed on electronic computer hardware in combination with software, the method comprising:
-
storing data representing; first identification information of an entity; and at least one criteria previously defined by the entity for allowing and/or limiting the use of the financial account, the at least one criteria defining at least one non-monetary circumstance under which the financial account can be used; receiving, via a network from a source other than the entity, a request to determine whether a proposed use of the entity'"'"'s financial account by a party at a location is allowable, the request including second identification information; comparing at least some of the first identification information with at least some of the second identification information; determining whether the proposed use of the entity'"'"'s financial account by the party at the location is authorized for the proposed use, comprising; determining whether the entity'"'"'s financial account is in an entity established ON or OFF state; determining whether or not the at least one criteria blocks the proposed use, with the at least one criteria blocks comprising at least one of; a geographical limitation on where the financial account can be used; and a distance from the entity within which the financial account can be used; and responding to the request by providing, via a network to the source, response information based on the result of said determining.
-
Specification