Method for secure use of identification cards
First Claim
1. A method for improving the security of a credit card transaction based on the use of an identification card having card data thereon, the method comprising:
- choosing issuer secondary security data from a credit card user'"'"'s secondary ID document, said secondary ID document selected from the group of;
driver'"'"'s licenses, passports, birth certificates, credit cards, debit cards, gift cards, airline tickets, or identification cards;
storing and encrypting the issuer secondary security data in association with a credit card user'"'"'s account information;
transmitting a transaction approval request from a vendor to the issuer, the transaction approval request comprising credit card data, the credit card data comprising the credit card user'"'"'s account information, whereby, receipt of the credit card data by the issuer prompts the credit card user to provide transaction secondary security data stored on a smart card, magstrip, bar code, RFID or combination thereof;
transmitting the transaction secondary security data from the credit card user'"'"'s secondary ID document to the issuer;
comparing the credit card data with the credit card user'"'"'s account information;
comparing the transaction secondary security data transmitted to the issuer secondary security data, the issuer secondary security data having been previously stored and encrypted in association with the credit card user'"'"'s account information; and
refusing the transaction if the transaction secondary security data does not correspond to the issuer secondary security data stored in association with the credit card user'"'"'s account information, andallowing the transaction if the transaction secondary security data does correspond to the issuer secondary security date stored in association with the credit card user'"'"'s account information.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for approving or refusing a transaction is based on the use of an identification card having card data thereon, the card data identifying account information pertaining to the authorized user of the identification card. The method includes storing issuer secondary security data in association with the account information. A transaction approval request is received from a vendor, the transaction approval request including the card data and transaction secondary identifier (secondary ID) data. The transaction is refused if the transaction secondary ID data does not correlate properly to the stored issuer secondary security data. Optionally, a post-transaction confirmation request is issued if the transaction is not refused.
-
Citations
11 Claims
-
1. A method for improving the security of a credit card transaction based on the use of an identification card having card data thereon, the method comprising:
-
choosing issuer secondary security data from a credit card user'"'"'s secondary ID document, said secondary ID document selected from the group of;
driver'"'"'s licenses, passports, birth certificates, credit cards, debit cards, gift cards, airline tickets, or identification cards;storing and encrypting the issuer secondary security data in association with a credit card user'"'"'s account information; transmitting a transaction approval request from a vendor to the issuer, the transaction approval request comprising credit card data, the credit card data comprising the credit card user'"'"'s account information, whereby, receipt of the credit card data by the issuer prompts the credit card user to provide transaction secondary security data stored on a smart card, magstrip, bar code, RFID or combination thereof; transmitting the transaction secondary security data from the credit card user'"'"'s secondary ID document to the issuer; comparing the credit card data with the credit card user'"'"'s account information; comparing the transaction secondary security data transmitted to the issuer secondary security data, the issuer secondary security data having been previously stored and encrypted in association with the credit card user'"'"'s account information; and refusing the transaction if the transaction secondary security data does not correspond to the issuer secondary security data stored in association with the credit card user'"'"'s account information, and allowing the transaction if the transaction secondary security data does correspond to the issuer secondary security date stored in association with the credit card user'"'"'s account information. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for improving the security of a transaction based on the use of an identification card having card data thereon, the method comprising:
-
choosing issuer secondary security data from a card user'"'"'s secondary ID document having secondary data placed on said secondary ID, said secondary ID document selected from the group of;
driver'"'"'s licenses, passports, birth certificates, credit cards, debit cards, gift cards, airline tickets, or identification cards;storing and encrypting the issuer secondary security data in association with the card user'"'"'s account information; receiving a transaction approval request from a vendor, the transaction approval request comprising card data, the card data comprising the card user'"'"'s account information, whereby, receipt of the card data by the card issuer prompts the card user to provide transaction secondary security data; comparing the card data with the credit card user'"'"'s account information; transmitting the transaction secondary security data from the credit card user'"'"'s secondary ID document to the issuer; comparing the transaction secondary security data to the issuer secondary security data stored in association with the credit card user'"'"'s account information; approving the transaction when the transaction secondary security data corresponds with the issuer secondary security data; issuing a post-transaction confirmation request after the transaction is approved; and taking remedial action upon receipt of a repudiation response to the post-transaction confirmation request or upon lack of a response to the post-transaction confirmation request; replacing the issuer secondary security data with new issuer secondary security data after the transaction. - View Dependent Claims (7)
-
-
8. A method for improving the security of a transaction based on the use of an identification card having card data thereon, the method comprising:
-
choosing issuer secondary security data from a card user'"'"'s secondary ID document, said secondary ID document selected from the group of;
driver'"'"'s licenses, passports, birth certificates, credit cards, debit cards, gift cards, airline tickets, or identification cards;storing and encrypting the issuer secondary security data in association with a card user'"'"'s account information; receiving a transaction approval request from a vendor; transmitting card data from a user to the issuer; receiving a request from the issuer for transaction secondary security data, said transaction secondary security data stored on a magstripe of a second card; transmitting the transaction secondary security data from the credit card user'"'"'s secondary ID document to the issuer; comparing the transaction secondary security data to the issuer secondary security data stored in association with the credit card user'"'"'s account information; approving the transaction; issuing a post-transaction confirmation request after the transaction is approved; receiving a response to the post-transaction confirmation request;
characterizing the response as a confirmation response or a repudiation response; andrecording a confirmation record after receiving a confirmation response to the post-transaction confirmation request or taking remedial action upon receipt of a repudiation response to the post-transaction confirmation request. - View Dependent Claims (9, 10)
-
-
11. A method for improving the security of a transaction based on the use of an identification card having card data thereon, the method comprising:
-
choosing issuer secondary security data from a secondary ID document, said secondary ID document selected from the group of;
driver'"'"'s licenses, passports, birth certificates, credit cards, debit cards, gift cards, airline tickets, or identification cards;storing and encrypting the issuer secondary security data in association with account information; receiving a transaction approval request from a vendor, the transaction approval request including transaction card data, the transaction card data comprising identifying account information pertaining to the authorized user of the identification card, and secondary document data placed on a secondary ID; comparing the transaction card data with the credit card user'"'"'s account information; comparing the secondary document data to the issuer secondary security data stored in association with the credit card user'"'"'s account information; approving the transaction when the secondary document data corresponds with the issuer secondary security data; issuing a post-transaction confirmation request after the transaction is approved; and receiving a response to the post-transaction confirmation request;
characterizing the response as a confirmation response or a repudiation response; andrecording a confirmation record after receiving a confirmation response to the post-transaction confirmation request or taking remedial action upon receipt of a repudiation response to the post-transaction confirmation request or upon lack of a response to the post-transaction confirmation request.
-
Specification