Mobile communications message verification of financial transactions
First Claim
Patent Images
1. A method of verifying a transaction comprising:
- receiving at a computerized mobile identity verification system a transaction verification request, the transaction verification request including a wireless device ID and a transaction location;
evaluating the transaction with the mobile identity verification system based on the wireless device ID and the transaction location to generate a first verification value, which is statistically determined and indicates a first probability that the transaction is fraudulent;
determining whether the first verification value meets a predetermined criterion;
sending a transaction verification message to a wireless device associated with the wireless device ID when the first verification value meets the predetermined criterion, wherein the transaction verification message is not sent to the wireless device when the first verification value does not meet the predetermined criterion;
receiving at the mobile identity verification system a message response confirming authorization of the transaction and manually provided by a user of the wireless device associated with the wireless device ID from the wireless device associated with the wireless device ID;
re-evaluating the transaction with the mobile identity verification system based on the message response, thereby generating a second verification value based at least in part on the first verification value and the message response, wherein the second verification value is statistically determined and indicates a second probability that the transaction is fraudulent, wherein generating the second verification value includes adding or subtracting a predetermined value with respect to the first verification value; and
electronically sending the second verification value to a transaction processor, wherein the transaction processor performs an action based on the second verification value.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for verifying a secure transaction by evaluating the transaction, generating a first verification value for the transaction, sending an electronic mobile message to a wireless device associated with the transaction, receiving a response from the wireless device to the electronic mobile message associated with the transaction and generating a new second verification value for the transaction based on the response is provided. The second verification value may be used to validate or invalidate the secure transaction.
97 Citations
18 Claims
-
1. A method of verifying a transaction comprising:
-
receiving at a computerized mobile identity verification system a transaction verification request, the transaction verification request including a wireless device ID and a transaction location; evaluating the transaction with the mobile identity verification system based on the wireless device ID and the transaction location to generate a first verification value, which is statistically determined and indicates a first probability that the transaction is fraudulent; determining whether the first verification value meets a predetermined criterion; sending a transaction verification message to a wireless device associated with the wireless device ID when the first verification value meets the predetermined criterion, wherein the transaction verification message is not sent to the wireless device when the first verification value does not meet the predetermined criterion; receiving at the mobile identity verification system a message response confirming authorization of the transaction and manually provided by a user of the wireless device associated with the wireless device ID from the wireless device associated with the wireless device ID; re-evaluating the transaction with the mobile identity verification system based on the message response, thereby generating a second verification value based at least in part on the first verification value and the message response, wherein the second verification value is statistically determined and indicates a second probability that the transaction is fraudulent, wherein generating the second verification value includes adding or subtracting a predetermined value with respect to the first verification value; and electronically sending the second verification value to a transaction processor, wherein the transaction processor performs an action based on the second verification value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computerized mobile identity verification system comprising:
-
a processor; and a non-transitory computer readable medium coupled to the processor, the computer readable medium comprising code, executable by the processor for implementing a method comprising receiving a transaction verification request, the transaction verification request including a wireless device ID and a transaction location, evaluating the transaction with the mobile identity verification system based on the wireless device ID and the transaction location to generate a first verification value, which is statistically determined and indicates a first probability that the transaction is fraudulent, determining whether the first verification value meets a predetermined criterion, sending a transaction verification message to a wireless device associated with the wireless device ID when the first verification value meets the predetermined criterion, wherein the transaction verification message is not sent to the wireless device when the first verification value does not meet the predetermined criterion, receiving at the mobile identity verification system a message response confirming authorization of the transaction and manually provided by a user of the wireless device associated with the wireless device ID from the wireless device associated with the wireless device ID, re-evaluating the transaction with the mobile identity verification system based on the message response, thereby generating a second verification value based at least in part on the first verification value and the message response, wherein the second verification value is statistically determined and indicates a second probability that the transaction is fraudulent, wherein generating the second verification value includes adding or subtracting a predetermined value with respect to the first verification value, and electronically sending the second verification value to a transaction processor, wherein the transaction processor performs an action based on the second verification value. - View Dependent Claims (18)
-
Specification