System and method for securely authorizing and distributing stored-value card data
First Claim
1. A computerized method for securely authorizing and distributing stored-value card data over a communications network, the method comprising:
- storing in a database a plurality of records comprising;
stored-value card data for each stored-value card, and at least one of;
information identifying trusted sources for making stored-value card processing requests and information identifying trusted communications networks for carrying or transmitting stored-value card processing requests, wherein the database is coupled to a central processor;
transmitting a request to change the status of a stored-value card over the communications network from a requesting terminal to the central processor;
determining at least one of;
whether the respective requesting terminal is a trusted source of processing requests; and
whether the communications network is a trusted communications network for carrying or transmitting processing requests; and
processing the request based on the determining step.
5 Assignments
0 Petitions
Accused Products
Abstract
A computerized system and method for securely authorizing and distributing stored-value card data over a communications network is provided. The method allows for storing in the database a plurality of records comprising stored-value card data for each stored-value card as well as information identifying a plurality of trusted sources of stored-value card activation requests and/or a plurality of trusted communications networks for transmitting stored-value card activation requests. A transmitting step allows for a requesting terminal to transmit over a communications network a request to change the status of a stored-value card. The central processor then determines whether the requesting terminal and/or the communications network is a trusted source. Based on whether the requesting terminal or communications network is a trusted source or trusted communications network, the request can be processed and the card can be activated. A method for establishing a list of trusted sources and trusted communications networks is also provided.
192 Citations
71 Claims
-
1. A computerized method for securely authorizing and distributing stored-value card data over a communications network, the method comprising:
-
storing in a database a plurality of records comprising;
stored-value card data for each stored-value card, and at least one of;
information identifying trusted sources for making stored-value card processing requests and information identifying trusted communications networks for carrying or transmitting stored-value card processing requests, wherein the database is coupled to a central processor;
transmitting a request to change the status of a stored-value card over the communications network from a requesting terminal to the central processor;
determining at least one of;
whether the respective requesting terminal is a trusted source of processing requests; and
whether the communications network is a trusted communications network for carrying or transmitting processing requests; and
processing the request based on the determining step. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 61, 62, 63, 64, 65, 66, 67, 68)
-
-
31. A computer-readable medium encoded with computer program code for securely authorizing and distributing stored-value card requests over a communications network, the program code causing a computer to execute a method comprising:
-
controlling a database coupled to the central processor;
storing in the database a plurality of records comprising;
stored-value card data for each stored-value card; and
information identifying trusted sources for making stored-value card processing requests and/or information identifying trusted communications networks for carrying or transmitting stored-value card processing requests;
receiving a request for changing the status of the stored-value card over a communications network from a requesting terminal to the central processor;
determining at least one of;
whether the respective requesting terminal is a trusted source of requests; and
whether the communications network is a trusted communications network for carrying or transmitting requests; and
processing the request based on the determining step. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 41)
-
-
40. The computer-readable medium of claim 40 wherein the requesting terminal'"'"'s phone number is identified using a method involving automatic number identification.
-
42. A system for authorizing stored-value card requests over a communications network between a plurality of terminals and a central processor, comprising:
-
a database coupled to the central processor;
a storage module configured to store in the database a plurality of records comprising;
stored-value card data for each stored-value card; and
information identifying trusted sources for making stored-value card processing requests and trusted communications networks for carrying or transmitting requests and/or information identifying trusted communications networks for carrying or transmitting stored-value card processing requests;
a value module configured to define in each stored record a parameter corresponding to the value of each respective stored-value card;
a first processing module configured to process a request from a respective requesting terminal to the central processor, the central processor configured to accept the request based on whether the request originated from a trusted source and/or whether the request was transmitted or carried by a trusted communications network. - View Dependent Claims (43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59)
-
-
60. A method for securely authorizing stored-value card transactions, comprising:
-
identifying at least one of;
one or more trusted sources of stored-value card processing requests, and one or more trusted communications networks for carrying and/or transmitting stored-value card processing requests;
assigning identifiers to each identified trusted source and trusted communications network;
storing the identifiers in a database coupled to a processor;
receiving a request to process stored-value cards, wherein the request is received from a user terminal over a communications network;
determining at least one of;
whether the respective requesting terminal is a trusted source of requests for processing; and
whether the communications network is a trusted communications network for carrying or transmitting requests for processing; and
processing the request based on the determining step.
-
-
70. The computerized method of claim 70, further comprising:
wherein the provider communications system is an IVR system. - View Dependent Claims (69, 71)
Specification