SECONDARY AUTHENTICATION OF NETWORK TRANSACTIONS
First Claim
Patent Images
1. A method comprising:
- receiving an account payment authorization request for an amount that exceeds an allowed amount for the account;
applying a rule against the account payment authorization request and other data available in a database with regard to the account to determine whether to approve the account payment authorization request; and
when application of the rule determines that the account payment authorization request is denied, transmitting a request to obtain a secondary authorization of the account payment authorization request.
3 Assignments
0 Petitions
Accused Products
Abstract
Various embodiments herein each include at least one of systems, methods, and software for secondary authentication of network transactions. Some such embodiments, for example, provide a secondary authentication channel to authenticate and authorize payment tendering with a bankcard, payment account, and the like. One method embodiment includes determining whether to approve an account authorization request in view of other data stored in a database with regard to the account. When determined that the account authorization request is denied, transmitting a request to obtain a secondary authorization of the account authorization request.
85 Citations
18 Claims
-
1. A method comprising:
-
receiving an account payment authorization request for an amount that exceeds an allowed amount for the account; applying a rule against the account payment authorization request and other data available in a database with regard to the account to determine whether to approve the account payment authorization request; and when application of the rule determines that the account payment authorization request is denied, transmitting a request to obtain a secondary authorization of the account payment authorization request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A multi-channel authorization method comprising:
-
receiving a transaction request from a customer via a first channel; ascertaining whether additional authentication is required based on an acceptable risk criterion; gathering enrichment evidence from an evidence supplier without customer or staff member interaction in the event that the acceptable risk criterion is not met; and fulfilling the transaction in the event that the enrichment evidence meets an acceptance criterion. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A multi-channel authentication system comprising:
-
a first transaction channel located in a fulfillment center; and a multi-channel authentication controller coupled to the first transaction channel, the multi-channel authentication controller including a processor and a memory storing instructions executable on the processor to perform data processing activities comprising; receiving a transaction from the first transaction channel and the mobile device carried by the customer; and approving the received transaction based in part on a beacon device identifier of a beacon device reported by a mobile device app that executes on the mobile device carried by the customer, the beacon device of the beacon device identifier located proximately to the the fulfillment center. - View Dependent Claims (17, 18)
-
Specification