System and method for verifying a user's identity in electronic transactions
DC CAFCFirst Claim
1. A user identity verification method for verifying the identity of a user by a verifier in the course of an electronic transaction, said user identity verification method comprising the steps of:
- (a) pre-enrolling the user, comprising the steps of;
(a1) assigning to the user a bona fide secure identifier; and
,(a2) storing the bona fide secure identifier in a database that is accessible to the verifier;
(b) pre-enrolling a user communications device, wherein pre-enrolling the user communications device comprises the steps of;
(b1) obtaining a user access number for the user communications device, wherein the user access number can be used to open a communications link with the user communications device; and
,(b2) storing the user access number in a database that is accessible to the verifier;
(c) retrieving the user access number stored at Step (b2);
(d) opening a communications link between the verifier and the user communications device by using the user access number retrieved at Step (c);
(e) sending an identity verification request (IVR) from the verifier to the user through the communications link opened at Step (d);
(f) inputting by the user a putative secure identifier;
(g) sending through the communications link opened at Step (d) a response to the IVR of Step (e);
(h) retrieving the bona fide secure identifier stored at Step (a2);
(i) comparing the putative secure identifier input at Step (f) with the bona fide secure identifier retrieved at Step (h); and
,(j) allowing the transaction to proceed only if the comparison of Step (i) results in a match between the putative secure identifier and the bona fide secure identifier.
1 Assignment
Litigations
3 Petitions
Accused Products
Abstract
In an electronic transaction, the invention provides a process and system for blocking a user'"'"'s account until a verifier verifies the identity of the user. The process comprises pre-enrolling the user and the user'"'"'s personal communication device. Optionally, one or more of the user'"'"'s accounts are enrolled.
At the time a transaction is initiated, the verifier sends an identification verification request to the portable communication device of the person initiating the electronic-transaction. The person then verifies his/her identity as the user. Optionally, the user authorizes the amount of the transaction.
Optionally, the verifier issues to the user a proxy transaction card which the user uses to initiate electronic transactions that will be billed to one of the user'"'"'s pre-enrolled accounts. Using information obtained from the user'"'"'s proxy transaction card, the retailer/merchant'"'"'s bank opens a communications link to the verifier, and the verifier then verifies the user'"'"'s identity.
48 Citations
19 Claims
-
1. A user identity verification method for verifying the identity of a user by a verifier in the course of an electronic transaction, said user identity verification method comprising the steps of:
-
(a) pre-enrolling the user, comprising the steps of; (a1) assigning to the user a bona fide secure identifier; and
,(a2) storing the bona fide secure identifier in a database that is accessible to the verifier; (b) pre-enrolling a user communications device, wherein pre-enrolling the user communications device comprises the steps of; (b1) obtaining a user access number for the user communications device, wherein the user access number can be used to open a communications link with the user communications device; and
,(b2) storing the user access number in a database that is accessible to the verifier; (c) retrieving the user access number stored at Step (b2); (d) opening a communications link between the verifier and the user communications device by using the user access number retrieved at Step (c); (e) sending an identity verification request (IVR) from the verifier to the user through the communications link opened at Step (d); (f) inputting by the user a putative secure identifier; (g) sending through the communications link opened at Step (d) a response to the IVR of Step (e); (h) retrieving the bona fide secure identifier stored at Step (a2); (i) comparing the putative secure identifier input at Step (f) with the bona fide secure identifier retrieved at Step (h); and
,(j) allowing the transaction to proceed only if the comparison of Step (i) results in a match between the putative secure identifier and the bona fide secure identifier.
-
-
2. A system for verifying the identity of a user by a verifier during the course of an electronic transaction, said system comprising:
-
a. a verifier-database (703); b. a verifier-computer (903), wherein said verifier-computer is adapted to write data to and retrieve data from said verifier-database; c. a first verifier communications device (2403) for receiving communications from the user and transmitting communications to the user, wherein said first verifier communications device is accessible to said verifier-computer; d. a user communications device (2303) for receiving communications from the verifier and transmitting communications to the verifier, wherein said user communications device is accessible to the user; e. an input/output (I/O) (503) device that accepts input from the user and displays output to the user; and
,f. a user-computer (603) coupled to said user communication device and coupled to said I/O device, wherein said user-computer is adapted to; i) display on said I/O device an incoming identity verification request (IVR) sent to said user communications device by the verifier-computer through said verifier communications device; ii) acquire the user'"'"'s input to said I/O device, wherein the user'"'"'s input includes a putative secure identifier; and
,iii) send a response to the IVR from said user communications device to said first verifier communications device, wherein at least one of said user-computer and said verifier-Computer is adapted to; iv) receive as a first input a bona fide secure identifier retrieved from said verifier-database; v) receive as a second input the putative secure identifier; and
,vi) compare the first input with the second input; wherein the electronic transaction proceeds if the first input and second input match. - View Dependent Claims (3, 4)
-
-
5. A user identity verification method for verifying the identity of a user by a verifier in the course of an electronic transaction, said user identity verification method comprising the steps of:
-
(a) assigning a bona fide secure identifier to the user; (b) storing the bona fide secure identifier of Step (a) in a database that is accessible to the verifier; (c) storing a user access number for a user communications device in a database, wherein the database is accessible to the verifier, and wherein the user access number can be used to open a communications link with the user communications device; (d) retrieving the user access number stored at Step (c); (e) using the user access number retrieved at Step (d) to open a communications link between the verifier and the user communications device; (f) sending an identity verification request (IVR) from the verifier to the user through the communications link opened at Step (e); (g) inputting by the user a putative secure identifier; (h) receiving through the communications link opened at Step (e) a response to the IVR of Step (f); (j) retrieving the bona fide secure identifier stored at Step (b); and
,(k) comparing the putative secure identifier input at Step (g) with the bona fide secure identifier retrieved at Step (j), wherein the transaction proceeds if the comparison of Step (k) results in a match between the putative secure identifier and the bona fide secure identifier. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification