SlideShare una empresa de Scribd logo
1 de 17
Descargar para leer sin conexión
c12) United States Patent
Mello et al.
(54) METHOD AND SYSTEM FOR MOBILE
SERVICES
(76) Inventors: Steven M. Mello, 43 Briar Rd., Bedford,
NH (US) 03110; Arlen J. Van Draanen,
13260 SE. 18th St., Bellevue, WA (US)
98005; John A. Dion, 23 Bolic St.,
Nashua, NH (US) 03062
( *) Notice: Subject to any disclaimer, the term ofthis
patent is extended or adjusted under 35
U.S.C. 154(b) by 18 days.
(21) Appl. No.: 12/263,865
(22) Filed: Nov. 3, 2008
Related U.S. Application Data
(60) Provisional application No. 60/986,559, filed on Nov.
8, 2007.
(51) Int. Cl.
G06K 5100 (2006.01)
G07F 19100 (2006.01)
(52) U.S. Cl. ....................................... 235/379; 235/380
(58) Field of Classification Search ................. 235/379,
(56)
235/380, 382, 383, 492, 493; 713/166, 182;
705/67,44
See application file for complete search history.
References Cited
U.S. PATENT DOCUMENTS
6,741,851 B1 *
7,168,091 B2
7,245,902 B2
7,249,092 B2
7,323,967 B2 *
5/2004 Lee et al..................... 455/410
112007 Schutzer
7/2007 Hawkes
7/2007 Dunn et al.
112008 Booth eta!. ............... 340/5.73
111111 1111111111111111111111111111111111111111111111111111111111111
US007766223Bl
(10) Patent No.: US 7,766,223 Bl
Aug. 3, 2010(45) Date of Patent:
7,380,121 B2 *
7,392,944 B2 *
2002/0095389 A1 *
2004/0039694 A1
2004/0049684 A1 *
2004/0104265 A1 *
2005/0038744 A1
2007/0053518 A1
2007/0100745 A1
2007/0155366 A1
2007/0203827 A1
2007/0203836 A1
* cited by examiner
5/2008 Nomura et al.............. 713/166
7/2008 Shieh ...................... 235/382.5
7/2002 Gaines ........................ 705/67
2/2004 Dunn eta!.
3/2004 Nomura et al.............. 713/182
6/2004 Okada eta!. ................ 235/380
2/2005 Viijoen
3/2007 Tompkins et a!.
5/2007 Keiser et al.
7/2007 Manohar et al.
8/2007 Simpson et a!.
8/2007 Dodin
Primary Examiner-Thien M Le
(74) Attorney, Agent, or Firm-McLane, Graf, Raulerson &
Middleton, Professional Association; Scott C. Rand
(57) ABSTRACT
A method for providing mobile services, such as mobile
financial services, includes providing a wireless handset or
other device as an adjunct access device for a user account.
The device is assigned a unique identification number, suchas
an MDN, MElD, or both. The unique identification number is
associated with the account and in an exemplary embodi-
ment, comprises at least a portion of the account number(s)
withthe service provider. Transactions are conductedwiththe
handset access device and enhanced multi-factor and biomet-
ric security authentication may be provided. Handset voice,
data, or other usage is settled and billed within the financial
account. The service provider is able to download software,
advertising, or content applications to the adjunct device and
maintains the capability to disable the device. In a further
aspect, a system for the execution of mobile transactions is
provided.
20 Claims, 9 Drawing Sheets
101
'--B-A-N""''K-IN_G__..r-102
103
104
105
106
U.S. Patent Aug. 3, 2010 Sheet 1 of9 US 7,766,223 Bl
ON-BOARDING ~
101
BANKING ~-
102
TRANSACTION lNG
i.--""'-
103
AUTHENTICATION '""' 104
r
SETTLEMENT ~-
105
OWNERSHIP
RIGHTS
...... - 106
FIG.1
I (202
SIGNUP
IN-PERSON
(203
BANK
~205
I I ·I SIGNUP OVER-
THE-PHONE
201-------, 1
VI - 1'-'
coa
PERSON CALLS VOICE
BIOMETRIC SERVICE
TO RECORD VOICEPRINT
(204
_I _l
r
.______ _+-~ SIGNUP ovER-1 I
THE-INTERNET
207
CREATE ACCOUNT
GIVE CLIENT "NEW ASSOCIATED WITH
ACCOUNT PACKAGE" MOBILE PHONE
FIG.2
~
00
•
~
~
~
~
=~
~
~
(.H
~
N
0
....0
rFJ
=-('D
('D
.....
N
0
.....
0
d
rJl
-....l
~
0'1
0'1
'N
N
w
=""""'
[302
ONLINE
' [303
I
ATM/POS
301 ,ru I
T 305
MOBILE
v
-==t [304
CHECKS t-
307
FUNDS TRANSFER
& BILL PAY
FIG.3
BANK
312
USER'S BANK
~BANK
llllllll---:309
I 1308
TRANSACTIONAL I 1..
CLEARING
EXTERNAL BANK
~
[310
DIRECT
I I DEPOSIT
I
_l__c311
ACH
~
00
•
~
~
~
~
=~
~
~
(.H
~
N
0
....0
rFJ
=-("D
("D
.....
(.H
0
.....
0
d
rJl
-....l
~
0'1
0'1
'N
N
w
='"'"""
305
TWO-WAY
VOICE
CHANNEL
421-----.....
TWO-WAY MESSAGING CHANNEL
303
1ST FACTOR:
NEAR FIELD
POS/ATM t - - - - - - - - - - - - '
MDNAND/OR
PHONE ID
(IMEI, MElD ETC)
406
···419 407
YES NO
--~ TO 415
MESSAGING CENTER
BANK
309
403
FIG. 4B ., I II II I i'
409
2ND FACTOR:
PIN OR CARD ID
.........................: ··----417
TO/FROM 404
FIG. 4B
'T0413
FIG.4B
TO 411 FROM 415 FROM 416
FIG. 4B FIG. 4B FIG. 4B
FIG.4A
~
00
•
~
~
~
~
=~
~
~
(.H
~
N
0
....0
rFJ
=-('D
('D
.....
.j;o.
0
.....
0
d
rJl
-....l
~
0'1
0'1
'N
N
w
=""""'
421
TO/FROM 305
FIG.4A
TWO-WAY
VOICE
CHANNEL
404
FROM 408
FIG.4A
i
I
1---.: ·-----417
:
l
I
! YES
Il_ ____________ _
SERVICE CALL FOR H 3RD FACTOR:
VOICEPRINT OR ID BIOMETRIC OR
VERIFICATION VOICE CALL
NO
NO
FROM 407,
408,410
FIG.4A
I
FIG.4B
FROM 309 TO 403 T0403
FIG.4A FIG. 4A FIG. 4A
.J.............L....
'
'
415 416
TRANSACTION TRANSACTION
DENIED APPROVED
~---c418MESSAGE MESSAGE
~
00
•
~
~
~
~
=~
>=~
(.H
~
N
0
....0
rFJ
=-('D
('D
.....
Ul
0
.....
0
d
rJl
-....l
~
0'1
0'1
'N
N
w
=""""'
U.S. Patent Aug. 3, 2010 Sheet 6 of9 US 7,766,223 Bl
USER IDENTIFICATION SYSTEM
PHONE IDENTIFICATION 502
-305 [:::::::
f"'--,::
:;::::::
:::.---
0
.........
-PHONE IDENTIFICATION
DATABASE
AUTHENTICATION
DATABASE
PASSWORD I PIN
503)
~
-305 t:::: ~
l'S1 ["-...:: ::::::.--
0 l!l: ,...J
..._
I 504
BIOMETRIC
/508MICROPHONE
Q505 IDENTITY SCORING
DATABASE
TELEPHONE
h -~m
aoooo BASELINE
f:::::: ::::::::00000 ::::;:....--
ODIJOO
VOICEPRINT
lb ~ OF KEYWORD
._506
J 509
MOBILE PHONE
~305
FIG.5
601
VOICE CALL
FOR BIOMETRIC
AUTHENTICATION
YES
REJECT
TRANSACTION
607
NO
NO
606
NO
FIG.6
604
603
SPOKEN KEYWORD
VALIDATION AGAINST
BIOMETRIC DATABASE
WITH ACCOUNT (MDN/
MElD) AS UNIQUE KEY
605
ACCEPT
TRANSACTION
~
00
•
~
~
~
~
=~
~
~
(.H
~
N
0
....0
rFJ
=-('D
('D
.....
-....l
0
.....
0
d
rJl
-....l
~
0'1
0'1
'N
N
w
=""""'
201
IN-NETWORK OUT-OF-NETWORK
710
CHECKS
703
305
ATM/POS DEBIT
Ah : MOBILE PAYMENT
(NFC, RFID, ETC.)
704
705
EFT- OUT OF
MESSAGING SERVICE
(SMS, NETWORK, IP,
WAP, ETC.) I : ~I NETWORK ELECTRONIC
706
XML TRANSACTION SERVICES
FIG. 7
FUNDS TRANSFERS
709
ACCOUNT SETTLEMENT:
PHONE & FINANCIAL
ACCOUNTS
~
00
•
~
~
~
~
=~
~
~
(.H
~
N
0
....0
rFJ
=-('D
('D
.....
QO
0
.....
0
d
rJl
-....l
~
0'1
0'1
'N
N
w
=""""'
U.S. Patent
BANK
l r2o5
/$"'-
Aug. 3, 2010 Sheet 9 of9
,802
MOBILE PHONE GIVEN AS
ADJUNCT DEVICE TO A
FINANCIAL ACCOUNT
/804
RIGHT TO DISABLE
SERVICE
,805
US 7,766,223 Bl
RIGHT TO DOWNLOAD 1-----.-----,-----'
TO PHONE
,806
RIGHT TO
ADVERTISE
/807
RIGHT TO
LOAD CONTENT
/808
RIGHT TO
REPOSSESS
,809
.-----------'---..
'---------~- RIGHTTO
OFFSET
FIG.8
US 7,766,223 Bl
1
METHOD AND SYSTEM FOR MOBILE
SERVICES
CROSS REFERENCE TO RELATED
APPLICATION
This application claims the benefit of priority under 35
U.S.C. §119(e) based on U.S. provisional application No.
60/986,559 filed Nov. 8, 2007. The aforementioned provi-
sional application is incorporated herein by reference in its
entirety.
BACKGROUND
The present disclosure relates generally to a method and
system for facilitating wireless transactions using a wireless
device and, more particularly, a method and system that inte-
grates a wireless adjunct device into a high security environ-
ment for simultaneous management and manipulation of a
single wireless device and one or more user accounts via a
unique identification number of the wireless adjunct device,
such as the MDN and/or MSISDN.
2
Another drawback in the current art beside the need to
develop cross-carrier, cross-device, cross-platform transac-
tional software is the need for carrier approval, both prior and
ongoing, to place executable software on handsets that access
their respective networks. Such permission is obtained, often
at great cost, at the pleasure ofthe carrier.
Another drawback of known systems, beyond carrier
assent and cross-development, is the need to conveniently
distribute such software to account holders in versions appro-
10 priate for their particular handset, and to train consumers in
how to download and operate the software.
Furthermore, transactional and data security pass through
many hands in the current state of the art. Once operable on
the handset, the software, in order to execute financial trans-
15 actions, must often pass instructions through a software
development firm's servers, through other service provider
servers for management and storage and transmission, and
others, in order for the national bank to settle financial trans-
actions. See Viijoen, U.S. Patent Publication No. US2005/
20 0038744.
The system and method disclosed herein find particular
application in conjunction with banking or other financial
transactions conducted with a financial institution and will be
25
Other attempted prior art wireless mobile financial trans-
action solutions involve the use of SMS messages. One
advantage of using SMS for delivering financial transaction
capability is that it successfully interacts with all wireless
devices and requires no handset-based executable software or
carrier assent to utilize. However, SMS messages cost money
described primarily with particular reference thereto. How-
ever, it is to be appreciated that the system and method herein
are amenable to all manner of financial and non-financial
transactions between a customer and a service provider using
a wireless device, including, without limitation, transactions
in the fields of banking, finance, health care, multimedia
entertainment, and so forth.
Economic activity increases as advances in banking and
payment systems are developed. Ubiquitous wireless devices
(including telephones) demonstrate potential for a new para-
digm inbanking and payments. Both consumers and financial
institutions desire secure, cost reducing, convenience enhanc-
ing wireless mobile banking and payment systems.
Currently, most mobile financial service processes involve
complex executable software that must be designed for all
equipment on all platforms. Other available transactions
schemes pass sensitive data amongst multiple parties that
may or may not exhibit due care. Convenience suffers with
design requirements for multiple accounts across multiple
platforms. Also, would-be service providers, and financial
institutions, currently design systems and processes for mul-
tiple devices across multiple communications platforms.
Typically, to deliver mobile financial services, a financial
institution, such as a national bank, develops proprietary soft-
ware to conduct financial transactions on wireless mobile
telephones. Since consumers own myriad handset models
produced by many manufacturers and registered with mul-
tiple carriers potentially operating on multiple wireless or
cellular technologies (e.g., GSM, CDMA, TDMA, WiMax,
WiFi, etc.), banks must develop such software so that it con-
veniently downloads and operates within hundreds ofdiffer-
ent problem sets. Further, the bank must develop such soft-
ware so that it executes properly in several development
environments (e.g., Java, Brew, J2ME, OFX, and others) and
across several different telephone carriers (e.g., AT&T,
Sprint, and so forth). See Tompkins eta!., U.S. Patent Publi-
cation No. US2007/0053518. This remains the case whether
designing a financial product specifically involving, but not
limited to, banking, payments, insurance, wagering, foreign
remittance, brokerage, health care, health care savings, pay-
roll or other type or style of account.
to send and receive, are susceptible to electronic "listening,"
suffer from latency time-out issues, lack confirmation of
delivery to an intended recipient, as well as identity verifica-
30 tion problems where the receiver or senderis never 100% sure
ofthe other's identity. See Dodin, U.S. Patent Publication No.
US2007/0203836. Another drawback to the use ofSMS mes-
sages for mobile financial transaction is that SMS messages,
containing potentially sensitive financial or account informa-
35 tion, are stored in the mobile radio terminal's memory. See
Hawkes, U.S. Pat. No. 7,245,902.
In another drawback to prior art systems, a bank or finan-
cial institution, which is customarily in complete security
control of all of its processes and regulatory obligations,
40 depends on multiple parties, that may or may not take due
care, during the completion of a transaction. Consumers,
deeming banks trustworthy, may have no understanding
regarding the number of parties with access to their personal
information, or who may be processing, handling, or storing
45 their personal information.
Currently, it is inconvenient for consumers to understand
their account balances in real time, and to know when over-
drafts may occur, or when consumers may deem it advisable
to overdraft their accounts. In the current state of the art,
50 banks and other financial institutions produce in-house evalu-
ations and risk assessments regarding consumer balances and
overdraft scores. See Simpson eta!., U.S. Patent Publication
No. US2007/0203827; Keiser eta!., U.S. Patent Publication
No. US2007/0100745. Consumers may or may not know that
55 they are overdrafting in a situation and may or may not under-
stand the fees to be incurred for doing so.
Additionally in the current art, it is most difficult to manage
multiple financial accounts, or more specifically, parent and
subsidiary accounts between family members or those with
60 other relationships. See Dunn eta!., U.S. Pat. No. 7,249,092.
Also in the current state of the art, transaction and data
security can be premised on biometric authentication solu-
tions, and more specifically, voice biometric authentications.
Such biometric authentication is desirable at specific trans-
65 action or security thresholds, such as dollar amount, access to
space, or access to records, e.g., medical or financial records.
However, voice biometric authentication solutions available
US 7,766,223 Bl
3
require mapping of ultra large datasets. See Manohar et a!.,
U.S. Patent Publication No. US2007/0155366. Such solu-
tions require vast amounts of database storage, require more
time to complete search and comparison functions, and are
subject to false and fraudulent biometric authentications, spe-
cifically, false positive voice biometric authentications from
fraudulent recordings. See Schutzer, U.S. Pat. No. 7,168,091.
Also in the current state ofthe art, consumer handsets used
for wireless financial transactions or other transactions or for
access to sensitive information such as health care informa- 10
tion, are set up for the consumer's preferences and tastes.
Consumers and account holders also, may not keep their
wireless accounts open, rendering their access to any execut-
able software or SMS styled transactions schemes for which
they may have registered, dubious. Consumers may also 15
abuse their financial accounts and/or their access to those
accounts.
4
Yet another advantage of the presently disclosed system
and method is that they allow for a more centralized, stream-
lined, and secure process for executing mobile financial ser-
vices. It would therefore be desirable to provide enhanced
multi factor authentication and still further enhanced biomet-
ric security to transactions where threshold values, data sen-
sitivity, etc., may warrant it, without fear of recordings pro-
ducing false positive authentications.
Still another advantage of the present disclosure is that it
provides the ability for consumer participation in the over-
draft process, wherein the adjunct wireless device can be used
to offer the account holder, whether by voice or SMS, an
option to authenticate and authorize or to deny an overdraft-
ing circumstance in real time.
Another advantage ofthe present disclosure is found in that
parent accounts may be associated with a primary adjunct
access device and MDN and one or more subsidiary accounts
associated with one or more additional adjunct access
devices, thus enabling, in conjunction with internet online
Accordingly, the present disclosure provides a new and
improved method and system for facilitating wireless trans-
actions using a wireless device that overcome the above-
referenced problems and others.
20 banking pre-set preferences, a method ofissuing peer-to-peer
payments amongst and between the parent account and the
subsidiary account(s).
SUMMARY Yet another advantage of the present disclosure resides in
its ability to utilize voice biometric data sets that are easily
25 and swiftly analyzed to quickly authenticate, approve, and
consunmwte financial transactions.
In one aspect, a method for facilitating wireless transaction
bank, financial institution, or other service provider includes
providing a wireless mobile device, such as a telephone,
satellite telephone, personal digital assistant (PDA), portable
computer, or the like, to an account holder and simulta-
neously issuing the account holder a unique identification
number of the type enabling the wireless device access to a
wireless network, such as a mobile directory number (MDN)
and/or a mobile equipment identification number (MElD).
The account holder may then use the device to conduct trans-
actions. Multi-factor user authentication is used to verifY the 35
identity of the user as the account holder and, optionally,
further enhanced biometric security may be provided. The
account holder may also employ the wireless device for voice
Still another advantage ofthe present disclosure is found in
that financial institutions seeking to transact wirelessly with
account holders in profitable mauner are able to import or
30 download software or applications or content or accessories
to the wireless adjunct device to maximize it for use with the
financial institutions programs and procedures orfor the insti-
tution to disable the device in the case of misuse or in other
circumstance.
or data transmissions and communications, as the case may
be. In certain embodiments, the financial institution or other 40
service provider may input software applications to the
device, download software applications to the device
remotely via the wireless communicationnetwork, or disable
the device remotely via the wireless communicationnetwork.
In a further aspect, a system for providing mobile financial 45
services is provided.
One advantage of the mobile transactions system and
method in accordance with the present disclosure resides in
the ability to reduce cost, reduce design requirements,
50
increase security, and enhance convenience over existing
mobile transaction systems.
Still further advantages and benefits of the present inven-
tion will become apparent to those ofordinary skill in the art
upon reading and understanding the following detailed
description of the preferred embodiments.
BRIEF DESCRIPTION OF THE DRAWINGS
The accompanying drawings, which are incorporated in
and constitute a part of the specification, illustrate embodi-
ments ofthe invention and together with the description ofthe
invention herein, serve to explain the principles ofthe inven-
tion.
FIG. 1 presents a block diagram overview of the present
disclosure and core elements ofthe system and methodology.
FIG. 2 presents a flowchart diagram illustrating the details
ofthe on-boarding process ofanew financial services account
including issuing an adjunct wireless telephone device
according to an exemplary embodiment ofthe present inven-
tion and including issuing an MDN or MSISDN and MElD to
said device and obtaining a key phrase biometric voice print
Another advantage of the system and method in accor-
dance with the present disclosure is that they are carrier
independent. 55 unique to the account holder.
Another advantage of the presently disclosed system and
method resides in the fact that they limit the software plat-
forms and hardware equipments necessary to design software
for, or, in certain embodiments, eliminate the need for execut-
able software entirely.
Still another advantage of the presently disclosed system
and method is found in that at least some ofthe shortcomings
associated with SMS financial transaction methods are alle-
viated by the present disclosure, since no sensitive data is left
in the memory of wireless device and user identity may be
confirmed through the use ofa biometric authentication such
as voice biometric authentication.
FIG. 3 presents a transaction wheel diagram illustrating the
increased financial account functionality provided by the
adjunct wireless radio telephone device and MDN numbering
system and interactive voice response system according to the
60 preferred embodiment ofthe present invention.
FIGS. 4A and 4B present a flowchart diagram depicting an
exemplary embodiment of the present invention and layered
multi-factor authentication system, where 'pin' based, or
temporary 'pin' based multi-factor authentication is utilized
65 for certain financial transactions requiring enhanced security.
FIG. 5 presents a diagram indicating the details of an
exemplary embodiment of the process where all three core
US 7,766,223 Bl
5
authentication mechanisms, utilizing the MDN or MElD, a
password and voice biometric are depicted.
FIG. 6 presents a diagram that depicts an exemplary
embodiment ofthe process whereinthe authentication system
has a one-to-one mapping at the biometric level.
FIG. 7 is a flowchart diagram depicting the continuous
settlement of a financial account or accounts and re-settle-
ment ofsaid account with voice and data usage input from the
wireless device within and into the financial account within
the bank's 'core' system.
FIG. 8 presents a block diagram ofa preferred embodiment
6
the bank or financial institution 205 via a number ofmethods.
For example, the account holder 201 may visit the institution
via a physical branch 202, may sign up over the phone via a
call center 203, or may sign up online via an Internet interface
204.
At step 206, the bank 205 creates a user account and asso-
ciates an adjunct wireless device 305 (see FIG. 3) with the
account. The wireless adjunct device 305 may be, without
limitation, a wireless mobile radio, cellular telephone, a per-
10 sonal digital assistant, a portable computer, orotherhand held
or portable computer based information handling system.
ofthe present invention where the financial services provider
may manipulate the adjunct wireless device, including dis-
abling said device or importing or otherwise downloading
software or applications or other content or multi-media con- 15
tent to the adjunct wireless device.
The bank 205 assigns to the account holder a unique iden-
tification number for the wireless access device 305, the
unique identification number being ofthe type which enables
the device 305 to access a wireless communications network
for voice and data usage, access to the financial institution,
DETAILED DESCRIPTION OF THE PREFERRED
EMBODIMENTS
While not to be construed as limiting the scope of the
present invention unless specifically indicated, for purposes
ofthis specification, the terms used herein have the following
definitions unless indicated otherwise.
"MDN" means Mobile Directory Number and represents
the unique 10-digit telephone number assigned to a particular
mobile handset account. MDN may also include other num-
bering systems or terminologies including specifically but not
limited to Mobile Station Integrated Services Digital Net-
work (MSISDN) number.
"MElD" means Mobile Equipment Identifier and means a
globally unique number for a handset device and includes
other terms specifically but not limited to ESN (electronic
serial number), pESN (pseudo ESN) and tESN (true ESN) as
well as IMEI, UIMID and others.
"SMS" means short message service, also known as text
messaging. SMS includes other terms specifically but not
limited to 'skymail' or 'short mail' and email variants such as
Blackberry messages including multi-part SMS.
"MMS" means multi-media messages.
"IP" means internet protocol.
"WAP" means wireless application protocol.
"HTML" means Hyper-Text Mark-Up Language.
"WBMP" means wireless bitmap format.
With reference now to FIG. 1, there is shown a block
diagram depicting a system overview of the functional com-
ponents or modules in accordance with a preferred embodi-
ment of the present disclosure. The system includes an on-
boarding module 101 for on-boarding a financial account at a
financial institution 205 (see FIG. 2), which may include
recording and storing a keyword or key phrase associated
with the account holder for biometric identification verifica-
tion purposes. An online banking module 102 is provided for
opening an online banking account. A transactioning module
103 is provided for conducting transactions with the account,
including mobile transactions performed with a wireless
device 305 (see FIG. 3). An authentication module 104 is
provided for authenticating transactions and a settlement
module 105 is provided for settling the financial account
transactions. An ownership rights module 106 is provided to
allow the financial institution to download software, adver-
tising, or other content to the wireless adjunct device 305
and/or disabling the wireless device 305, as the case may
require.
and access to credit card, debit card, ATM, and other payment
or transaction networks. The unique identification number
may be, for example, the MDN, MSISDN, and/or MElD of
20 the adjunct device.
The bank also assigns an account number to the new
account opened at step 206 and creates an association
between the account number and the unique identification
number ofthe adjunct device 305, e.g., in a phone identifica-
25 tion database 502 (see FIG. 5). In a preferredembodiment, the
numbering system of the account is such that the account
number corresponds to the unique identification number of
the wireless adjunct device, and more preferably, to the MDN
or MSISDN. If required, the account number may contain
30 additional digits beyond those contained in the unique iden-
tification number.
At step 207, the wireless adjunct device is given to the
account holder as an access device similar to an ATM card or
checkbook. In a preferred embodiment, the adjunct device
35 may be included as a part of an onboarding package, which
may additionally include, for example, starter checks, an
ATM card, debit/credit card, or credit card, and/or other
equipment suitable for the type offinancial institution and/or
40
type of account opened.
At step 208, the client activates the wireless adjunct device,
e.g., via activation instructions providedby the financial insti-
tution at the opening of a financial or other type of account.
The user also records and transmits a biometric key phrase
voice print to be storedfor future transaction using the adjunct
45 device simultaneous with the activation ofthe adjunct device
305. The device 305 will generally be equipped with a micro-
phone for the input of an acoustic signal and which may be
integral to the device 305 or separately attachable, e.g., as a
part ofa head set, or the like. As used herein, the term "micro-
50 phone" refers to any acousto-electric transducer capable of
converting acoustic signals into electrical signals. The
account holder is also provided with an online internet bank-
ing interface in order to set up SMS, WAP or IP 'pre-sets' to
enable financial transaction capability with the adjunct wire-
55 less communication device 305. Other types of biometric
data, such as fingerprint data, retinal scan data, or facial
recognition data, and so forth, are also contemplated.
In certain embodiments, multiple wireless adjunct devices
305 may be provided along with multiple associated MDN's
60 or MSISDN's or the like to parent and subsidiary accounts in
order to use each device to conduct transactions in the cus-
tomary mode ofthe present disclosure, or, in conjunction with
each other in peer-to-peer mode consistent with information
pre-set on the associated online banking accounts.
Referring now to FIG. 2, an exemplary method ofonboard- 65
ing an account at the financial institution 205 is illustrated. An
account holder 201 may register for a financial account with
Referring now to FIG. 3, there is illustrated an exemplary
banking method and system. After initial set up and authen-
tication of the online banking account, as identified by its
US 7,766,223 Bl
7 8
messaging center at step 403 via the channel420. At step 406,
the messaging center 403 authenticates the transaction using
the first authentication factor by comparing against themes-
sage header MDN and MElD ofthe access device 305.
Ifthe MDN is not associated with an account at the finan-
cial institution, the process proceeds to step 416 and a trans-
action denied message is transmitted to the user via the mes-
saging center 403. Ifthe MDN matches an MDN associated
with an account at the bank 309 at step 407, the process
proceeds to step 408 where it is determinedwhetherthe phone
ID (MElD) matches the MElD associated with the account. If
the MElD does not match the MElD associated with the
associated unique identification number such as MDN and
MElD, to conduct transactions via SMS, WAP, IP, or other
transmittal of banking or financial transactions, an account
holder 301 may then execute standard financial transactions
via a number of methods, such as using an online banking
system 302, a contactless transaction terminal 303, e.g., via
Bluetooth Technology, Radio Frequency Identification
(RFID), or near-field communication technology (NFC), for
access to the credit card, debit card, ATM, and point-of-sale
(POS) networks. When the wireless adjunct device 305 is 10
employed with contactless technology 303, it may preferably
operate in one or more of simple contactless card emulation
mode, interactive reader mode, or peer-to-peer (P2P) mode.
Transactions may also be conducted using standard paper
checks 304 with an ABA number in addition to the MDN-
associated account number, using the wireless adjunct device
305, via an interactive voice response (IVR) system 306 (or
via a live call center), a funds transfer and online bill pay
system 307, Automated Clearing House (ACH) payments
311, and direct deposit 310. All transactions are settled with 20
the clearing system via the banks 'core' 308 and incoming
deposits 309.
account, the process proceeds to step 416 and a transaction
15 denied message is transmitted to the user via the messaging
center 403. If the MElD matches the MElD associated with
FIGS. 4A and 4B are a flow diagram illustrating an exem-
plary method of performing a mobile transaction using the
wireless access device 305. Transactions preferences may be 25
set on online banking to trigger necessary layered authenti-
cation mechanisms from single factor to multi factor. The
wireless adjunct device 305 may be used at a near field point-
of-sale terminal or ATM terminal 303 employing NFC tech-
nology, and the device itself constitutes a first factor of 30
authentication, since the wireless adjunct device itselfrepre-
sents "something the account holder has." Thus, the process
may bypass the first authentication factor 406 and may also,
optionally, bypass the second authentication factor 409.
These alternative pathways represented by the broken lines 35
419. Preferably, the desired level of authentication may be
selectable as pre-stored transaction preferences, which may
be input by the user and/or the bank or other system operator.
When the second authentication factor, which represents
"something the account holder knows," such as a pin number 40
or password, and which may be a temporary pin or password,
is required, the process proceeds to step 409.At step 410, it is
determined whether the second authentication factor passed,
whether the correct PIN or password was input. Ifthe second
authentication factor fails as step 410, the process proceeds to 45
step 416 and a message that the transaction has been denied is
sent to the adjunct device via a message center 403. For most
transactions, the second authentication factor 409 is a suffi-
cient level of authentication. Biometric authentication can
provide a third level of authentication, i.e., "something the 50
account holder is," in several embodiments.
For near field point of sale or ATM transactions 303 using
the mobile adjunct device 305, wherein the second authenti-
cation factor 409 is bypassed, the process proceeds from step
303 directly to the third authentication factor 413 and proceed 55
as described below. Even where the authentication factors
406 and 409 are bypassed, an advanced two-factor authenti-
cation scheme for near field POS orATM transactions 303 is
provided, wherein the first factor is the adjunct device 305
itself, which is something the user has, and the second factor 60
being the user's biometric characteristic, i.e., the voiceprint.
In addition to transactions 303 using near field communi-
cations, the mobile device 305 may also provide various
transaction possibilities in the form of SMS messages or
networking via messaging channel 420, and voice with 65
DTMF (dual-tone multi-frequency) input via voice channel
421. Transaction instructions or data may be transmitted to a
the account, at step 408, the process proceeds to step 409.
Alternatively, the second authentication factor 409 may be
bypassed and the process may proceed directly to the third
authentication factor 413, as represented by the broken lines
417.
Where the second authentication factor is required, a sec-
ond authentication factor, such as a card ID or a PIN pass-
word, is input at step 409. If the transaction is executed at a
fixed location such as an ATM or POS terminal, the second
authentication factor may be input via theATM or POS hard-
ware. If the transaction is being performed from a remote
location via messaging channel420, the pin or password may
be input using a keypad, touch screen, or the like of the
wireless device 305. In this manner, multi-factor authentica-
tion offinancial or other transactions can be executed without
providing any sensitive or personal information resident the
memory of the adjunct device 305.
If the second authentication factor fails at step 410, the
process proceeds to step 416 and a transaction denied mes-
sage is sent to the wireless device 305. Ifthe second authen-
tication factor passes at step 410, the bank 309 is triggered to
determine whether sufficient funds are available in the
account for the transaction sought to be executed at step 411.
If sufficient funds are not available at step 411, the process
continues to step 415 and a transaction denied message is sent
to the wireless device 305 via the messaging center 403.
It is contemplated that the unique identification number,
e.g., MDN, and wireless adjunct device to enable account
holders to participate in the overdraft approval process via
SMS or voice biometric authentication, in real time, to autho-
rize and authenticate or to decline, as the case may be, pend-
ing overdraft transactions.
If sufficient funds are available to complete the requested
transaction at step 411, the process proceeds to step 412
wherein it is determined whether the transaction amount
exceeds some preselected or predetermined threshold value
or other security threshold or criteria, such as a prespecified
dollar value or sensitive nature of information or data being
accessed. Ifthe transaction amount/security threshold is not
reached at step 412, the process proceeds directly to step 416
and a transaction approved message is sent to the account
holder via the messaging center 403.
Ifthe transaction amount is above the threshold amount or
other financial or security threshold is reached at step 412, the
process continues to step 413 and a secure third, biometric
authentication factor, suchas a voice biometric authentication
or "voice print" is required to securely authenticate the trans-
action. In the depicted preferred embodiment herein, the
voice biometric data unit comprises a two factor voiceprint
and keyword combination. Alternatively, the process may
US 7,766,223 Bl
9
proceed directly step 413 where one or both of the first and
second authentication factors 406, 409, were bypasses, i.e.,
via pathways 417 or 419.
If the third, biometric authentication factor is required as
step 413, the process continues to step 404 wherein a call is
placed to the access device 305 and the user speaks the key-
word or phrase. The input keyword or phrase is compared to
the voice recording ofthe user stored in the database 509 (see
FIG. 5). Ifthe spoken keyword or phrase does not match the 10
stored voiceprint of the account holder (e.g., comparing for
both the correct words and the correct voice), the process
continues to step 415 and a transaction denied message is sent
to the wireless device 305 via the messaging center 403. Ifthe
spoken keyword or phrase matches the stored voiceprint of 15
the account holder, the process proceeds to step 416 and a
transaction approved message is sent to the wireless device
305 via the messaging center 403.
10
there is a match at step 604, the process continues to step 605
and the transaction is authenticated, authorized, and
accepted.
Ifthere is not a match at step 604, continues to step 606 and
it is determined whether the biometric authorization has
failed some predetermined number oftimes, e.g., three in the
illustrated embodiment. If the predetermined number of
failed authorization attempts (e.g., 3 failed attempts) has not
been reached at step 606, the process returns to step 603, the
user is asked to again input the spoken keyword phrase and
the process continues as described above. If, at step 606, it is
determined that a positive biometric validation has not been
obtained within the preselected number ofattempts (e.g., 3),
the process continues to step 607 and the transaction is
rejected.
FIG. 7 illustrates an exemplary method for settling a
mobile transaction performed in accordance with the present
invention. At step 704, the account holder 201 may conduct
financial transactions with the adjunct device 305 inthe finan-For transactions in which the standard second authentica-
tion factor 409 was bypassed as represented by the broken
lines 417 or 419, and wherein the voiceprint was authenti-
cated, the process proceeds to step 411, as represented by the
broken line 418 to determine whether there are sufficient
20 cia! institution's network via any of various communication
protocols such as SMS, other network functions, internet
protocol (IP), wireless application protocol (WAP), or via any
contactless or contact mechanism that allows access to pay-
funds in the account to complete the transaction. Ifthere are
sufficient funds, the transaction approved message 416 is 25
sent. If there are not sufficient funds, a transaction denied
message 415 is sent.
ments networks at step 706.
Alternatively, the adjunct device may be used for voice and
data communication at step 707. Such transactions may
include peer-to-peer transfers or transfers to other in-network
account holders (step 706) or out of network accounts (step
705). The account holder 201 may also conduct out-of-net-FIG. 5 illustrates an exemplary method for authenticating a
mobile transaction performed using the wireless access
device in accordance with the present disclosure. The account
holder uses the wireless adjunct device 305 to attempt a
transaction, balance inquiry, funds transfer or other transac-
tion. The financial institution identifies the adjunct device via
30 work financial transactions via the conventional ATM or
Point of Sale networks via debit cards (step 703), or via
checks (step 710).
Settlement is conducted on the financial account, or the
primary financial account where several subsidiary accounts
an MDN or MElD based database 502. The account holder
inputs a password or a pin 503 once connected utilizing a key
system and achieves a second factor ofauthentication from a
password/PIN authentication database 504. In the event a
pre-set transaction amount threshold is reached, or, if the
financial institution deems a third authentication factor nec-
essary, a call is placed to the hand set 305 requesting the
account holder input his key phrase 508 and the key phrase
input is mapped to a database 509 for authentication. Alter-
native options for inputting the key phrase, such as a micro-
phone 505, e.g., for recording the voice input at the institu-
tions facility or land telephone 506.
35 are present, within the financial institution's core system, on
a real time basis, for all financial transactions including those
conducted utilizing the wireless adjunct device and further
including settlement ofthe voice and data and othercontent or
accessory aspects or charges associated with use of the
40 adjunct wireless device via an appropriate application pro-
gramming interface (API) into the single, orprimary financial
account within the financial institution's core system.
The underlying, carrier-based cellular tracking system
sends the adjunct device voice and data usage 707 and mobile
45 payment and account activity records 708 through to the
financial institution via XML stream or other data feed 702 to
FIG. 6 illustrates an exemplary biometric authentication
method for authenticating a mobile transaction performed
using the wireless access device in accordance with the
present disclosure. At step 601, a call is placed from the 50
adjunct wireless device and at step 602, it is determined
whether the device is identified via the MDN, MElD, or both.
If the call is not from an account-associated MDN, the pro-
cess proceeds to step 607 and the authentication is rejected.
Ifit is determined at step 602 that the call is placed from an 55
appropriate MDN or MElD, the process continues to step
603, and the user is prompted e.g., via an on-screen prompt
appearing on a display ofthe adjunct device 305, to speak the
key word or key phrase into a microphone of the adjunct
device. The spoken keyword or phrase thus input to the 60
adjunct device 305 with digital noise layered over the key
phrase input recorded session. A digital representation ofthe
spoken keyword or key phrase is transmitted to the biometric
identity scoring site 509 (see FIG. 5) via the communications
link 421 and at step 604 it is determined whether a match 65
exists between the spokenkeyword or phrase input in step 603
and the prerecorded voiceprint stored in the database 509. If
the banks 'core' system 709, which are cleared using the
bank's clearing system.
FIG. 8 depicts an exemplary method ofdownloading soft-
ware, advertising, or other content to the wireless access
device 305 and/or disabling service for the wireless access
device 305. The financial institution or bank 205 procures the
wireless adjunct devices 305, such as wireless mobile radio
telephone handsets or other suitable adjunct devices and at
step 802 provides them to account holders for use as an
adjunct access device in much the same manner as customary
account equipments, such as debit cards. The bank, as pro-
vider ofthe MDN and MElD ofthe device 305, maintains the
right to disable the adjunct wireless device, e.g., for security
or other reasons, via a disabler module of the owner's rights
106 (see FIG.1). Forexample, the bank may choose to disable
the wireless adjunct device under certain conditions, such as
when a predetermined number ofattempts to authenticate the
user's identity have fail, orin cases ofapparent fraud orabuse.
As deemed necessary for quality of service requirements,
features, or cost offset, the bank now has a single platform for
service enhancement and retains the right to import or down-
US 7,766,223 Bl
11
load software or software updates to the phone 305 (step 805)
from time to time, as a financial institution may deem neces-
sary, e.g., to facilitate financial transactions or other types of
transactions, to advertise upon the device 305 (step 806), the
right to load content such as multi-media content to device
305 (step 807), the right to ask for return of the device 305
(step 808), and the right to offset, within the account holder's
financial account, for loss, theft and abuse (step 809).
The invention has been described with reference to the
preferred embodiments. Modifications and alterations will 10
occur to others upon a reading and understanding of the
preceding detailed description. It is intended that the inven-
tion be construed as including all such modifications and
alterations insofar as they come within the scope of the
appended claims or the equivalents thereof. 15
Each reference cited herein is incorporated herein by ref-
erence in its entirety.
12
3. The system of claim 1, wherein said unique identifica-
tion number is selected from one or both of an MDN and an
MElD.
4. The system ofclaim 3, wherein at least a portion of said
account number includes one or both ofthe MDN and MElD.
5. The system ofclaim 1, wherein said first input device is
an alpha, numeric, or alphanumeric keypad and said second
input device is a microphone.
6. The system ofclaim 1, further comprising:
an ownership rights module including one or more of: a
software download module for downloading software to
said wireless adjunct device; an advertising download
module for downloading advertising content to said
wireless adjunct device; and a disabler module for selec-
tively disabling the wireless adjunct device.
7. The system ofclaim 1, wherein the user-account-based
service is selected from the group consisting of a financial
service and a banking service.
Having thus described the preferred embodiments, the
invention is now claimed to be:
1. A system for executing transactions in connection with a
user-account-based service by a user having a user account,
said system comprising:
8. A method for facilitating wireless transactions executed
20 in connection with a user-account-based service offered by a
service provider, said method comprising:
a wireless adjunct device for receiving and transmitting
information relating to the service via a wireless com- 25
munication network, said wireless adjunct device hav-
ing a nnique identification number of a type which
enables said wireless adjunct device to access the wire-
less communication network, said wireless adjunct
device further having a first input device for inputting 30
alpha, numeric, or alphanumeric data for transmission
over the wireless communicationnetwork when the user
attempts to execute a transaction and a second input
device for inputting user biometric data for transmission
over the wireless communicationnetwork when the user 35
attempts to execute a transaction;
a first level authentication database having stored therein
said unique identification number, said nnique identifi-
cation number being associated with the user account;
a first level authentication processor for verifying that the
unique identification number transmitted by said wire-
less adjunct device matches said unique identification
number stored in said first level authentication database
40
and associated with the user account;
45
a second level authentication database having stored
therein an alpha, numeric, or alphanumeric password,
said alpha, numeric, or alphanumeric password being
associated with the user account;
a second level authentication processor for verifying that 50
alpha, numeric, or alphanumeric data input by the user
and transmitted by the wireless adjunct device matches
said alpha, numeric, or alphanumeric password stored in
said second level authentication database and associated
with the user account; 55
a third level authentication database having stored therein
a biometric data nnit, said biometric data unit being
associated with the user account;
a third level authentication processor for verifying that the
user biometric data transmitted by the wireless adjunct 60
device matches said biometric data unit stored in said
third level authentication database and associated with
the user account.
2. The system of claim 1, wherein said wireless adjunct
device is a cellulartelephone andthe wireless communication 65
network is selected from one or both of a cellular telephony
network and a text messaging network.
registering by a user by accepting registration information
from a user and creating a creating a user account;
assigning a unique identification number to a wireless
adjunct device, said unique identification number being
of a type which enables the wireless adjunct device to
access a wireless communication network;
providing the wireless adjunct device to the user for execut-
ing transactions via the wireless communication net-
work;
storing said nnique identification number in a first level
authentication database and associating the unique iden-
tification number with the user account;
storing an alpha, numeric, or alphanumeric password in a
second level authentication database and associating the
alpha, numeric, or alphanumeric password with the user
account; and
capturing a user biometric data nnit and storing said user
biometric data nnit in a third level authentication data-
base.
9. The method of claim 8, further comprising:
establishing communications between said wireless
adjunct device and said service provider;
receiving transmission ofa transmitted identification num-
ber from the wireless adjunct device;
determining whether a match exists between the transmit-
ted identification number and said unique identification
number stored in said first level authentication database;
and
if a match exists between the transmitted identification
number and said unique identification number stored in
said first level authentication database, accepting trans-
mission of at least one of an input alpha, numeric, or
alphanumeric password and an input biometric data
nnit.
10. The method ofclaim 9, further comprising:
receiving transmission of an input alpha, numeric, or
alphanumeric password;
comparing the input alpha, numeric, oralphanumeric pass-
word to said stored alpha, numeric, or alphanumeric
password; and
granting access to said user account if a match exists
betweenthe input alpha, numeric, or alphanumeric pass-
word and said stored alpha, numeric, or alphanumeric
password.
11. The method ofclaim 9, further comprising:
receiving transmission of an input biometric data unit;
US 7,766,223 Bl
13
comparing the input biometric data unit to said stored user
biometric data unit; and
granting access to said user account if a match exists
between the input biometric data unit and said stored
user biometric data unit.
12. The method of claim 8, wherein said wireless adjunct
device is a cellulartelephone andthe wireless communication
network is selected from one or both of a cellular telephony
network and a text messaging network.
13. The method of claim 8, wherein said unique identifi-
10
cation number is selected from one or both ofan MDN and an
MElD.
14. The method of claim 13, wherein at least a portion of
said account number includes one or both of the MDN and 15
MElD.
15. The method of claim 8, wherein said input alpha,
numeric, or alphanumeric password is input via an alpha,
numeric, or alphanumeric keypad or said adjunct device and
said input biometric data unit is voice print data input via a 20
microphone of said adjunct device.
16. The method of claim 8, further comprising:
establishing communications between said wireless
adjunct device and said service provider;
for each transaction sought to be executed, receiving trans- 25
mission of an identification number from the wireless
adjunct device and determining whether a match exists
between the transmitted identification number and said
unique identification number stored in said first level
authentication database; 30
if a match exists between the transmitted identification
number and said unique identification number stored in
said first level authentication database, accepting trans-
mission of an input alpha, numeric, or alphanumeric
password;
14
comparing said input alpha, numeric, or alphanumeric
password to said stored alpha, numeric, or alphanumeric
password;
if a match exists between the input alpha, numeric, or
alphanumeric password and said stored alpha, numeric,
or alphanumeric password determining whether the
transaction sought to be executed meets a preselected
criterion;
if the transaction does not meet said preselected criterion,
granting access to said user account; and
if the transaction meets said preselected criterion, accept-
ing transmission of an input biometric data unit:
comparing said input biometric data unit to said stored
user biometric data unit; and
granting access to said user account if a match exists
between said input biometric data unit and said stored
user biometric data unit.
17. The method ofclaim 16, further comprising:
said user account is selected from the group consisting ofa
financial account and a bank account and said prese-
lected criterion is a dollar amount.
18. The method of claim 8, wherein the user account is
selected from the group consisting ofa financial account and
a bank account and said method further comprising:
conducting settlement for financial transactions on said
user account; and
settling charges associated with the user's usage of the
wireless adjunct device into said account.
19. The method ofclaim 8, further comprising:
downloading one or both of software applications and
advertising to said wireless adjunct device.
20. The method ofclaim 8, further comprising:
disabling said wireless adjunct device when certain condi-
tions are met.
* * * * *

Más contenido relacionado

Similar a 115 steven m. mello - 7766223 - method and system for mobile services

105 david e. mello - 7526079 - system and method for data attachment in liv...
105   david e. mello - 7526079 - system and method for data attachment in liv...105   david e. mello - 7526079 - system and method for data attachment in liv...
105 david e. mello - 7526079 - system and method for data attachment in liv...Mello_Patent_Registry
 
Are Fingerprints the New Check”Dis associated PressOmaha, NE.docx
Are Fingerprints the New Check”Dis associated PressOmaha, NE.docxAre Fingerprints the New Check”Dis associated PressOmaha, NE.docx
Are Fingerprints the New Check”Dis associated PressOmaha, NE.docxrossskuddershamus
 
TCPA Compliance Experts Explain How to Avoid Fines in 2015
TCPA Compliance Experts Explain How to Avoid Fines in 2015 TCPA Compliance Experts Explain How to Avoid Fines in 2015
TCPA Compliance Experts Explain How to Avoid Fines in 2015 Connect First
 
The Augmented Payment System Patent for ShopSavvy
The Augmented Payment System Patent for ShopSavvyThe Augmented Payment System Patent for ShopSavvy
The Augmented Payment System Patent for ShopSavvyAlexander Muse
 
Systems and methods for communicating with an interactive voice response system
Systems and methods for communicating with an interactive voice response systemSystems and methods for communicating with an interactive voice response system
Systems and methods for communicating with an interactive voice response systemTal Lavian Ph.D.
 
US20030227904
US20030227904US20030227904
US20030227904Oleg Sher
 
Efficient communication in a network
Efficient communication in a networkEfficient communication in a network
Efficient communication in a networkTal Lavian Ph.D.
 
US20040153375 (1)
US20040153375 (1)US20040153375 (1)
US20040153375 (1)ajit kumar
 
NPE 유니록(Uniloc, 유니락)과 카카오/라인/삼성의 특허 소송 개요
NPE 유니록(Uniloc, 유니락)과 카카오/라인/삼성의 특허 소송 개요NPE 유니록(Uniloc, 유니락)과 카카오/라인/삼성의 특허 소송 개요
NPE 유니록(Uniloc, 유니락)과 카카오/라인/삼성의 특허 소송 개요안나 정
 
Versata's Sur-Reply re Patent Eligibility
Versata's Sur-Reply re Patent EligibilityVersata's Sur-Reply re Patent Eligibility
Versata's Sur-Reply re Patent EligibilityGeorge Webb
 
A Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and ApplicationsA Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and Applicationstheijes
 

Similar a 115 steven m. mello - 7766223 - method and system for mobile services (20)

105 david e. mello - 7526079 - system and method for data attachment in liv...
105   david e. mello - 7526079 - system and method for data attachment in liv...105   david e. mello - 7526079 - system and method for data attachment in liv...
105 david e. mello - 7526079 - system and method for data attachment in liv...
 
USPatent-US8556165
USPatent-US8556165USPatent-US8556165
USPatent-US8556165
 
Are Fingerprints the New Check”Dis associated PressOmaha, NE.docx
Are Fingerprints the New Check”Dis associated PressOmaha, NE.docxAre Fingerprints the New Check”Dis associated PressOmaha, NE.docx
Are Fingerprints the New Check”Dis associated PressOmaha, NE.docx
 
TCPA Compliance Experts Explain How to Avoid Fines in 2015
TCPA Compliance Experts Explain How to Avoid Fines in 2015 TCPA Compliance Experts Explain How to Avoid Fines in 2015
TCPA Compliance Experts Explain How to Avoid Fines in 2015
 
Us20050247777
Us20050247777Us20050247777
Us20050247777
 
Telco Offnet Planned Cost and Data Consolidation
Telco Offnet Planned Cost and Data ConsolidationTelco Offnet Planned Cost and Data Consolidation
Telco Offnet Planned Cost and Data Consolidation
 
The Augmented Payment System Patent for ShopSavvy
The Augmented Payment System Patent for ShopSavvyThe Augmented Payment System Patent for ShopSavvy
The Augmented Payment System Patent for ShopSavvy
 
Systems and methods for communicating with an interactive voice response system
Systems and methods for communicating with an interactive voice response systemSystems and methods for communicating with an interactive voice response system
Systems and methods for communicating with an interactive voice response system
 
Us20120109673
Us20120109673Us20120109673
Us20120109673
 
US20030227904
US20030227904US20030227904
US20030227904
 
Efficient communication in a network
Efficient communication in a networkEfficient communication in a network
Efficient communication in a network
 
Us20120109672
Us20120109672Us20120109672
Us20120109672
 
Us8239324
Us8239324Us8239324
Us8239324
 
Red Flag Rules
Red Flag RulesRed Flag Rules
Red Flag Rules
 
US20040153375 (1)
US20040153375 (1)US20040153375 (1)
US20040153375 (1)
 
Us20080222036
Us20080222036Us20080222036
Us20080222036
 
NPE 유니록(Uniloc, 유니락)과 카카오/라인/삼성의 특허 소송 개요
NPE 유니록(Uniloc, 유니락)과 카카오/라인/삼성의 특허 소송 개요NPE 유니록(Uniloc, 유니락)과 카카오/라인/삼성의 특허 소송 개요
NPE 유니록(Uniloc, 유니락)과 카카오/라인/삼성의 특허 소송 개요
 
Versata's Sur-Reply re Patent Eligibility
Versata's Sur-Reply re Patent EligibilityVersata's Sur-Reply re Patent Eligibility
Versata's Sur-Reply re Patent Eligibility
 
A Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and ApplicationsA Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and Applications
 
FinTech, Internet of Things & Patents
FinTech, Internet of Things & PatentsFinTech, Internet of Things & Patents
FinTech, Internet of Things & Patents
 

Más de Mello_Patent_Registry

134 mark s. thompson - 8449349 - elevator load bearing member having a jack...
134   mark s. thompson - 8449349 - elevator load bearing member having a jack...134   mark s. thompson - 8449349 - elevator load bearing member having a jack...
134 mark s. thompson - 8449349 - elevator load bearing member having a jack...Mello_Patent_Registry
 
133 stephanie mello - 8439759 - system and method of facilitating external ...
133   stephanie mello - 8439759 - system and method of facilitating external ...133   stephanie mello - 8439759 - system and method of facilitating external ...
133 stephanie mello - 8439759 - system and method of facilitating external ...Mello_Patent_Registry
 
132 qian wang - 8415131 - m13 bacteriophage as a chemoaddressable nanoparti...
132   qian wang - 8415131 - m13 bacteriophage as a chemoaddressable nanoparti...132   qian wang - 8415131 - m13 bacteriophage as a chemoaddressable nanoparti...
132 qian wang - 8415131 - m13 bacteriophage as a chemoaddressable nanoparti...Mello_Patent_Registry
 
130 michael m. iwatake - 8288828 - via contact structure having dual silici...
130   michael m. iwatake - 8288828 - via contact structure having dual silici...130   michael m. iwatake - 8288828 - via contact structure having dual silici...
130 michael m. iwatake - 8288828 - via contact structure having dual silici...Mello_Patent_Registry
 
129 andrew z. fire - 8283329 - genetic inhibition of double-stranded rna
129   andrew z. fire - 8283329 - genetic inhibition of double-stranded rna129   andrew z. fire - 8283329 - genetic inhibition of double-stranded rna
129 andrew z. fire - 8283329 - genetic inhibition of double-stranded rnaMello_Patent_Registry
 
128 phillip d. zamore - 8232260 - in vivo production of small interfering r...
128   phillip d. zamore - 8232260 - in vivo production of small interfering r...128   phillip d. zamore - 8232260 - in vivo production of small interfering r...
128 phillip d. zamore - 8232260 - in vivo production of small interfering r...Mello_Patent_Registry
 
127 dennis cherok - 8182545 - implantable prosthesis
127   dennis cherok - 8182545 - implantable prosthesis127   dennis cherok - 8182545 - implantable prosthesis
127 dennis cherok - 8182545 - implantable prosthesisMello_Patent_Registry
 
126 daniel j. nelson - 8180712 - methods and apparatus for determining whet...
126   daniel j. nelson - 8180712 - methods and apparatus for determining whet...126   daniel j. nelson - 8180712 - methods and apparatus for determining whet...
126 daniel j. nelson - 8180712 - methods and apparatus for determining whet...Mello_Patent_Registry
 
125 robert f. bigelow, jr. - 8100754 - gaming system having multi-player wh...
125   robert f. bigelow, jr. - 8100754 - gaming system having multi-player wh...125   robert f. bigelow, jr. - 8100754 - gaming system having multi-player wh...
125 robert f. bigelow, jr. - 8100754 - gaming system having multi-player wh...Mello_Patent_Registry
 
124 michael mello - 7990543 - surface characterization based on optical pha...
124   michael mello - 7990543 - surface characterization based on optical pha...124   michael mello - 7990543 - surface characterization based on optical pha...
124 michael mello - 7990543 - surface characterization based on optical pha...Mello_Patent_Registry
 
122 thomas s. wiggin - 7963242 - anchor containing a self deploying mooring...
122   thomas s. wiggin - 7963242 - anchor containing a self deploying mooring...122   thomas s. wiggin - 7963242 - anchor containing a self deploying mooring...
122 thomas s. wiggin - 7963242 - anchor containing a self deploying mooring...Mello_Patent_Registry
 
121 john p. hogan - 7921024 - it service management technology enablement
121   john p. hogan - 7921024 - it service management technology enablement121   john p. hogan - 7921024 - it service management technology enablement
121 john p. hogan - 7921024 - it service management technology enablementMello_Patent_Registry
 
120 peter j. mello - 7914604 - air conditioning system with modular electri...
120   peter j. mello - 7914604 - air conditioning system with modular electri...120   peter j. mello - 7914604 - air conditioning system with modular electri...
120 peter j. mello - 7914604 - air conditioning system with modular electri...Mello_Patent_Registry
 
119 phillip d. zamore - 7893036 - in vivo production of small interfering r...
119   phillip d. zamore - 7893036 - in vivo production of small interfering r...119   phillip d. zamore - 7893036 - in vivo production of small interfering r...
119 phillip d. zamore - 7893036 - in vivo production of small interfering r...Mello_Patent_Registry
 
117 mark s. thompson - 7883634 - elevator load bearing member having a jack...
117   mark s. thompson - 7883634 - elevator load bearing member having a jack...117   mark s. thompson - 7883634 - elevator load bearing member having a jack...
117 mark s. thompson - 7883634 - elevator load bearing member having a jack...Mello_Patent_Registry
 
116 paulo mello - 7806665 - auxiliary braking device for wellhead having pr...
116   paulo mello - 7806665 - auxiliary braking device for wellhead having pr...116   paulo mello - 7806665 - auxiliary braking device for wellhead having pr...
116 paulo mello - 7806665 - auxiliary braking device for wellhead having pr...Mello_Patent_Registry
 
113 phillip d. zamore - 7691995 - in vivo production of small interfering r...
113   phillip d. zamore - 7691995 - in vivo production of small interfering r...113   phillip d. zamore - 7691995 - in vivo production of small interfering r...
113 phillip d. zamore - 7691995 - in vivo production of small interfering r...Mello_Patent_Registry
 
112 andrew fire - 7622633 - genetic inhibition by double-stranded rna
112   andrew fire - 7622633 - genetic inhibition by double-stranded rna112   andrew fire - 7622633 - genetic inhibition by double-stranded rna
112 andrew fire - 7622633 - genetic inhibition by double-stranded rnaMello_Patent_Registry
 
111 peter j. mello - 7608135 - air conditioning system with modular electri...
111   peter j. mello - 7608135 - air conditioning system with modular electri...111   peter j. mello - 7608135 - air conditioning system with modular electri...
111 peter j. mello - 7608135 - air conditioning system with modular electri...Mello_Patent_Registry
 
110 andrew fire - 7560438 - genetic inhibition by double-stranded rna
110   andrew fire - 7560438 - genetic inhibition by double-stranded rna110   andrew fire - 7560438 - genetic inhibition by double-stranded rna
110 andrew fire - 7560438 - genetic inhibition by double-stranded rnaMello_Patent_Registry
 

Más de Mello_Patent_Registry (20)

134 mark s. thompson - 8449349 - elevator load bearing member having a jack...
134   mark s. thompson - 8449349 - elevator load bearing member having a jack...134   mark s. thompson - 8449349 - elevator load bearing member having a jack...
134 mark s. thompson - 8449349 - elevator load bearing member having a jack...
 
133 stephanie mello - 8439759 - system and method of facilitating external ...
133   stephanie mello - 8439759 - system and method of facilitating external ...133   stephanie mello - 8439759 - system and method of facilitating external ...
133 stephanie mello - 8439759 - system and method of facilitating external ...
 
132 qian wang - 8415131 - m13 bacteriophage as a chemoaddressable nanoparti...
132   qian wang - 8415131 - m13 bacteriophage as a chemoaddressable nanoparti...132   qian wang - 8415131 - m13 bacteriophage as a chemoaddressable nanoparti...
132 qian wang - 8415131 - m13 bacteriophage as a chemoaddressable nanoparti...
 
130 michael m. iwatake - 8288828 - via contact structure having dual silici...
130   michael m. iwatake - 8288828 - via contact structure having dual silici...130   michael m. iwatake - 8288828 - via contact structure having dual silici...
130 michael m. iwatake - 8288828 - via contact structure having dual silici...
 
129 andrew z. fire - 8283329 - genetic inhibition of double-stranded rna
129   andrew z. fire - 8283329 - genetic inhibition of double-stranded rna129   andrew z. fire - 8283329 - genetic inhibition of double-stranded rna
129 andrew z. fire - 8283329 - genetic inhibition of double-stranded rna
 
128 phillip d. zamore - 8232260 - in vivo production of small interfering r...
128   phillip d. zamore - 8232260 - in vivo production of small interfering r...128   phillip d. zamore - 8232260 - in vivo production of small interfering r...
128 phillip d. zamore - 8232260 - in vivo production of small interfering r...
 
127 dennis cherok - 8182545 - implantable prosthesis
127   dennis cherok - 8182545 - implantable prosthesis127   dennis cherok - 8182545 - implantable prosthesis
127 dennis cherok - 8182545 - implantable prosthesis
 
126 daniel j. nelson - 8180712 - methods and apparatus for determining whet...
126   daniel j. nelson - 8180712 - methods and apparatus for determining whet...126   daniel j. nelson - 8180712 - methods and apparatus for determining whet...
126 daniel j. nelson - 8180712 - methods and apparatus for determining whet...
 
125 robert f. bigelow, jr. - 8100754 - gaming system having multi-player wh...
125   robert f. bigelow, jr. - 8100754 - gaming system having multi-player wh...125   robert f. bigelow, jr. - 8100754 - gaming system having multi-player wh...
125 robert f. bigelow, jr. - 8100754 - gaming system having multi-player wh...
 
124 michael mello - 7990543 - surface characterization based on optical pha...
124   michael mello - 7990543 - surface characterization based on optical pha...124   michael mello - 7990543 - surface characterization based on optical pha...
124 michael mello - 7990543 - surface characterization based on optical pha...
 
122 thomas s. wiggin - 7963242 - anchor containing a self deploying mooring...
122   thomas s. wiggin - 7963242 - anchor containing a self deploying mooring...122   thomas s. wiggin - 7963242 - anchor containing a self deploying mooring...
122 thomas s. wiggin - 7963242 - anchor containing a self deploying mooring...
 
121 john p. hogan - 7921024 - it service management technology enablement
121   john p. hogan - 7921024 - it service management technology enablement121   john p. hogan - 7921024 - it service management technology enablement
121 john p. hogan - 7921024 - it service management technology enablement
 
120 peter j. mello - 7914604 - air conditioning system with modular electri...
120   peter j. mello - 7914604 - air conditioning system with modular electri...120   peter j. mello - 7914604 - air conditioning system with modular electri...
120 peter j. mello - 7914604 - air conditioning system with modular electri...
 
119 phillip d. zamore - 7893036 - in vivo production of small interfering r...
119   phillip d. zamore - 7893036 - in vivo production of small interfering r...119   phillip d. zamore - 7893036 - in vivo production of small interfering r...
119 phillip d. zamore - 7893036 - in vivo production of small interfering r...
 
117 mark s. thompson - 7883634 - elevator load bearing member having a jack...
117   mark s. thompson - 7883634 - elevator load bearing member having a jack...117   mark s. thompson - 7883634 - elevator load bearing member having a jack...
117 mark s. thompson - 7883634 - elevator load bearing member having a jack...
 
116 paulo mello - 7806665 - auxiliary braking device for wellhead having pr...
116   paulo mello - 7806665 - auxiliary braking device for wellhead having pr...116   paulo mello - 7806665 - auxiliary braking device for wellhead having pr...
116 paulo mello - 7806665 - auxiliary braking device for wellhead having pr...
 
113 phillip d. zamore - 7691995 - in vivo production of small interfering r...
113   phillip d. zamore - 7691995 - in vivo production of small interfering r...113   phillip d. zamore - 7691995 - in vivo production of small interfering r...
113 phillip d. zamore - 7691995 - in vivo production of small interfering r...
 
112 andrew fire - 7622633 - genetic inhibition by double-stranded rna
112   andrew fire - 7622633 - genetic inhibition by double-stranded rna112   andrew fire - 7622633 - genetic inhibition by double-stranded rna
112 andrew fire - 7622633 - genetic inhibition by double-stranded rna
 
111 peter j. mello - 7608135 - air conditioning system with modular electri...
111   peter j. mello - 7608135 - air conditioning system with modular electri...111   peter j. mello - 7608135 - air conditioning system with modular electri...
111 peter j. mello - 7608135 - air conditioning system with modular electri...
 
110 andrew fire - 7560438 - genetic inhibition by double-stranded rna
110   andrew fire - 7560438 - genetic inhibition by double-stranded rna110   andrew fire - 7560438 - genetic inhibition by double-stranded rna
110 andrew fire - 7560438 - genetic inhibition by double-stranded rna
 

Último

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Último (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

115 steven m. mello - 7766223 - method and system for mobile services

  • 1. c12) United States Patent Mello et al. (54) METHOD AND SYSTEM FOR MOBILE SERVICES (76) Inventors: Steven M. Mello, 43 Briar Rd., Bedford, NH (US) 03110; Arlen J. Van Draanen, 13260 SE. 18th St., Bellevue, WA (US) 98005; John A. Dion, 23 Bolic St., Nashua, NH (US) 03062 ( *) Notice: Subject to any disclaimer, the term ofthis patent is extended or adjusted under 35 U.S.C. 154(b) by 18 days. (21) Appl. No.: 12/263,865 (22) Filed: Nov. 3, 2008 Related U.S. Application Data (60) Provisional application No. 60/986,559, filed on Nov. 8, 2007. (51) Int. Cl. G06K 5100 (2006.01) G07F 19100 (2006.01) (52) U.S. Cl. ....................................... 235/379; 235/380 (58) Field of Classification Search ................. 235/379, (56) 235/380, 382, 383, 492, 493; 713/166, 182; 705/67,44 See application file for complete search history. References Cited U.S. PATENT DOCUMENTS 6,741,851 B1 * 7,168,091 B2 7,245,902 B2 7,249,092 B2 7,323,967 B2 * 5/2004 Lee et al..................... 455/410 112007 Schutzer 7/2007 Hawkes 7/2007 Dunn et al. 112008 Booth eta!. ............... 340/5.73 111111 1111111111111111111111111111111111111111111111111111111111111 US007766223Bl (10) Patent No.: US 7,766,223 Bl Aug. 3, 2010(45) Date of Patent: 7,380,121 B2 * 7,392,944 B2 * 2002/0095389 A1 * 2004/0039694 A1 2004/0049684 A1 * 2004/0104265 A1 * 2005/0038744 A1 2007/0053518 A1 2007/0100745 A1 2007/0155366 A1 2007/0203827 A1 2007/0203836 A1 * cited by examiner 5/2008 Nomura et al.............. 713/166 7/2008 Shieh ...................... 235/382.5 7/2002 Gaines ........................ 705/67 2/2004 Dunn eta!. 3/2004 Nomura et al.............. 713/182 6/2004 Okada eta!. ................ 235/380 2/2005 Viijoen 3/2007 Tompkins et a!. 5/2007 Keiser et al. 7/2007 Manohar et al. 8/2007 Simpson et a!. 8/2007 Dodin Primary Examiner-Thien M Le (74) Attorney, Agent, or Firm-McLane, Graf, Raulerson & Middleton, Professional Association; Scott C. Rand (57) ABSTRACT A method for providing mobile services, such as mobile financial services, includes providing a wireless handset or other device as an adjunct access device for a user account. The device is assigned a unique identification number, suchas an MDN, MElD, or both. The unique identification number is associated with the account and in an exemplary embodi- ment, comprises at least a portion of the account number(s) withthe service provider. Transactions are conductedwiththe handset access device and enhanced multi-factor and biomet- ric security authentication may be provided. Handset voice, data, or other usage is settled and billed within the financial account. The service provider is able to download software, advertising, or content applications to the adjunct device and maintains the capability to disable the device. In a further aspect, a system for the execution of mobile transactions is provided. 20 Claims, 9 Drawing Sheets 101 '--B-A-N""''K-IN_G__..r-102 103 104 105 106
  • 2. U.S. Patent Aug. 3, 2010 Sheet 1 of9 US 7,766,223 Bl ON-BOARDING ~ 101 BANKING ~- 102 TRANSACTION lNG i.--""'- 103 AUTHENTICATION '""' 104 r SETTLEMENT ~- 105 OWNERSHIP RIGHTS ...... - 106 FIG.1
  • 3. I (202 SIGNUP IN-PERSON (203 BANK ~205 I I ·I SIGNUP OVER- THE-PHONE 201-------, 1 VI - 1'-' coa PERSON CALLS VOICE BIOMETRIC SERVICE TO RECORD VOICEPRINT (204 _I _l r .______ _+-~ SIGNUP ovER-1 I THE-INTERNET 207 CREATE ACCOUNT GIVE CLIENT "NEW ASSOCIATED WITH ACCOUNT PACKAGE" MOBILE PHONE FIG.2 ~ 00 • ~ ~ ~ ~ =~ ~ ~ (.H ~ N 0 ....0 rFJ =-('D ('D ..... N 0 ..... 0 d rJl -....l ~ 0'1 0'1 'N N w =""""'
  • 4. [302 ONLINE ' [303 I ATM/POS 301 ,ru I T 305 MOBILE v -==t [304 CHECKS t- 307 FUNDS TRANSFER & BILL PAY FIG.3 BANK 312 USER'S BANK ~BANK llllllll---:309 I 1308 TRANSACTIONAL I 1.. CLEARING EXTERNAL BANK ~ [310 DIRECT I I DEPOSIT I _l__c311 ACH ~ 00 • ~ ~ ~ ~ =~ ~ ~ (.H ~ N 0 ....0 rFJ =-("D ("D ..... (.H 0 ..... 0 d rJl -....l ~ 0'1 0'1 'N N w ='"'"""
  • 5. 305 TWO-WAY VOICE CHANNEL 421-----..... TWO-WAY MESSAGING CHANNEL 303 1ST FACTOR: NEAR FIELD POS/ATM t - - - - - - - - - - - - ' MDNAND/OR PHONE ID (IMEI, MElD ETC) 406 ···419 407 YES NO --~ TO 415 MESSAGING CENTER BANK 309 403 FIG. 4B ., I II II I i' 409 2ND FACTOR: PIN OR CARD ID .........................: ··----417 TO/FROM 404 FIG. 4B 'T0413 FIG.4B TO 411 FROM 415 FROM 416 FIG. 4B FIG. 4B FIG. 4B FIG.4A ~ 00 • ~ ~ ~ ~ =~ ~ ~ (.H ~ N 0 ....0 rFJ =-('D ('D ..... .j;o. 0 ..... 0 d rJl -....l ~ 0'1 0'1 'N N w =""""'
  • 6. 421 TO/FROM 305 FIG.4A TWO-WAY VOICE CHANNEL 404 FROM 408 FIG.4A i I 1---.: ·-----417 : l I ! YES Il_ ____________ _ SERVICE CALL FOR H 3RD FACTOR: VOICEPRINT OR ID BIOMETRIC OR VERIFICATION VOICE CALL NO NO FROM 407, 408,410 FIG.4A I FIG.4B FROM 309 TO 403 T0403 FIG.4A FIG. 4A FIG. 4A .J.............L.... ' ' 415 416 TRANSACTION TRANSACTION DENIED APPROVED ~---c418MESSAGE MESSAGE ~ 00 • ~ ~ ~ ~ =~ >=~ (.H ~ N 0 ....0 rFJ =-('D ('D ..... Ul 0 ..... 0 d rJl -....l ~ 0'1 0'1 'N N w =""""'
  • 7. U.S. Patent Aug. 3, 2010 Sheet 6 of9 US 7,766,223 Bl USER IDENTIFICATION SYSTEM PHONE IDENTIFICATION 502 -305 [::::::: f"'--,:: :;:::::: :::.--- 0 ......... -PHONE IDENTIFICATION DATABASE AUTHENTICATION DATABASE PASSWORD I PIN 503) ~ -305 t:::: ~ l'S1 ["-...:: ::::::.-- 0 l!l: ,...J ..._ I 504 BIOMETRIC /508MICROPHONE Q505 IDENTITY SCORING DATABASE TELEPHONE h -~m aoooo BASELINE f:::::: ::::::::00000 ::::;:....-- ODIJOO VOICEPRINT lb ~ OF KEYWORD ._506 J 509 MOBILE PHONE ~305 FIG.5
  • 8. 601 VOICE CALL FOR BIOMETRIC AUTHENTICATION YES REJECT TRANSACTION 607 NO NO 606 NO FIG.6 604 603 SPOKEN KEYWORD VALIDATION AGAINST BIOMETRIC DATABASE WITH ACCOUNT (MDN/ MElD) AS UNIQUE KEY 605 ACCEPT TRANSACTION ~ 00 • ~ ~ ~ ~ =~ ~ ~ (.H ~ N 0 ....0 rFJ =-('D ('D ..... -....l 0 ..... 0 d rJl -....l ~ 0'1 0'1 'N N w =""""'
  • 9. 201 IN-NETWORK OUT-OF-NETWORK 710 CHECKS 703 305 ATM/POS DEBIT Ah : MOBILE PAYMENT (NFC, RFID, ETC.) 704 705 EFT- OUT OF MESSAGING SERVICE (SMS, NETWORK, IP, WAP, ETC.) I : ~I NETWORK ELECTRONIC 706 XML TRANSACTION SERVICES FIG. 7 FUNDS TRANSFERS 709 ACCOUNT SETTLEMENT: PHONE & FINANCIAL ACCOUNTS ~ 00 • ~ ~ ~ ~ =~ ~ ~ (.H ~ N 0 ....0 rFJ =-('D ('D ..... QO 0 ..... 0 d rJl -....l ~ 0'1 0'1 'N N w =""""'
  • 10. U.S. Patent BANK l r2o5 /$"'- Aug. 3, 2010 Sheet 9 of9 ,802 MOBILE PHONE GIVEN AS ADJUNCT DEVICE TO A FINANCIAL ACCOUNT /804 RIGHT TO DISABLE SERVICE ,805 US 7,766,223 Bl RIGHT TO DOWNLOAD 1-----.-----,-----' TO PHONE ,806 RIGHT TO ADVERTISE /807 RIGHT TO LOAD CONTENT /808 RIGHT TO REPOSSESS ,809 .-----------'---.. '---------~- RIGHTTO OFFSET FIG.8
  • 11. US 7,766,223 Bl 1 METHOD AND SYSTEM FOR MOBILE SERVICES CROSS REFERENCE TO RELATED APPLICATION This application claims the benefit of priority under 35 U.S.C. §119(e) based on U.S. provisional application No. 60/986,559 filed Nov. 8, 2007. The aforementioned provi- sional application is incorporated herein by reference in its entirety. BACKGROUND The present disclosure relates generally to a method and system for facilitating wireless transactions using a wireless device and, more particularly, a method and system that inte- grates a wireless adjunct device into a high security environ- ment for simultaneous management and manipulation of a single wireless device and one or more user accounts via a unique identification number of the wireless adjunct device, such as the MDN and/or MSISDN. 2 Another drawback in the current art beside the need to develop cross-carrier, cross-device, cross-platform transac- tional software is the need for carrier approval, both prior and ongoing, to place executable software on handsets that access their respective networks. Such permission is obtained, often at great cost, at the pleasure ofthe carrier. Another drawback of known systems, beyond carrier assent and cross-development, is the need to conveniently distribute such software to account holders in versions appro- 10 priate for their particular handset, and to train consumers in how to download and operate the software. Furthermore, transactional and data security pass through many hands in the current state of the art. Once operable on the handset, the software, in order to execute financial trans- 15 actions, must often pass instructions through a software development firm's servers, through other service provider servers for management and storage and transmission, and others, in order for the national bank to settle financial trans- actions. See Viijoen, U.S. Patent Publication No. US2005/ 20 0038744. The system and method disclosed herein find particular application in conjunction with banking or other financial transactions conducted with a financial institution and will be 25 Other attempted prior art wireless mobile financial trans- action solutions involve the use of SMS messages. One advantage of using SMS for delivering financial transaction capability is that it successfully interacts with all wireless devices and requires no handset-based executable software or carrier assent to utilize. However, SMS messages cost money described primarily with particular reference thereto. How- ever, it is to be appreciated that the system and method herein are amenable to all manner of financial and non-financial transactions between a customer and a service provider using a wireless device, including, without limitation, transactions in the fields of banking, finance, health care, multimedia entertainment, and so forth. Economic activity increases as advances in banking and payment systems are developed. Ubiquitous wireless devices (including telephones) demonstrate potential for a new para- digm inbanking and payments. Both consumers and financial institutions desire secure, cost reducing, convenience enhanc- ing wireless mobile banking and payment systems. Currently, most mobile financial service processes involve complex executable software that must be designed for all equipment on all platforms. Other available transactions schemes pass sensitive data amongst multiple parties that may or may not exhibit due care. Convenience suffers with design requirements for multiple accounts across multiple platforms. Also, would-be service providers, and financial institutions, currently design systems and processes for mul- tiple devices across multiple communications platforms. Typically, to deliver mobile financial services, a financial institution, such as a national bank, develops proprietary soft- ware to conduct financial transactions on wireless mobile telephones. Since consumers own myriad handset models produced by many manufacturers and registered with mul- tiple carriers potentially operating on multiple wireless or cellular technologies (e.g., GSM, CDMA, TDMA, WiMax, WiFi, etc.), banks must develop such software so that it con- veniently downloads and operates within hundreds ofdiffer- ent problem sets. Further, the bank must develop such soft- ware so that it executes properly in several development environments (e.g., Java, Brew, J2ME, OFX, and others) and across several different telephone carriers (e.g., AT&T, Sprint, and so forth). See Tompkins eta!., U.S. Patent Publi- cation No. US2007/0053518. This remains the case whether designing a financial product specifically involving, but not limited to, banking, payments, insurance, wagering, foreign remittance, brokerage, health care, health care savings, pay- roll or other type or style of account. to send and receive, are susceptible to electronic "listening," suffer from latency time-out issues, lack confirmation of delivery to an intended recipient, as well as identity verifica- 30 tion problems where the receiver or senderis never 100% sure ofthe other's identity. See Dodin, U.S. Patent Publication No. US2007/0203836. Another drawback to the use ofSMS mes- sages for mobile financial transaction is that SMS messages, containing potentially sensitive financial or account informa- 35 tion, are stored in the mobile radio terminal's memory. See Hawkes, U.S. Pat. No. 7,245,902. In another drawback to prior art systems, a bank or finan- cial institution, which is customarily in complete security control of all of its processes and regulatory obligations, 40 depends on multiple parties, that may or may not take due care, during the completion of a transaction. Consumers, deeming banks trustworthy, may have no understanding regarding the number of parties with access to their personal information, or who may be processing, handling, or storing 45 their personal information. Currently, it is inconvenient for consumers to understand their account balances in real time, and to know when over- drafts may occur, or when consumers may deem it advisable to overdraft their accounts. In the current state of the art, 50 banks and other financial institutions produce in-house evalu- ations and risk assessments regarding consumer balances and overdraft scores. See Simpson eta!., U.S. Patent Publication No. US2007/0203827; Keiser eta!., U.S. Patent Publication No. US2007/0100745. Consumers may or may not know that 55 they are overdrafting in a situation and may or may not under- stand the fees to be incurred for doing so. Additionally in the current art, it is most difficult to manage multiple financial accounts, or more specifically, parent and subsidiary accounts between family members or those with 60 other relationships. See Dunn eta!., U.S. Pat. No. 7,249,092. Also in the current state of the art, transaction and data security can be premised on biometric authentication solu- tions, and more specifically, voice biometric authentications. Such biometric authentication is desirable at specific trans- 65 action or security thresholds, such as dollar amount, access to space, or access to records, e.g., medical or financial records. However, voice biometric authentication solutions available
  • 12. US 7,766,223 Bl 3 require mapping of ultra large datasets. See Manohar et a!., U.S. Patent Publication No. US2007/0155366. Such solu- tions require vast amounts of database storage, require more time to complete search and comparison functions, and are subject to false and fraudulent biometric authentications, spe- cifically, false positive voice biometric authentications from fraudulent recordings. See Schutzer, U.S. Pat. No. 7,168,091. Also in the current state ofthe art, consumer handsets used for wireless financial transactions or other transactions or for access to sensitive information such as health care informa- 10 tion, are set up for the consumer's preferences and tastes. Consumers and account holders also, may not keep their wireless accounts open, rendering their access to any execut- able software or SMS styled transactions schemes for which they may have registered, dubious. Consumers may also 15 abuse their financial accounts and/or their access to those accounts. 4 Yet another advantage of the presently disclosed system and method is that they allow for a more centralized, stream- lined, and secure process for executing mobile financial ser- vices. It would therefore be desirable to provide enhanced multi factor authentication and still further enhanced biomet- ric security to transactions where threshold values, data sen- sitivity, etc., may warrant it, without fear of recordings pro- ducing false positive authentications. Still another advantage of the present disclosure is that it provides the ability for consumer participation in the over- draft process, wherein the adjunct wireless device can be used to offer the account holder, whether by voice or SMS, an option to authenticate and authorize or to deny an overdraft- ing circumstance in real time. Another advantage ofthe present disclosure is found in that parent accounts may be associated with a primary adjunct access device and MDN and one or more subsidiary accounts associated with one or more additional adjunct access devices, thus enabling, in conjunction with internet online Accordingly, the present disclosure provides a new and improved method and system for facilitating wireless trans- actions using a wireless device that overcome the above- referenced problems and others. 20 banking pre-set preferences, a method ofissuing peer-to-peer payments amongst and between the parent account and the subsidiary account(s). SUMMARY Yet another advantage of the present disclosure resides in its ability to utilize voice biometric data sets that are easily 25 and swiftly analyzed to quickly authenticate, approve, and consunmwte financial transactions. In one aspect, a method for facilitating wireless transaction bank, financial institution, or other service provider includes providing a wireless mobile device, such as a telephone, satellite telephone, personal digital assistant (PDA), portable computer, or the like, to an account holder and simulta- neously issuing the account holder a unique identification number of the type enabling the wireless device access to a wireless network, such as a mobile directory number (MDN) and/or a mobile equipment identification number (MElD). The account holder may then use the device to conduct trans- actions. Multi-factor user authentication is used to verifY the 35 identity of the user as the account holder and, optionally, further enhanced biometric security may be provided. The account holder may also employ the wireless device for voice Still another advantage ofthe present disclosure is found in that financial institutions seeking to transact wirelessly with account holders in profitable mauner are able to import or 30 download software or applications or content or accessories to the wireless adjunct device to maximize it for use with the financial institutions programs and procedures orfor the insti- tution to disable the device in the case of misuse or in other circumstance. or data transmissions and communications, as the case may be. In certain embodiments, the financial institution or other 40 service provider may input software applications to the device, download software applications to the device remotely via the wireless communicationnetwork, or disable the device remotely via the wireless communicationnetwork. In a further aspect, a system for providing mobile financial 45 services is provided. One advantage of the mobile transactions system and method in accordance with the present disclosure resides in the ability to reduce cost, reduce design requirements, 50 increase security, and enhance convenience over existing mobile transaction systems. Still further advantages and benefits of the present inven- tion will become apparent to those ofordinary skill in the art upon reading and understanding the following detailed description of the preferred embodiments. BRIEF DESCRIPTION OF THE DRAWINGS The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate embodi- ments ofthe invention and together with the description ofthe invention herein, serve to explain the principles ofthe inven- tion. FIG. 1 presents a block diagram overview of the present disclosure and core elements ofthe system and methodology. FIG. 2 presents a flowchart diagram illustrating the details ofthe on-boarding process ofanew financial services account including issuing an adjunct wireless telephone device according to an exemplary embodiment ofthe present inven- tion and including issuing an MDN or MSISDN and MElD to said device and obtaining a key phrase biometric voice print Another advantage of the system and method in accor- dance with the present disclosure is that they are carrier independent. 55 unique to the account holder. Another advantage of the presently disclosed system and method resides in the fact that they limit the software plat- forms and hardware equipments necessary to design software for, or, in certain embodiments, eliminate the need for execut- able software entirely. Still another advantage of the presently disclosed system and method is found in that at least some ofthe shortcomings associated with SMS financial transaction methods are alle- viated by the present disclosure, since no sensitive data is left in the memory of wireless device and user identity may be confirmed through the use ofa biometric authentication such as voice biometric authentication. FIG. 3 presents a transaction wheel diagram illustrating the increased financial account functionality provided by the adjunct wireless radio telephone device and MDN numbering system and interactive voice response system according to the 60 preferred embodiment ofthe present invention. FIGS. 4A and 4B present a flowchart diagram depicting an exemplary embodiment of the present invention and layered multi-factor authentication system, where 'pin' based, or temporary 'pin' based multi-factor authentication is utilized 65 for certain financial transactions requiring enhanced security. FIG. 5 presents a diagram indicating the details of an exemplary embodiment of the process where all three core
  • 13. US 7,766,223 Bl 5 authentication mechanisms, utilizing the MDN or MElD, a password and voice biometric are depicted. FIG. 6 presents a diagram that depicts an exemplary embodiment ofthe process whereinthe authentication system has a one-to-one mapping at the biometric level. FIG. 7 is a flowchart diagram depicting the continuous settlement of a financial account or accounts and re-settle- ment ofsaid account with voice and data usage input from the wireless device within and into the financial account within the bank's 'core' system. FIG. 8 presents a block diagram ofa preferred embodiment 6 the bank or financial institution 205 via a number ofmethods. For example, the account holder 201 may visit the institution via a physical branch 202, may sign up over the phone via a call center 203, or may sign up online via an Internet interface 204. At step 206, the bank 205 creates a user account and asso- ciates an adjunct wireless device 305 (see FIG. 3) with the account. The wireless adjunct device 305 may be, without limitation, a wireless mobile radio, cellular telephone, a per- 10 sonal digital assistant, a portable computer, orotherhand held or portable computer based information handling system. ofthe present invention where the financial services provider may manipulate the adjunct wireless device, including dis- abling said device or importing or otherwise downloading software or applications or other content or multi-media con- 15 tent to the adjunct wireless device. The bank 205 assigns to the account holder a unique iden- tification number for the wireless access device 305, the unique identification number being ofthe type which enables the device 305 to access a wireless communications network for voice and data usage, access to the financial institution, DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS While not to be construed as limiting the scope of the present invention unless specifically indicated, for purposes ofthis specification, the terms used herein have the following definitions unless indicated otherwise. "MDN" means Mobile Directory Number and represents the unique 10-digit telephone number assigned to a particular mobile handset account. MDN may also include other num- bering systems or terminologies including specifically but not limited to Mobile Station Integrated Services Digital Net- work (MSISDN) number. "MElD" means Mobile Equipment Identifier and means a globally unique number for a handset device and includes other terms specifically but not limited to ESN (electronic serial number), pESN (pseudo ESN) and tESN (true ESN) as well as IMEI, UIMID and others. "SMS" means short message service, also known as text messaging. SMS includes other terms specifically but not limited to 'skymail' or 'short mail' and email variants such as Blackberry messages including multi-part SMS. "MMS" means multi-media messages. "IP" means internet protocol. "WAP" means wireless application protocol. "HTML" means Hyper-Text Mark-Up Language. "WBMP" means wireless bitmap format. With reference now to FIG. 1, there is shown a block diagram depicting a system overview of the functional com- ponents or modules in accordance with a preferred embodi- ment of the present disclosure. The system includes an on- boarding module 101 for on-boarding a financial account at a financial institution 205 (see FIG. 2), which may include recording and storing a keyword or key phrase associated with the account holder for biometric identification verifica- tion purposes. An online banking module 102 is provided for opening an online banking account. A transactioning module 103 is provided for conducting transactions with the account, including mobile transactions performed with a wireless device 305 (see FIG. 3). An authentication module 104 is provided for authenticating transactions and a settlement module 105 is provided for settling the financial account transactions. An ownership rights module 106 is provided to allow the financial institution to download software, adver- tising, or other content to the wireless adjunct device 305 and/or disabling the wireless device 305, as the case may require. and access to credit card, debit card, ATM, and other payment or transaction networks. The unique identification number may be, for example, the MDN, MSISDN, and/or MElD of 20 the adjunct device. The bank also assigns an account number to the new account opened at step 206 and creates an association between the account number and the unique identification number ofthe adjunct device 305, e.g., in a phone identifica- 25 tion database 502 (see FIG. 5). In a preferredembodiment, the numbering system of the account is such that the account number corresponds to the unique identification number of the wireless adjunct device, and more preferably, to the MDN or MSISDN. If required, the account number may contain 30 additional digits beyond those contained in the unique iden- tification number. At step 207, the wireless adjunct device is given to the account holder as an access device similar to an ATM card or checkbook. In a preferred embodiment, the adjunct device 35 may be included as a part of an onboarding package, which may additionally include, for example, starter checks, an ATM card, debit/credit card, or credit card, and/or other equipment suitable for the type offinancial institution and/or 40 type of account opened. At step 208, the client activates the wireless adjunct device, e.g., via activation instructions providedby the financial insti- tution at the opening of a financial or other type of account. The user also records and transmits a biometric key phrase voice print to be storedfor future transaction using the adjunct 45 device simultaneous with the activation ofthe adjunct device 305. The device 305 will generally be equipped with a micro- phone for the input of an acoustic signal and which may be integral to the device 305 or separately attachable, e.g., as a part ofa head set, or the like. As used herein, the term "micro- 50 phone" refers to any acousto-electric transducer capable of converting acoustic signals into electrical signals. The account holder is also provided with an online internet bank- ing interface in order to set up SMS, WAP or IP 'pre-sets' to enable financial transaction capability with the adjunct wire- 55 less communication device 305. Other types of biometric data, such as fingerprint data, retinal scan data, or facial recognition data, and so forth, are also contemplated. In certain embodiments, multiple wireless adjunct devices 305 may be provided along with multiple associated MDN's 60 or MSISDN's or the like to parent and subsidiary accounts in order to use each device to conduct transactions in the cus- tomary mode ofthe present disclosure, or, in conjunction with each other in peer-to-peer mode consistent with information pre-set on the associated online banking accounts. Referring now to FIG. 2, an exemplary method ofonboard- 65 ing an account at the financial institution 205 is illustrated. An account holder 201 may register for a financial account with Referring now to FIG. 3, there is illustrated an exemplary banking method and system. After initial set up and authen- tication of the online banking account, as identified by its
  • 14. US 7,766,223 Bl 7 8 messaging center at step 403 via the channel420. At step 406, the messaging center 403 authenticates the transaction using the first authentication factor by comparing against themes- sage header MDN and MElD ofthe access device 305. Ifthe MDN is not associated with an account at the finan- cial institution, the process proceeds to step 416 and a trans- action denied message is transmitted to the user via the mes- saging center 403. Ifthe MDN matches an MDN associated with an account at the bank 309 at step 407, the process proceeds to step 408 where it is determinedwhetherthe phone ID (MElD) matches the MElD associated with the account. If the MElD does not match the MElD associated with the associated unique identification number such as MDN and MElD, to conduct transactions via SMS, WAP, IP, or other transmittal of banking or financial transactions, an account holder 301 may then execute standard financial transactions via a number of methods, such as using an online banking system 302, a contactless transaction terminal 303, e.g., via Bluetooth Technology, Radio Frequency Identification (RFID), or near-field communication technology (NFC), for access to the credit card, debit card, ATM, and point-of-sale (POS) networks. When the wireless adjunct device 305 is 10 employed with contactless technology 303, it may preferably operate in one or more of simple contactless card emulation mode, interactive reader mode, or peer-to-peer (P2P) mode. Transactions may also be conducted using standard paper checks 304 with an ABA number in addition to the MDN- associated account number, using the wireless adjunct device 305, via an interactive voice response (IVR) system 306 (or via a live call center), a funds transfer and online bill pay system 307, Automated Clearing House (ACH) payments 311, and direct deposit 310. All transactions are settled with 20 the clearing system via the banks 'core' 308 and incoming deposits 309. account, the process proceeds to step 416 and a transaction 15 denied message is transmitted to the user via the messaging center 403. If the MElD matches the MElD associated with FIGS. 4A and 4B are a flow diagram illustrating an exem- plary method of performing a mobile transaction using the wireless access device 305. Transactions preferences may be 25 set on online banking to trigger necessary layered authenti- cation mechanisms from single factor to multi factor. The wireless adjunct device 305 may be used at a near field point- of-sale terminal or ATM terminal 303 employing NFC tech- nology, and the device itself constitutes a first factor of 30 authentication, since the wireless adjunct device itselfrepre- sents "something the account holder has." Thus, the process may bypass the first authentication factor 406 and may also, optionally, bypass the second authentication factor 409. These alternative pathways represented by the broken lines 35 419. Preferably, the desired level of authentication may be selectable as pre-stored transaction preferences, which may be input by the user and/or the bank or other system operator. When the second authentication factor, which represents "something the account holder knows," such as a pin number 40 or password, and which may be a temporary pin or password, is required, the process proceeds to step 409.At step 410, it is determined whether the second authentication factor passed, whether the correct PIN or password was input. Ifthe second authentication factor fails as step 410, the process proceeds to 45 step 416 and a message that the transaction has been denied is sent to the adjunct device via a message center 403. For most transactions, the second authentication factor 409 is a suffi- cient level of authentication. Biometric authentication can provide a third level of authentication, i.e., "something the 50 account holder is," in several embodiments. For near field point of sale or ATM transactions 303 using the mobile adjunct device 305, wherein the second authenti- cation factor 409 is bypassed, the process proceeds from step 303 directly to the third authentication factor 413 and proceed 55 as described below. Even where the authentication factors 406 and 409 are bypassed, an advanced two-factor authenti- cation scheme for near field POS orATM transactions 303 is provided, wherein the first factor is the adjunct device 305 itself, which is something the user has, and the second factor 60 being the user's biometric characteristic, i.e., the voiceprint. In addition to transactions 303 using near field communi- cations, the mobile device 305 may also provide various transaction possibilities in the form of SMS messages or networking via messaging channel 420, and voice with 65 DTMF (dual-tone multi-frequency) input via voice channel 421. Transaction instructions or data may be transmitted to a the account, at step 408, the process proceeds to step 409. Alternatively, the second authentication factor 409 may be bypassed and the process may proceed directly to the third authentication factor 413, as represented by the broken lines 417. Where the second authentication factor is required, a sec- ond authentication factor, such as a card ID or a PIN pass- word, is input at step 409. If the transaction is executed at a fixed location such as an ATM or POS terminal, the second authentication factor may be input via theATM or POS hard- ware. If the transaction is being performed from a remote location via messaging channel420, the pin or password may be input using a keypad, touch screen, or the like of the wireless device 305. In this manner, multi-factor authentica- tion offinancial or other transactions can be executed without providing any sensitive or personal information resident the memory of the adjunct device 305. If the second authentication factor fails at step 410, the process proceeds to step 416 and a transaction denied mes- sage is sent to the wireless device 305. Ifthe second authen- tication factor passes at step 410, the bank 309 is triggered to determine whether sufficient funds are available in the account for the transaction sought to be executed at step 411. If sufficient funds are not available at step 411, the process continues to step 415 and a transaction denied message is sent to the wireless device 305 via the messaging center 403. It is contemplated that the unique identification number, e.g., MDN, and wireless adjunct device to enable account holders to participate in the overdraft approval process via SMS or voice biometric authentication, in real time, to autho- rize and authenticate or to decline, as the case may be, pend- ing overdraft transactions. If sufficient funds are available to complete the requested transaction at step 411, the process proceeds to step 412 wherein it is determined whether the transaction amount exceeds some preselected or predetermined threshold value or other security threshold or criteria, such as a prespecified dollar value or sensitive nature of information or data being accessed. Ifthe transaction amount/security threshold is not reached at step 412, the process proceeds directly to step 416 and a transaction approved message is sent to the account holder via the messaging center 403. Ifthe transaction amount is above the threshold amount or other financial or security threshold is reached at step 412, the process continues to step 413 and a secure third, biometric authentication factor, suchas a voice biometric authentication or "voice print" is required to securely authenticate the trans- action. In the depicted preferred embodiment herein, the voice biometric data unit comprises a two factor voiceprint and keyword combination. Alternatively, the process may
  • 15. US 7,766,223 Bl 9 proceed directly step 413 where one or both of the first and second authentication factors 406, 409, were bypasses, i.e., via pathways 417 or 419. If the third, biometric authentication factor is required as step 413, the process continues to step 404 wherein a call is placed to the access device 305 and the user speaks the key- word or phrase. The input keyword or phrase is compared to the voice recording ofthe user stored in the database 509 (see FIG. 5). Ifthe spoken keyword or phrase does not match the 10 stored voiceprint of the account holder (e.g., comparing for both the correct words and the correct voice), the process continues to step 415 and a transaction denied message is sent to the wireless device 305 via the messaging center 403. Ifthe spoken keyword or phrase matches the stored voiceprint of 15 the account holder, the process proceeds to step 416 and a transaction approved message is sent to the wireless device 305 via the messaging center 403. 10 there is a match at step 604, the process continues to step 605 and the transaction is authenticated, authorized, and accepted. Ifthere is not a match at step 604, continues to step 606 and it is determined whether the biometric authorization has failed some predetermined number oftimes, e.g., three in the illustrated embodiment. If the predetermined number of failed authorization attempts (e.g., 3 failed attempts) has not been reached at step 606, the process returns to step 603, the user is asked to again input the spoken keyword phrase and the process continues as described above. If, at step 606, it is determined that a positive biometric validation has not been obtained within the preselected number ofattempts (e.g., 3), the process continues to step 607 and the transaction is rejected. FIG. 7 illustrates an exemplary method for settling a mobile transaction performed in accordance with the present invention. At step 704, the account holder 201 may conduct financial transactions with the adjunct device 305 inthe finan-For transactions in which the standard second authentica- tion factor 409 was bypassed as represented by the broken lines 417 or 419, and wherein the voiceprint was authenti- cated, the process proceeds to step 411, as represented by the broken line 418 to determine whether there are sufficient 20 cia! institution's network via any of various communication protocols such as SMS, other network functions, internet protocol (IP), wireless application protocol (WAP), or via any contactless or contact mechanism that allows access to pay- funds in the account to complete the transaction. Ifthere are sufficient funds, the transaction approved message 416 is 25 sent. If there are not sufficient funds, a transaction denied message 415 is sent. ments networks at step 706. Alternatively, the adjunct device may be used for voice and data communication at step 707. Such transactions may include peer-to-peer transfers or transfers to other in-network account holders (step 706) or out of network accounts (step 705). The account holder 201 may also conduct out-of-net-FIG. 5 illustrates an exemplary method for authenticating a mobile transaction performed using the wireless access device in accordance with the present disclosure. The account holder uses the wireless adjunct device 305 to attempt a transaction, balance inquiry, funds transfer or other transac- tion. The financial institution identifies the adjunct device via 30 work financial transactions via the conventional ATM or Point of Sale networks via debit cards (step 703), or via checks (step 710). Settlement is conducted on the financial account, or the primary financial account where several subsidiary accounts an MDN or MElD based database 502. The account holder inputs a password or a pin 503 once connected utilizing a key system and achieves a second factor ofauthentication from a password/PIN authentication database 504. In the event a pre-set transaction amount threshold is reached, or, if the financial institution deems a third authentication factor nec- essary, a call is placed to the hand set 305 requesting the account holder input his key phrase 508 and the key phrase input is mapped to a database 509 for authentication. Alter- native options for inputting the key phrase, such as a micro- phone 505, e.g., for recording the voice input at the institu- tions facility or land telephone 506. 35 are present, within the financial institution's core system, on a real time basis, for all financial transactions including those conducted utilizing the wireless adjunct device and further including settlement ofthe voice and data and othercontent or accessory aspects or charges associated with use of the 40 adjunct wireless device via an appropriate application pro- gramming interface (API) into the single, orprimary financial account within the financial institution's core system. The underlying, carrier-based cellular tracking system sends the adjunct device voice and data usage 707 and mobile 45 payment and account activity records 708 through to the financial institution via XML stream or other data feed 702 to FIG. 6 illustrates an exemplary biometric authentication method for authenticating a mobile transaction performed using the wireless access device in accordance with the present disclosure. At step 601, a call is placed from the 50 adjunct wireless device and at step 602, it is determined whether the device is identified via the MDN, MElD, or both. If the call is not from an account-associated MDN, the pro- cess proceeds to step 607 and the authentication is rejected. Ifit is determined at step 602 that the call is placed from an 55 appropriate MDN or MElD, the process continues to step 603, and the user is prompted e.g., via an on-screen prompt appearing on a display ofthe adjunct device 305, to speak the key word or key phrase into a microphone of the adjunct device. The spoken keyword or phrase thus input to the 60 adjunct device 305 with digital noise layered over the key phrase input recorded session. A digital representation ofthe spoken keyword or key phrase is transmitted to the biometric identity scoring site 509 (see FIG. 5) via the communications link 421 and at step 604 it is determined whether a match 65 exists between the spokenkeyword or phrase input in step 603 and the prerecorded voiceprint stored in the database 509. If the banks 'core' system 709, which are cleared using the bank's clearing system. FIG. 8 depicts an exemplary method ofdownloading soft- ware, advertising, or other content to the wireless access device 305 and/or disabling service for the wireless access device 305. The financial institution or bank 205 procures the wireless adjunct devices 305, such as wireless mobile radio telephone handsets or other suitable adjunct devices and at step 802 provides them to account holders for use as an adjunct access device in much the same manner as customary account equipments, such as debit cards. The bank, as pro- vider ofthe MDN and MElD ofthe device 305, maintains the right to disable the adjunct wireless device, e.g., for security or other reasons, via a disabler module of the owner's rights 106 (see FIG.1). Forexample, the bank may choose to disable the wireless adjunct device under certain conditions, such as when a predetermined number ofattempts to authenticate the user's identity have fail, orin cases ofapparent fraud orabuse. As deemed necessary for quality of service requirements, features, or cost offset, the bank now has a single platform for service enhancement and retains the right to import or down-
  • 16. US 7,766,223 Bl 11 load software or software updates to the phone 305 (step 805) from time to time, as a financial institution may deem neces- sary, e.g., to facilitate financial transactions or other types of transactions, to advertise upon the device 305 (step 806), the right to load content such as multi-media content to device 305 (step 807), the right to ask for return of the device 305 (step 808), and the right to offset, within the account holder's financial account, for loss, theft and abuse (step 809). The invention has been described with reference to the preferred embodiments. Modifications and alterations will 10 occur to others upon a reading and understanding of the preceding detailed description. It is intended that the inven- tion be construed as including all such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof. 15 Each reference cited herein is incorporated herein by ref- erence in its entirety. 12 3. The system of claim 1, wherein said unique identifica- tion number is selected from one or both of an MDN and an MElD. 4. The system ofclaim 3, wherein at least a portion of said account number includes one or both ofthe MDN and MElD. 5. The system ofclaim 1, wherein said first input device is an alpha, numeric, or alphanumeric keypad and said second input device is a microphone. 6. The system ofclaim 1, further comprising: an ownership rights module including one or more of: a software download module for downloading software to said wireless adjunct device; an advertising download module for downloading advertising content to said wireless adjunct device; and a disabler module for selec- tively disabling the wireless adjunct device. 7. The system ofclaim 1, wherein the user-account-based service is selected from the group consisting of a financial service and a banking service. Having thus described the preferred embodiments, the invention is now claimed to be: 1. A system for executing transactions in connection with a user-account-based service by a user having a user account, said system comprising: 8. A method for facilitating wireless transactions executed 20 in connection with a user-account-based service offered by a service provider, said method comprising: a wireless adjunct device for receiving and transmitting information relating to the service via a wireless com- 25 munication network, said wireless adjunct device hav- ing a nnique identification number of a type which enables said wireless adjunct device to access the wire- less communication network, said wireless adjunct device further having a first input device for inputting 30 alpha, numeric, or alphanumeric data for transmission over the wireless communicationnetwork when the user attempts to execute a transaction and a second input device for inputting user biometric data for transmission over the wireless communicationnetwork when the user 35 attempts to execute a transaction; a first level authentication database having stored therein said unique identification number, said nnique identifi- cation number being associated with the user account; a first level authentication processor for verifying that the unique identification number transmitted by said wire- less adjunct device matches said unique identification number stored in said first level authentication database 40 and associated with the user account; 45 a second level authentication database having stored therein an alpha, numeric, or alphanumeric password, said alpha, numeric, or alphanumeric password being associated with the user account; a second level authentication processor for verifying that 50 alpha, numeric, or alphanumeric data input by the user and transmitted by the wireless adjunct device matches said alpha, numeric, or alphanumeric password stored in said second level authentication database and associated with the user account; 55 a third level authentication database having stored therein a biometric data nnit, said biometric data unit being associated with the user account; a third level authentication processor for verifying that the user biometric data transmitted by the wireless adjunct 60 device matches said biometric data unit stored in said third level authentication database and associated with the user account. 2. The system of claim 1, wherein said wireless adjunct device is a cellulartelephone andthe wireless communication 65 network is selected from one or both of a cellular telephony network and a text messaging network. registering by a user by accepting registration information from a user and creating a creating a user account; assigning a unique identification number to a wireless adjunct device, said unique identification number being of a type which enables the wireless adjunct device to access a wireless communication network; providing the wireless adjunct device to the user for execut- ing transactions via the wireless communication net- work; storing said nnique identification number in a first level authentication database and associating the unique iden- tification number with the user account; storing an alpha, numeric, or alphanumeric password in a second level authentication database and associating the alpha, numeric, or alphanumeric password with the user account; and capturing a user biometric data nnit and storing said user biometric data nnit in a third level authentication data- base. 9. The method of claim 8, further comprising: establishing communications between said wireless adjunct device and said service provider; receiving transmission ofa transmitted identification num- ber from the wireless adjunct device; determining whether a match exists between the transmit- ted identification number and said unique identification number stored in said first level authentication database; and if a match exists between the transmitted identification number and said unique identification number stored in said first level authentication database, accepting trans- mission of at least one of an input alpha, numeric, or alphanumeric password and an input biometric data nnit. 10. The method ofclaim 9, further comprising: receiving transmission of an input alpha, numeric, or alphanumeric password; comparing the input alpha, numeric, oralphanumeric pass- word to said stored alpha, numeric, or alphanumeric password; and granting access to said user account if a match exists betweenthe input alpha, numeric, or alphanumeric pass- word and said stored alpha, numeric, or alphanumeric password. 11. The method ofclaim 9, further comprising: receiving transmission of an input biometric data unit;
  • 17. US 7,766,223 Bl 13 comparing the input biometric data unit to said stored user biometric data unit; and granting access to said user account if a match exists between the input biometric data unit and said stored user biometric data unit. 12. The method of claim 8, wherein said wireless adjunct device is a cellulartelephone andthe wireless communication network is selected from one or both of a cellular telephony network and a text messaging network. 13. The method of claim 8, wherein said unique identifi- 10 cation number is selected from one or both ofan MDN and an MElD. 14. The method of claim 13, wherein at least a portion of said account number includes one or both of the MDN and 15 MElD. 15. The method of claim 8, wherein said input alpha, numeric, or alphanumeric password is input via an alpha, numeric, or alphanumeric keypad or said adjunct device and said input biometric data unit is voice print data input via a 20 microphone of said adjunct device. 16. The method of claim 8, further comprising: establishing communications between said wireless adjunct device and said service provider; for each transaction sought to be executed, receiving trans- 25 mission of an identification number from the wireless adjunct device and determining whether a match exists between the transmitted identification number and said unique identification number stored in said first level authentication database; 30 if a match exists between the transmitted identification number and said unique identification number stored in said first level authentication database, accepting trans- mission of an input alpha, numeric, or alphanumeric password; 14 comparing said input alpha, numeric, or alphanumeric password to said stored alpha, numeric, or alphanumeric password; if a match exists between the input alpha, numeric, or alphanumeric password and said stored alpha, numeric, or alphanumeric password determining whether the transaction sought to be executed meets a preselected criterion; if the transaction does not meet said preselected criterion, granting access to said user account; and if the transaction meets said preselected criterion, accept- ing transmission of an input biometric data unit: comparing said input biometric data unit to said stored user biometric data unit; and granting access to said user account if a match exists between said input biometric data unit and said stored user biometric data unit. 17. The method ofclaim 16, further comprising: said user account is selected from the group consisting ofa financial account and a bank account and said prese- lected criterion is a dollar amount. 18. The method of claim 8, wherein the user account is selected from the group consisting ofa financial account and a bank account and said method further comprising: conducting settlement for financial transactions on said user account; and settling charges associated with the user's usage of the wireless adjunct device into said account. 19. The method ofclaim 8, further comprising: downloading one or both of software applications and advertising to said wireless adjunct device. 20. The method ofclaim 8, further comprising: disabling said wireless adjunct device when certain condi- tions are met. * * * * *