BIN 2020: Security 2

This lot is generally related to secure transactions.  Techniques are disclosed to verify a user to provide alternate payment services or provide secure ways to complete payment transactions at multiple vendors.  The disclosed system automatically obtains subscriber telephone number identification data, a reference data and billing telephone number data for validation of users.  Also disclosed are techniques to access another database to determine whether the user is billable and compare reference data to verify user identity.  Few techniques facilitate user identity verification by associating a phone bill by receiving a billing telephone number, user provided private data, determine user’s street address and multiple identification records to compare with private data.  Further, disclosed are techniques to securely verify user at telecom service provider to complete payment transactions at third party vendors.  The technology may be implemented in telecom networks, communication networks, ecommerce applications, financial services, etc.

How Can We Help?