Search

CA-3086953-C - METHOD AND SYSTEM FOR INITIATING A TRANSFER OF RESOURCES

CA3086953CCA 3086953 CCA3086953 CCA 3086953CCA-3086953-C

Abstract

A server comprises a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor-executable instructions which, when executed by the processor, configure the processor to authenticate a user via a first authentication channel; receive, via the communications module and from a computing device associated with the user, a signal representing a request to transfer a first quantity of resources; determine that the first quantity of resources is less than a first threshold associated with the first authentication channel; obtain identity data associated with the request to transfer the first quantity of resources; determine, based on the identity data, that a request to transfer a second quantity of resources has been previously initiated by the user via a second authentication channel that is different than the first authentication channel; and determine that the sum of the first quantity of resources and the second quantity of resources is less than the first threshold, and in response to determining that the sum of the first quantity of resources and the second quantity of resources is less than the first threshold, initiate the transfer of the first quantity of resources.

Inventors

  • Harjot Singh PANAG
  • Kevin Wayne FARAGHER
  • Sumathi SEETHARAMAN

Assignees

  • THE TORONTO-DOMINION BANK

Dates

Publication Date
20260505
Application Date
20200716

Claims (3)

  1. What is claimed is: 1. A server comprising: a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor-executable instructions which, when executed by the processor, configure the processor to: authenticate a user via a first authentication channel; receive, via the communications module and from a computing device associated with the user, a signal representing a request to transfer a first quantity of resources; determine that the first quantity of resources is less than a first threshold associated with the first authentication channel; responsive to determining that the first quantity of resources is less than the first threshold associated with the first authentication channel, obtain identity data associated with the request to transfer the first quantity of resources, the identity data including at least a shipping address of the user; determine, based on the identity data, that a request to transfer a second quantity of resources has been previously initiated by the user via a second authentication channel that is different than the first authentication channel, the second authentication channel including an indirect authentication channel that comprises authenticating the user via a digital identity network; and determine that the sum of the first quantity of resources and the second quantity of resources is less than the first threshold, and in response to determining that the sum of the first quantity of resources and the second quantity of resources is less than the first threshold, initiate the transfer of the first quantity of resources.
  2. 2. The server of claim 1, wherein the first authentication channel includes a direct authentication channel that comprises authenticating the user based on a usemame and password.
  3. 3. The server of claim 2, wherein the second authentication channel does not require the usemame and password. 29 Date Re9ue/Date Received 2024-04-05 4. The server of claim 1, wherein the second authentication channel includes an unauthenticated channel that does not require authenticating the user. 5. The server of claim 1, wherein the processor-executable instructions, when executed by the processor, further configure the processor to: determine that the sum of the first quantity of resources and the second quantity of resources exceeds the first threshold, and in response to determining that the sum of the first quantity of resources and the second quantity of resources exceeds the first threshold, initiate a transfer of a third quantity of resources that is determined as a difference between the first threshold and the second quantity of resources. 6. The server of claim 5, wherein the processor-executable instructions, when executed by the processor, further configure the processor to: send, via the communications module and to the computing device, a signal causing the computing device to display a notification indicating the third quantity of resources. 7. The server of claim 6, wherein the signal causes the computing device to display a prompt requesting the user to accept or reject transfer of the third quantity of resources and wherein the transfer of the third quantity of resources is initiated in response to receiving a signal, via the communications module and from the computing device, indicating that the user has accepted the transfer. 8. The server of claim 1, wherein the processor-executable instructions, when executed by the processor, further configure the processor to: determine that the second quantity of resources exceeds the first threshold, and in response to determining that the second quantity of resources exceeds the first threshold, reject the transfer of the first quantity of resources. 9. The server of claim 1, wherein the second authentication channel is associated with a second threshold that is different than the first threshold. Date Re9ue/Date Received 2024-04-05 10. A computer-implemented method comprising: authenticating a user via a first authentication channel; receiving, via a communications module and from a computing device associated with the user, a signal representing a request to transfer a first quantity of resources; determining that the first quantity of resources is less than a first threshold associated with the first authentication channel; responsive to determining that the first quantity of resources is less than the first threshold associated with the first authentication channel, obtaining identity data associated with the request to transfer the first quantity of resources, the identity data including at least a shipping address of the user; determining, based on the identity data, that a request to transfer a second quantity of resources has been previously initiated by the user via a second authentication channel that is different than the first authentication channel, the second authentication channel including an indirect authentication channel that comprises authenticating the user via a digital identity network; and determining that the sum of the first quantity of resources and the second quantity of resources is less than the first threshold, and in response to determining that the sum of the first quantity of resources and the second quantity of resources is less than the first threshold, initiating the transfer of the first quantity of resources. 11. The computer-implemented method of claim 10, wherein the first authentication channel includes a direct authentication channel that comprises authenticating the user based on a usemame and password. 12. The computer-implemented method of claim 11, wherein the second authentication channel does not use the usemame and password. 13. The computer-implemented method of claim 10, wherein the second authentication channel includes an unauthenticated channel that does not require authenticating the user. 31 Date Re9ue/Date Received 2024-04-05 14. The computer-implemented method of claim 10, further comprising: determining that the sum of the first quantity of resources and the second quantity of resources exceeds the first threshold, and in response to determining that the sum of the first quantity of resources and the second quantity of resources exceeds the first threshold, initiating a transfer of a third quantity of resources that is determined as a difference between the first threshold and the second quantity of resources. 15. The computer-implemented method of claim 14, further comprising: sending, via the communications module and to the computing device, a signal causing the computing device to display a notification indicating the third quantity of resources. 16. The computer-implemented method of claim 15, wherein the signal causes the computing device to display a prompt requesting the user to accept or reject transfer of the third quantity of resources and wherein the transfer of the third quantity of resources is initiated in response to receiving a signal, via the communications module and from the computing device, indicating that the user has accepted the transfer. 17. The computer-implemented method of claim 10, further comprising: determining that the second quantity of resources exceeds the first threshold, and in response to determining that the second quantity of resources exceeds the first threshold, rejecting the transfer of the first quantity of resources. 18. A non-transitory computer readable storage medium comprising computer-executable instructions which, when executed, configure a processor to perform the method of any one of claims 10 to 17. 19. A server comprising: a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor-executable instructions which, when executed by the processor, configure the processor to: 32 Date Re9ue/Date Received 2024-04-05 receive, via the communications module and from a computing device, a signal representing a request to transfer a first quantity of resources via a first authentication channel that requires a first type of authentication and is associated with a first threshold, the first threshold defining a first maximum quantity of resources that may be purchased using the first authentication channel, the request including identity data; determine, based on the identity data, that a request to transfer a second quantity of resources has been previously initiated within a particular time period via a second authentication channel that requires a second type of authentication and is associated with a second threshold that is different than the first threshold, the second threshold defining a second maximum quantity of resources that may be purchased using the second authentication channel, the second type of authentication different than the first type of authentication; and responsive to determining that the request to transfer the second quantity of resources has been previously initiated via the second authentication channel that is different than the first authentication channel, perform an action that includes one of initiate the transfer of the first quantity of resources, initiate a transfer of a third quantity of resources, or reject the transfer of the first quantity of resources. 20. The server of claim 19, wherein when performing the action, the processor-executable instructions, when executed by the processor, further configure the processor to: determine that a sum of the first quantity of resources and the second quantity of resources is less than a first threshold; and initiate the transfer of the first quantity ofresources. 21. The server of claim 20, wherein the first threshold defines a maximum quantity of a particular type of resource that may be transferred within the particular time period. 22. The server of claim 19, wherein when performing the action, the processor-executable instructions, when executed by the processor, further configure the processor to: determine that a sum of the first quantity of resources and the second quantity of resources exceeds a first threshold; and 33 Date Re9ue/Date Received 2024-04-05 initiate a transfer of a third quantity of resources that is determined as a difference between the first threshold and the second quantity of resources. 23. The server of claim 19, wherein when performing the action, the processor-executable instructions, when executed by the processor, further configure the processor to: determine that the second quantity of resources exceeds a first threshold; and reject the transfer of the first quantity ofresources. 24. The server of claim 19, wherein one of the first type of authentication or the second type of authentication includes direct authentication based on a usemame and password. 25. The server of claim 24, wherein the other of the first type of authentication or the second type of authentication does not require the usemame and password. 26. The server of claim 19, wherein one of the first type of authentication or the second type of authentication includes indirect authentication via a digital identity network. 27. The server of claim 19, wherein one of the first type of authentication or the second type of authentication does not require authenticating. 28. A computer-implemented method comprising: receiving, via a communications module and from a computing device, a signal representing a request to transfer a first quantity of resources via a first authentication channel that requires a first type of authentication and is associated with a first threshold, the first threshold defining a first maximum quantity of resources that may be purchased using the first authentication channel, the request including identity data; determining, based on the identity data, that a request to transfer a second quantity of resources has been previously initiated within a particular time period via a second authentication channel that requires a second type of authentication and is associated with a second threshold that is different than the first threshold, the second threshold defining a second 34 Date Re9ue/Date Received 2024-04-05 maximum quantity of resources that may be purchased using the second authentication channel, the second type of authentication different than the first type of authentication; and responsive to determining that the request to transfer the second quantity of resources has been previously initiated via the second authentication channel that is different than the first authentication channel, performing an action that includes one of initiate the transfer of the first quantity of resources, initiate a transfer of a third quantity of resources, or reject the transfer of the first quantity of resources. 29. The computer-implemented method of claim 28, wherein performing the action includes: determining that a sum of the first quantity of resources and the second quantity of resources is less than a first threshold; and initiating the transfer of the first quantity of resources. 30. The computer-implemented method of claim 29, wherein the first threshold defines a maximum quantity of a particular type of resource that may be transferred within the particular time period. 31. The computer-implemented method of claim 28, wherein performing the action includes: determining that a sum of the first quantity of resources and the second quantity of resources exceeds a first threshold; and initiating a transfer of a third quantity of resources that is determined as a difference between the first threshold and the second quantity of resources. 32. The computer-implemented method of claim 28, wherein performing the action includes: determining that the second quantity of resources exceeds a first threshold; and rejecting the transfer of the first quantity of resources. 33. The computer-implemented method of claim 28, wherein the first authentication channel is associated with a first threshold and the second authentication channel is associated with a second threshold that is different than the first threshold. Date Re9ue/Date Received 2024-04-05 34. The computer-implemented method of claim 28, wherein one of the first type of authentication or the second type of authentication includes direct authentication based on a usemame and password. 35. The computer-implemented method of claim 34, wherein the other of the first type of authentication or the second type of authentication does not require the usemame and password. 36. The computer-implemented method of claim 28, wherein one of the first type of authentication or the second type of authentication includes indirect authentication via a digital identity network. 37. The computer-implemented method of claim 28, wherein one of the first type of authentication or the second type of authentication does not require authenticating. 38. A non-transitory computer readable storage medium comprising computer-executable instructions which, when executed, configure a processor to perform the method of any one of claims 28 to 3 7. 36 Date Re9ue/Date Received 2024-04-05

Description

METHOD AND SYSTEM FOR INITIATING A TRANSFER OF RESOURCES TECHNICAL FIELD [0001] The present application relates to transferring resources, and, more particularly, to methods and systems for initiating a transfer of resources. BACKGROUND [0002] E-commerce systems have evolved to allow customers to purchase resources, such as precious metals, online. [0003] Some such e-commerce systems are provided by financial institutions. For example, a financial institution may allow a user or customer to purchase precious metals such as gold, silver, etc. over the internet and may arrange to have the purchased precious metals shipped or delivered to the customer's address. [0004] Limits may be placed on transactions that are conducted over a period of time. For example, a customer may be limited to only purchasing a certain amount or a certain value of resources within a particular day. However, since these orders are received electronically, customers may circumvent these limits by purchasing the resources using various channels. BRIEF DESCRIPTION OF THE DRAWINGS [0005] drawings: [0006] Embodiments are described in detail below, with reference to the following FIG. 1 is a schematic operation diagram illustrating an operating environment of an example embodiment; [0007] device; [0008] FIG. 2 is a simplified schematic diagram showing components of a computing FIG. 3 is a high-level schematic diagram of an example computer device; 1 Date re9ue/Date Received 2020-07-16 [0009] FIG. 4 shows a simplified organization of software components stored in a memory of the example computer device of FIG. 3; [0010] [0011] FIG. 5 is an example user interface according to an embodiment; FIG. 6 is a flowchart showing operations performed by a server in initiating a transfer of resources according to an embodiment; [0012] [0013] [0014] FIG. 7 is an example user interface according to an embodiment; FIG. 8 is an example user interface according to an embodiment; FIG. 9 is a flowchart showing operations performed by a server in determining if a second authentication channel is the same as a first authentication channel according to an embodiment; [0015] FIG. 10 is a flowchart showing operations performed by a server in initiating a transfer of resources according to an embodiment; [0016] FIG. 11 is a flowchart showing operations performed by a server in initiating a transfer of resources according to an embodiment; and [0017] FIG. 12 is a flowchart showing operations performed by a server in initiating a transfer of resources according to an embodiment. [0018] features. Like reference numerals are used in the drawings to denote like elements and DETAILED DESCRIPTION OF VARIOUS EMBODIMENTS [0019] Accordingly, in one aspect there is provided a server comprising a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor-executable instructions which, when executed by the processor, configure the processor to authenticate a user via a first authentication channel; receive, via the communications module and from a computing device associated with the user, a signal representing a request to transfer a first quantity of resources; determine that the first 2 Date re9ue/Date Received 2020-07-16 quantity of resources is less than a first threshold associated with the first authentication channel; obtain identity data associated with the request to transfer the first quantity of resources; determine, based on the identity data, that a request to transfer a second quantity of resources has been previously initiated by the user via a second authentication channel that is different than the first authentication channel; and determine that the sum of the first quantity of resources and the second quantity of resources is less than the first threshold, and in response to determining that the sum of the first quantity of resources and the second quantity of resources is less than the first threshold, initiate the transfer of the first quantity of resources. [0020] In one or more embodiments, the first authentication channel includes a direct authentication channel that comprises authenticating the user based on a username and password. [0021] In one or more embodiments, the second authentication channel does not require the username and password. [0022] In one or more embodiments, the second authentication channel includes an indirect authentication channel that comprises authenticating the user via a digital identity network. [0023] In one or more embodiments, the second authentication channel includes an unauthenticated channel that does not require authenticating the user. [0024] In one or more embodiments, the processor-executable instructions, when executed by the processor, further configure the processor to determine that the sum of the first quantity of resources and the second quantity of resources exceeds the first threshold, and in response to determining that the sum o