US20090006230A1 - Identity Risk Scoring - Google Patents
Identity Risk Scoring Download PDFInfo
- Publication number
- US20090006230A1 US20090006230A1 US11/769,282 US76928207A US2009006230A1 US 20090006230 A1 US20090006230 A1 US 20090006230A1 US 76928207 A US76928207 A US 76928207A US 2009006230 A1 US2009006230 A1 US 2009006230A1
- Authority
- US
- United States
- Prior art keywords
- subscriber
- identity
- risk score
- identifier
- service
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
Definitions
- FIG. 1 is a block diagram of an identity risk management system in which one or more aspects described herein may be implemented.
- FIG. 2 is a flowchart illustrating a method for assigning and managing identity risk scores for one or more subscribers according to one or more aspects described herein.
- FIG. 3 is a flowchart illustrating a method for initializing identifiers and identity risk scores for a database of subscriber and subscriber entries according to one or more aspects described herein.
- FIG. 4 is a flowchart illustrating a method for initializing an identity risk score based on an enrollment request according to one or more aspects described herein.
- FIG. 5 is a flowchart illustrating a method for modifying an identity risk score based on the addition of a financial account according to one or more aspects described herein.
- FIG. 6 is a flowchart illustrating a method for modifying an identity risk score based on the addition of a payee according to one or more aspects described herein.
- FIG. 7 is a flowchart illustrating a method for updating a subscriber identifier and modifying an identity risk score based on the updated identifier according to one or more aspects described herein.
- FIG. 8 is a flowchart illustrating a method for identifying and managing unresolved negative experiences according to one or more aspects described herein.
- FIG. 9 illustrates a user interface having multiple functions deactivated according to one or more aspects described herein.
- FIG. 10 is a flowchart illustrating a method for determining a set of functions to provide a subscriber based on the subscriber's identity risk score according to one or more aspects described herein.
- FIG. 11 illustrates an identity risk score scale having multiple thresholds and associated function sets according to one or more aspects described herein.
- FIG. 12 is a flowchart illustrating a method for obtaining supplemental authentication information from a subscriber according to one or more aspects described herein.
- FIG. 1 illustrates a networked system, i.e., system 100 that may be used to determine, manage, and process identity risk scores.
- Identity risk scores may include a numeric value, symbol, word, phrase or combinations thereof representative of a degree of certainty with which an identity has been or is being verified.
- System 100 may include multiple devices 105 , 110 , 115 and 120 connected through network 125 . Examples of devices 105 , 110 , 115 and 120 include, respectively, computer 105 , personal computer (PC) 110 , storage device 115 , and server 120 .
- data used in computer 105 may be stored, at least in part, on a remote storage device such as storage device 115 . Similarly, some processing tasks may be delegated by computer 105 to one or more of the other devices, such as server 120 . Accordingly, devices 105 , 110 , 115 and 120 may operate as both a collective processing entity and as individual system components.
- Devices 105 , 110 , 115 and 120 may connect to network 125 through a variety of connection configurations and protocols.
- device 105 may be connected to network 125 through a local area network (LAN), a wireless local area network (WLAN) and/or a wide area network (WAN).
- device 115 may connect to network 125 through a wireless cellular connection.
- Network 125 may further support various types of communication protocols including Internet Protocol (IP), simple mail transfer protocol (SMTP), Internet Message Access Protocol (IMAP) and the like.
- IP Internet Protocol
- SMTP simple mail transfer protocol
- IMAP Internet Message Access Protocol
- IP Internet Protocol
- the communication protocols may include encryption and/or other security measures to protect against interception of information by unauthorized third parties.
- data may be encrypted using Pretty Good Privacy (PGP) encryption techniques.
- PGP Pretty Good Privacy
- Devices 105 , 110 , 115 and 120 may include a variety of components.
- device 105 may include zero, one, or multiple of each of processor 130 , local database 132 , random access memory 134 , read only memory 136 , video adapter 138 , audio adapter 140 , network interface 142 and input interface 144 .
- Processor 130 may be configured to perform a variety of tasks and processes based on instructions stored in local database 132 , random access memory 134 and/or read only memory 136 .
- Local database 132 may include a magnetic disk drive, an optical disk drive and/or a flash memory drive.
- processor 130 may generate a user interface based on a particular application's instructions.
- the user interface may be displayed through video adapter 138 for display on screen 146 . Additionally, audio such as music or audio cues may be output through audio adapter 140 and speakers 148 . Input interface 144 may be used to facilitate connection and communication with input devices such as digitizer 150 , keyboard 152 , mouse 154 and/or microphone 156 . Other and/or additional components may be integrated into a system or device such as PC 105 .
- FIG. 2 is a flowchart illustrating a method for generating and managing identity risk scores for one or more subscribers of a financial commerce service.
- a subscriber generally relates to an entity (e.g., an individual or business) having a particular service relationship with another entity (e.g., a service provider).
- an individual may count as two subscribers in a service provider's database if the individual has two subscriber relationships or subscriptions with the service provider.
- an individual may have two payor subscriptions with the service provider if each of the payor subscriptions has a different sponsor (e.g., a bank from which the funds originate).
- Sponsor as used herein, generally relates to an entity that provides an entry point or “front end” for the consumer.
- a sponsor may provide financial backing or funding for an entity.
- Sponsors may include banks, brokerages, businesses and the like.
- multiple subscribers may correspond to a single entity.
- the financial service may initially assign an identifier to each of the subscribers in a database.
- Each identifier may include a numeric code, a string of alphanumeric characters, a symbol and the like.
- the identifier may be, or may be based upon, a value retrieved from a third party identity service that provides identity services to multiple businesses or other entities.
- Each of the multiple businesses or entities may then communicate with one another about a particular entity or individual using the same identifiers provided by the identity service.
- each of the subscribers may be assigned an initial identity risk score.
- the initial identity risk score may be predefined and/or set based on an internally generated confidence level or that returned by a third party identity service. Additional details regarding the initialization and updating of subscriber identifiers and identity risk scores is provided below.
- the service provider system may monitor for various transaction requests that may affect one or more subscribers' identity risk score in step 210 and 215 . If a transaction request is detected in step 215 , the service may determine the type of transaction that is being requested in step 220 . Types of transactions may include, but are not limited to, the enrollment of a new subscriber, addition of financial account information (e.g., adding a checking account's routing transit number and account number for issuing payments on behalf of a subscriber), addition of payee information (e.g., adding information associated with an entity to which funds are to be transferred) and/or the update of identifier information. Generally, a transaction request involves the addition of information that was not previously associated with a subscription or subscriber entry to which the transaction request pertains. Other types of transaction requests may also be facilitated by the service.
- financial account information e.g., adding a checking account's routing transit number and account number for issuing payments on behalf of a subscriber
- payee information e.g., adding information associated with
- a subscriber's identity score may be updated accordingly in step 225 .
- a subscriber's identity risk score may be increased if an association between a new financial account and a subscriber may be confirmed. The association may be confirmed by the service provider or by the third party identity service.
- increasing an identity risk score is used to reflect more confidence in a subscriber's identity while reducing an identity risk score corresponds to a decrease confidence.
- identity risk scores may be used including associating an increase in identity risk score with less confidence and a decrease in the score with increased confidence.
- an identity risk score may correspond to less confidence while reducing the score may correspond to more confidence.
- the conversion of a subscriber's identifier from a first type of identifier to a second type of identifier may also increase or decrease the identity risk score associated with the subscriber.
- FIG. 3 is a flowchart illustrating a method for updating or initializing a database having subscriber information.
- a service provider may determine the number of subscribers, e.g., represented by the counter variable i, currently enrolled in the service provider's database in order to iterate through all subscribers. Initially, the number of subscribers, i, may correspond to the number of subscribers that need to be processed.
- the service provider may determine whether the number of subscribers that need to be processed is greater than 0. In other words, the service provider may determine whether any subscribers need to be processed.
- the service provider may transmit subscriber information such as name, address, social security number and other information associated with a first subscriber to a third party identity service in step 310 .
- the third party identity service may be used to determine an identifier associated with the first subscriber. Identifiers may be assigned by a third party identity service to an entity for purposes of identification without having to disclose personal information about the entity.
- an identifier may be received from the third party identity service. Identifiers may be universal or temporary. Universal identifiers relate to identifier-entity correspondences that have already been established. That is, the third party identity service is able to match the submitted subscriber information to information stored in its database. In contrast, if the third party identity service is unable to match the subscriber information, the identity service may issue a temporary identifier instead.
- the service provider may store the received identifier in association with the subscriber in step 320 . That is, the identifier is stored such that subscriber information may be located and/or identified using the identifier and vice versa.
- an initial identity score may be set for the subscriber.
- the identity score may be an initial default score or may be determined based on a set of predefined factors. For example, the identity score may correspond to a confidence level returned by the third party identity service and/or an amount of experience the service provider has had with the subscriber.
- the financial service may optionally remove sensitive information associated with the subscriber or subscriber entry thereof from the database. Such a process may reduce security exposure should a hacker ever obtain access to the database.
- the service provider may decrement the number of subscribers by 1 to update the number of subscribers that still need to be processed. The process may then return to step 305 , where the service provider may determine if other subscribers need to be processed (i.e., if i>0). If so, a second subscriber may be processed as described above. If not, the process may end.
- a service provider may determine an initial identity risk score based on various information.
- a service provider facilitates processing of electronic financial transactions such as bill payment, money transfers, on-line purchases and the like.
- FIG. 4 is a flowchart illustrating a method for generating an identity risk score for a newly enrolling subscriber.
- the service provider may receive information including personal data (e.g., name, social security number, birth date, telephone number, driver's license number and state, email address) in association with an enrollment process.
- the service provider may create a new subscriber entry in a database.
- a subscriber entry refers generally to one or more records containing information relating to a subscriber.
- a user may be associated with multiple subscriber entries, as discussed earlier.
- the new entry may be initially populated with the information provided by the subscriber during enrollment.
- the new entry may be temporary until the service provider is able to verify the subscriber's identity to a level of satisfaction. As such, in one example, if a subscriber's initial risk score is determined to be too low, service may be denied to the new subscriber until the service provider is able to verify the subscriber's identity with more confidence and thereby increase the identity risk score. If verification is not accomplished (possibly within a certain period of time), the new entry may be deleted from the database.
- the service provider may determine whether the new subscriber information already exists in the database by comparing the information with existing information already stored in the database.
- an individual or other entity may already be a subscriber of the service provided by the service provider through a first service relationship and is now enrolling as a new subscriber through a second service relationship. Accordingly, some or all of the information about the individual or other entity may be duplicative of the existing subscriber entry. If, in step 415 , the service provider determines that a match is found, the service provider may copy the universal or temporary identifier associated with the matching entry to the new subscriber entry in step 420 . Additionally, the service provider may set the identity risk of the new subscriber to an initial risk score in step 423 .
- the initial risk score may be copied from the matching entry.
- the identity risk score may be determined based on various predefined factors.
- the service provider may subsequently determine whether any unresolved negative experiences are associated with the matching entry.
- an unresolved negative experience may be generated and/or identified if funds associated with a payment made on behalf of a subscriber remain uncollected.
- Flags may be set to indicate unresolved negative experiences for appropriate subscribers. If there exists one or more unresolved negative experiences, the new subscriber may be blocked in step 430 from performing any actions until the issues are resolved. In fact, the new subscriber may be instructed in step 435 to contact a customer service center to resolve the issue. If, however, no unresolved negative experiences are found in step 425 , the new subscriber may be allowed to use the service.
- the enrollment information of the new subscriber may be submitted to an identity service for verification in step 440 .
- the identity service may be a third party identity service or, alternatively or additionally, be an in-house identity service.
- the service provider may receive a universal or temporary identifier, as discussed earlier, associated with the subscriber in response to its submission. Additionally, a confidence level may also be received as part of the response from the identity service indicating a level of confidence with which the subscriber's identity was verified.
- the service provider may compare the received identifier with the identifiers stored in the database.
- an identity risk score associated with the subscriber may be determined in step 460 .
- the risk value may be determined based on the service provider's inability to match the subscriber's information and/or the identity service's ability to match identifier information. That is, the service's inability to match the subscriber's information may decrease the identity risk score (i.e., less confident) by a first amount while the ability to match the identifier may modify the identity risk score upward (i.e., more confident) by a second amount. A variety of other identity risk score considerations may also be factored into the calculation of the new subscriber's identity risk score.
- the service may proceed to step 425 to determine whether unresolved negative experiences exist.
- the new subscriber's identity risk score may be determined and set to a value that reflects such circumstances in step 465 .
- the identity risk score may be set to a relatively low value since the service provider is not able to match the subscriber to any previous subscriber's in the service's database.
- an identity risk score may be calculated in a variety of manners and taking into consideration a multitude of factors. For example, the confidence level that is received from the identity service may serve to increase or decrease a subscriber's identity risk score. Once the identity risk score is set, the subscriber may proceed to use the service.
- a subscriber may proceed to perform a variety of functions, unless blocked as a result of unresolved negative experiences and as allowed by the identity risk score.
- a subscriber may wish to add financial account information to his or her account.
- the financial account information may identify an account from which funds may be obtained for paying for various services, products, bills and the like.
- FIG. 5 is a flowchart illustrating a method for modifying an identity risk score associated with a subscriber adding new financial account information.
- a request may be received from a subscriber to add a financial account to his or her service account.
- the request may include information such as a type of financial account (e.g., checking, money market, credit), financial institution name, routing transit number, account number, and the like.
- a service provider may determine whether the financial account already exists in the database in step 505 . For example, the service provider may compare the financial account information submitted with existing financial accounts that are stored in the database.
- the service provider may further determine whether the account is associated with the same subscriber identifier or with the same group in step 515 .
- Types of groups may include a household group (i.e., a group of individuals having a family relationship), a friend group, a business group, and a social group among others. In short, a group may be defined based on one or more types of relationships between entities. Determining whether two subscribers are associated with the same group may involve requesting a group identifier from an identity service. If the group identifier associated with each subscriber adding the financial account and the subscriber already having the financial account match, the service may determine that the two subscribers belong to the same group.
- the service provider may compare address, telephone number, surnames and other information to determine whether the two subscribers are related to the same household group.
- a variety of other processes may be used in addition to or in place of the above described methods for determining whether two subscribers are associated with the same group.
- the service provider may increase the first subscriber's identity risk score by a specified amount in step 520 .
- the increase may reflect an increased certainty of the first subscriber's identity derived based on known relationships between subscribers and financial account information.
- the request for adding a financial account may be submitted for research and resolution in step 525 .
- the request may be submitted for manual resolution.
- Manual resolution may include submitting the request to service provider personnel who may manually research correspondences between the financial account and the subscriber.
- research and resolution of the discrepancy may be handled by one or more automated systems. For example, a research and resolution system may transmit an automated e-mail message to the financial institution holding the financial account to request verification.
- the service provider may submit the financial account information to an identity service for verification that the account is associated with the requesting subscriber in step 527 .
- the request may include the subscriber's universal or temporary identifier along with the financial account information. If the identity service is able to confirm the association in step 530 , the subscriber's identity risk score may be increased in step 535 .
- the service provider may further determine whether an updated identifier has been received from the identity service. An identifier may be updated if the identifier is temporary and the identity service is able to match a universal identifier to the subscriber based on new information.
- the financial account information may be used to confirm a subscriber's identity and association with a universal identifier. Accordingly, a temporary identifier that was previously issued may be replaced or updated by the universal identifier. As discussed, a temporary identifier may be assigned if an identifier associated with a subscriber's information could not be found by the identity service. If an updated identifier is received, the subscriber's identifier may be replaced with the updated identifier in step 545 .
- the service provider may optionally determine whether the updated identifier is associated with any unresolved negative experiences.
- FIG. 8 is a flowchart illustrating a method for determining whether unresolved negative experiences exist.
- a service provider may compare the received updated identifier with the subscriber database to determine whether any other subscriber entries exist with the same identifier.
- the service provider may determine whether any matching entries were found. If not, the process may end there or proceed to another step in the underlying process (e.g., step 550 of FIG. 5 ).
- the service provider may determine whether those subscriber entries associated with the matching identifier are associated with unresolved negative experiences in step 810 . If no unresolved negative experiences are found, the process may end or proceed to another step in the underlying process (e.g., step 550 of FIG. 5 ).
- the service provider may request that the subscriber contact customer service in order to resolve the issue(s) in step 820 .
- a following step might not be performed until the negative experiences have been resolved. For example, a subscriber's identity risk score might not be increased (e.g., step 550 of FIG. 5 ) until the unresolved negative experiences are cleared.
- the subscriber's identity risk score may be increased in step 550 .
- the service provider may request account confirmation from the subscriber if the subscriber's association with the financial account information is not confirmed by the identity service in step 630 .
- the account confirmation process may include various confirmation algorithms including depositing a random amount of money into the financial account and asking the subscriber to verify that amount. Other confirmation algorithms that may be used are disclosed in U.S. patent application Ser. No. 10/284,462, entitled “System and Method for Verifying a Financial Instrument Using a Preferred Single Values” and filed on Oct. 31, 2002 and U.S. Pat. No.
- step 660 If the account is confirmed by the subscriber (as determined in step 660 ), the subscriber's identity risk score may be increased in step 665 . If, however, the account is not confirmed, the subscriber's identity risk score may be decreased in step 670 .
- the modification of an identity risk score based on a subscriber's interaction with a service provider provides a more accurate and flexible method of determining the certainty associated with a subscriber's identity.
- FIG. 6 is a flowchart illustrating a method for adjusting an identity risk score based on a service provider's ability to confirm payee information association with the subscriber.
- a service provider may receive a request from the subscriber to add a payee to his account.
- a payee may correspond to a biller, a merchant, another individual or the like, typically providing goods or a service to the subscriber.
- the service provider may compare the payee information to existing payee information associated with the same identifier and/or group. If a match is found in step 610 , the identity risk score associated with the subscriber may be increased in step 612 .
- the service provider may determine whether an association between the payee and the subscriber can be confirmed by an identity service in step 615 . For example, in some instances, payees might only be confirmed by an identity service if the payees are major creditors. The determination of step 615 may be performed by comparing the payee information to a list of verifiable payees or category of payees. If the payee information cannot be verified using an identity service or known information (i.e., information stored in the service provider's database), the process may terminate without increasing or decreasing the subscriber's identity risk score.
- a request for confirmation may be sent to the identity service in step 620 .
- the request may include the subscriber's universal or temporary identifier as well as the payee information.
- the service provider may determine whether the identity service was able to confirm an association between the payee and the subscriber. If so, the subscriber's identity risk score may be increased in step 630 .
- the service provider may determine whether an updated identifier has been identified by and received from the identity service in step 635 . Again, an updated identifier may be received if the subscriber's identity was previously indeterminable or unconfirmed.
- a temporary identifier may be issued by an identity service. Additionally or alternatively, an updated identifier may also be received if a subscriber was mistakenly identified by a first identifier.
- the identity service may provide an update to the service provider with the second identifier. If an updated identifier is received, the service provider may update the database with the new identifier information in step 640 . Furthermore, the service provider may increase the identity risk score associated with the subscriber in step 645 .
- the service provider may further determine whether the updated identifier is associated with unresolved negative experiences.
- FIG. 8 is a flowchart illustrating a method for identifying and managing unresolved negative experiences. Accordingly, such a method may be used once an updated is received and the database has been updated, e.g., as shown in step 640 of FIG. 6 .
- the identity risk score associated with the subscriber may be decreased or reduced in step 650 .
- the amount by which an identity risk score is increased or decreased may be determined in a variety of manners including predefined algorithms and/or manual evaluations that are known in the art.
- an identifier associated with a subscriber may be subsequently updated or replaced by a new identifier.
- a temporary identifier issued for a subscriber may be replaced by a universal identifier upon verification of the subscriber's identity.
- the updating of a subscriber's identifier may involve other processes including updating the identity risk score associated with the subscriber and determining whether unresolved negative experiences exist.
- FIG. 7 is a flowchart illustrating a method for updating an identifier associated with a subscriber and modifying an identity risk score of the subscriber based on the updated identifier.
- a service provider may receive an updated identifier.
- the updated identifier may be received from an identity service and may further include identification of the old identifier (e.g., a temporary identifier) the new updated identifier (e.g., a universal identifier) is to replace.
- the financial service may identify the corresponding subscriber entry in the database using the old identifier. Once identified, the subscriber entry may be updated with the new identifier in step 710 .
- the identity risk score associated with the subscriber may be increased.
- the identity risk score of a subscriber may be increased in light of the higher level of confidence or certainty associated with a universal identifier (as compared to a temporary identifier).
- the service provider may further search for one or more subscriber entries that match the updated identifier. If a match is found in step 725 , the service provider may determine whether the matched subscriber entry includes any unresolved negative experiences in step 730 . If unresolved negative experiences are indicated, the subscriber whose identifier was updated may be blocked from using the functions and services provided by the service provider in step 735 and asked to contact customer service to resolve the negative experiences in step 740 . Unresolved negative experiences may include inability to collect funds associated with a payment performed on behalf of the subscriber, non-payment of a bill, poor credit, legal actions taken against the subscriber and the like. If, on the other hand, either no identifier match was found (step 725 ) or no unresolved negative experiences were identified (step 730 ), the process may end and the subscriber may be allowed access to the service provider's functions.
- Identity risk scores may be restricted to values between an upper and a lower threshold. As such, identity risk scores might not be able to be increased above a certain ceiling and/or decreased below a certain floor. Additionally, trends in identity risk score modifications may be factored into any determination of future increases or decreases of the score and/or any interpretations of the identity risk score. For example, if a subscriber has had a trend of three (3) consecutive increases in identity risk score, a high level of certainty may attributed to the identity risk score even if the identity risk score is still relatively low. In another example, if a subscriber has a relatively high identity risk score but has received downward adjustments the two (2) previous instances, there may be concern that the subscriber's identity has been stolen or that the identity risk score should be interpreted with more caution.
- an identity risk score may also have impacts on types of transactions and functions available to a subscriber.
- having a identity risk score higher or lower than a certain threshold may affect the types and scope of functionality available.
- subscribers having a low identity risk score may be restricted to the types of payees that they may add (e.g., to just reversible merchants), limited to the number of payments that can be submitted in a certain period of time, limited to a maximum amount of payment and/or restrictions in other functional aspects (e.g., ability to modify/view profile information, bill information, payee information, payment history).
- FIG. 9 illustrates a user interface showing a welcome screen 900 for a service provider with functionality restricted from subscriber use.
- view bill option 905 is grayed out, indicating an unavailability of that function.
- a view payment history option 910 is also grayed out to indicate to the subscriber that this function is not available to him or her (HDD ⁇ You might not want to show the latter grayed out, as then the subscriber is caught in a Catch-22.
- One way to improve the score is to submit a financial account that's recognized—but that's done through modifying personal info!).
- a subscriber may be restricted from viewing a bill, viewing or modifying his or her profile, viewing or modifying payee information and/or viewing payment history if his or her identity risk score is not sufficiently high.
- payment requests may be denied if the subscriber's identity risk does not meet the threshold.
- a subscriber's payment request may always be accepted by a service provider regardless of the subscriber's identity risk score. However, in accepting the payment request, the request may be flagged according to the subscriber's identity risk score. As such, when the payment request is submitted for processing, the payment request might not be processed if the subscriber's identity risk score is too low.
- FIG. 10 is a flowchart illustrating a method for identifying functionality available to a subscriber based on the subscriber's identity risk score.
- a subscriber may login to a service provider.
- the service provider may extract an identity risk score associated with the subscriber from the service provider's database.
- the identity risk score may be compared to one or more predefined identity risk score thresholds to determine whether the subscriber's identity risk score exceeds the one or more thresholds. If the subscriber's identity risk score exceeds or meets the one or more thresholds (as determined in step 1015 ), the service provider may present a first set of available functions to the subscriber in step 1020 .
- the service provider may provide the subscriber with a second or restricted set of available functions in step 1025 .
- the second or restricted set of available functions may be a subset of less than all of the functions included in the first set of available functions.
- a risk value determined based on the identity risk score and one of a credit risk score and a fraud risk score may be used in place of or in addition to the subscriber's identity risk score.
- a risk value may be a combination of a subscriber's identity risk score and his credit risk score, where the identity risk score is weighed twice as much as the credit risk score.
- multiple thresholds may be defined for accessing functions provided by a service provider. That is rather than using a single threshold to define two sets of functionality, multiple thresholds may be used to define more than two sets of functionality available based on identity risk score. Accordingly, as a subscriber's identity risk score increases, additional functions may be added to a set of available functions provided the identity risk score meets new thresholds.
- FIG. 11 illustrates an identity risk score scale 1100 showing multiple score thresholds 1105 , 1106 and 1107 . Each range between thresholds corresponds to a set of functions, e.g., sets 1110 , 1111 and 1112 .
- function set 1110 includes only view bill and view profile functions.
- function set 1111 includes view bill, view profile and view/modify payee functions while set 1112 includes all of the aforementioned functions as well as view payment history, submit payment request and modify profile functions.
- thresholds any number of thresholds and a variety of function sets may be defined.
- FIG. 12 is a flowchart illustrating a method for obtaining supplemental authentication information if one or more transactions are rejected by a financial commerce service.
- a subscriber may be informed that a requested transaction has been denied. For example, processing of a subscriber's payment request may be denied if the subscriber's identity risk score is too low. In such a case, the service may prompt the subscriber with a denial message.
- the service provider may provide an opportunity for the subscriber to provide further authentication information relating to his or her identity. The service provider may, in one or more arrangements, prompt the user for additional authentication information such as mother's maiden name or previous address.
- the user or another entity, such as the user's sponsor may be allowed to select the manner in which he or she provides supplemental authentication information.
- Various manners of providing supplemental authentication information may include a one-time password or token, an out-of-wallet question and/or customer care intervention via e-mail or phone.
- the service provider may determine whether the user has satisfactorily authenticated his identity based on the supplemental information. If the subscriber has authenticated his identity, the subscriber's identity risk score may be raised in step 1215 and provided access to the previously denied functionality in step 1220 (e.g., the payment request may be released for processing).
- the service provider may present the subscriber with a final denial of service in step 1225 .
- a service may provide a subscriber with multiple opportunities (e.g., 3) before providing a final denial of service.
- a subscriber's identity risk score may be raised or lowered based on a login profile and/or other login validation information.
- a login profile or login validation information may include personal information (e.g., security questions), patterns of behavior (e.g., when a subscriber typically logs in or performs various activities), biometric data (e.g., fingerprints or voiceprints) and the like.
- biometric data e.g., fingerprints or voiceprints
- login validation may further be performed using a key fob or Radio Frequency ID (RFID) device. That is, if a subscriber is able to validate his or her login using a valid key fob or RFID device, the subscriber's identity risk score may increased or decreased accordingly.
- RFID Radio Frequency ID
- the methods and features recited herein may further be implemented through any number of computer readable media that are able to store computer readable instructions.
- Examples of computer readable media that may be used include RAM (e.g., RAM 134 of FIG. 1 ), ROM (e.g., ROM 136 of FIG. 1 ), EEPROM, flash memory or other memory technology, CD-ROM, DVD or other optical disk storage, magnetic cassettes, magnetic tape, magnetic storage and the like.
- the methods and features may be implemented as software stored in a CD-ROM or DVD.
- instructions may be loaded into RAM and executed by a processor (e.g., processor 130 of FIG. 1 )
- a processor such as processor 130 may be used to execute the instructions stored in the computer readable media.
- Data that needs to be stored e.g., subscriber entries, may be stored in a local database such as storage 132 and/or on a remote device such as storage database 115 .
- the execution of various instructions may also span different devices in a networked environment (e.g., networked system 100 ).
- device 105 may be responsible for managing the database of subscription entries while computing device 110 is configured to initialize, update and/or otherwise modify subscriber identity risk scores.
Abstract
An identity risk score may be determined for subscribers of a service to indicate a level of confidence or certainty associated with a subscriber's identity. The identity risk score may be modified upward or downward in order to reflect changing levels of certainty. The changes may be based on transactions performed on behalf of and/or information submitted by the subscriber. Functionality provided to the subscriber may also be dependent upon whether the subscriber's identity risk score meets a threshold. In one or more arrangements, an identity risk score may be determined based on whether information entered by the subscriber can be confirmed and a level of confidence with which the information is confirmed.
Description
- The protection and security of an individual or entity's identity is critical in virtually every facet of society. Similarly, the security and validity of an individual or entity's identity is equally important for the protection of an organization in taking the risk of interacting with the individual or entity. From banking to joining social organizations to making financial transactions, an organization or company must generally have a degree of certainty about an entity's identity to reduce risks associated with engaging in such activities with the entity. Thus, companies or other entities may generally perform some form of identity verification prior to engaging in a transaction with another entity.
- Aspects of the present invention are illustrated by way of example and not limited in the accompanying figures in which like reference numerals indicate similar elements and in which:
-
FIG. 1 is a block diagram of an identity risk management system in which one or more aspects described herein may be implemented. -
FIG. 2 is a flowchart illustrating a method for assigning and managing identity risk scores for one or more subscribers according to one or more aspects described herein. -
FIG. 3 is a flowchart illustrating a method for initializing identifiers and identity risk scores for a database of subscriber and subscriber entries according to one or more aspects described herein. -
FIG. 4 is a flowchart illustrating a method for initializing an identity risk score based on an enrollment request according to one or more aspects described herein. -
FIG. 5 is a flowchart illustrating a method for modifying an identity risk score based on the addition of a financial account according to one or more aspects described herein. -
FIG. 6 is a flowchart illustrating a method for modifying an identity risk score based on the addition of a payee according to one or more aspects described herein. -
FIG. 7 is a flowchart illustrating a method for updating a subscriber identifier and modifying an identity risk score based on the updated identifier according to one or more aspects described herein. -
FIG. 8 is a flowchart illustrating a method for identifying and managing unresolved negative experiences according to one or more aspects described herein. -
FIG. 9 illustrates a user interface having multiple functions deactivated according to one or more aspects described herein. -
FIG. 10 is a flowchart illustrating a method for determining a set of functions to provide a subscriber based on the subscriber's identity risk score according to one or more aspects described herein. -
FIG. 11 illustrates an identity risk score scale having multiple thresholds and associated function sets according to one or more aspects described herein. -
FIG. 12 is a flowchart illustrating a method for obtaining supplemental authentication information from a subscriber according to one or more aspects described herein. - In the following description of the various embodiments, reference is made to the accompanying drawings, which form a part hereof, and in which is shown by way of illustration various embodiments in which the invention may be practiced. It is to be understood that other embodiments may be utilized and structural and functional modifications may be made without departing from the scope of the present invention.
- Operating Environment
-
FIG. 1 illustrates a networked system, i.e.,system 100 that may be used to determine, manage, and process identity risk scores. Identity risk scores may include a numeric value, symbol, word, phrase or combinations thereof representative of a degree of certainty with which an identity has been or is being verified.System 100 may includemultiple devices network 125. Examples ofdevices computer 105, personal computer (PC) 110,storage device 115, andserver 120. In one example, data used incomputer 105 may be stored, at least in part, on a remote storage device such asstorage device 115. Similarly, some processing tasks may be delegated bycomputer 105 to one or more of the other devices, such asserver 120. Accordingly,devices -
Devices network 125 through a variety of connection configurations and protocols. For example,device 105 may be connected tonetwork 125 through a local area network (LAN), a wireless local area network (WLAN) and/or a wide area network (WAN). In another example,device 115 may connect tonetwork 125 through a wireless cellular connection. Network 125 may further support various types of communication protocols including Internet Protocol (IP), simple mail transfer protocol (SMTP), Internet Message Access Protocol (IMAP) and the like. One of ordinary skill in the art will appreciate that a multitude of network and communication protocol types exist and may be used in conjunction with or in place of the examples described herein. Additionally, in one or more arrangements, the communication protocols may include encryption and/or other security measures to protect against interception of information by unauthorized third parties. For example, data may be encrypted using Pretty Good Privacy (PGP) encryption techniques. -
Devices device 105 may include zero, one, or multiple of each ofprocessor 130,local database 132,random access memory 134, read onlymemory 136,video adapter 138,audio adapter 140,network interface 142 andinput interface 144.Processor 130 may be configured to perform a variety of tasks and processes based on instructions stored inlocal database 132,random access memory 134 and/or read onlymemory 136.Local database 132 may include a magnetic disk drive, an optical disk drive and/or a flash memory drive. In one example,processor 130 may generate a user interface based on a particular application's instructions. The user interface may be displayed throughvideo adapter 138 for display onscreen 146. Additionally, audio such as music or audio cues may be output throughaudio adapter 140 andspeakers 148.Input interface 144 may be used to facilitate connection and communication with input devices such asdigitizer 150,keyboard 152,mouse 154 and/or microphone 156. Other and/or additional components may be integrated into a system or device such as PC 105. -
FIG. 2 is a flowchart illustrating a method for generating and managing identity risk scores for one or more subscribers of a financial commerce service. A subscriber, as used herein, generally relates to an entity (e.g., an individual or business) having a particular service relationship with another entity (e.g., a service provider). As such, an individual may count as two subscribers in a service provider's database if the individual has two subscriber relationships or subscriptions with the service provider. For example, an individual may have two payor subscriptions with the service provider if each of the payor subscriptions has a different sponsor (e.g., a bank from which the funds originate). Sponsor, as used herein, generally relates to an entity that provides an entry point or “front end” for the consumer. For example, a sponsor may provide financial backing or funding for an entity. Sponsors may include banks, brokerages, businesses and the like. Accordingly, multiple subscribers may correspond to a single entity. Instep 200, the financial service may initially assign an identifier to each of the subscribers in a database. Each identifier may include a numeric code, a string of alphanumeric characters, a symbol and the like. In one or more arrangements, the identifier may be, or may be based upon, a value retrieved from a third party identity service that provides identity services to multiple businesses or other entities. Each of the multiple businesses or entities may then communicate with one another about a particular entity or individual using the same identifiers provided by the identity service. Instep 205, each of the subscribers may be assigned an initial identity risk score. The initial identity risk score may be predefined and/or set based on an internally generated confidence level or that returned by a third party identity service. Additional details regarding the initialization and updating of subscriber identifiers and identity risk scores is provided below. - Once the subscribers in the database have been assigned an identifier and an initial identity risk score, the service provider system may monitor for various transaction requests that may affect one or more subscribers' identity risk score in
step step 215, the service may determine the type of transaction that is being requested instep 220. Types of transactions may include, but are not limited to, the enrollment of a new subscriber, addition of financial account information (e.g., adding a checking account's routing transit number and account number for issuing payments on behalf of a subscriber), addition of payee information (e.g., adding information associated with an entity to which funds are to be transferred) and/or the update of identifier information. Generally, a transaction request involves the addition of information that was not previously associated with a subscription or subscriber entry to which the transaction request pertains. Other types of transaction requests may also be facilitated by the service. - Based on the type of transaction requested, a subscriber's identity score may be updated accordingly in
step 225. For example, a subscriber's identity risk score may be increased if an association between a new financial account and a subscriber may be confirmed. The association may be confirmed by the service provider or by the third party identity service. For purposes of describing the various methods and systems discussed herein, increasing an identity risk score is used to reflect more confidence in a subscriber's identity while reducing an identity risk score corresponds to a decrease confidence. However, one of skill in the art will appreciate that a variety of other interpretations of identity risk scores may be used including associating an increase in identity risk score with less confidence and a decrease in the score with increased confidence. Alternatively, increasing an identity risk score may correspond to less confidence while reducing the score may correspond to more confidence. In another example, the conversion of a subscriber's identifier from a first type of identifier to a second type of identifier may also increase or decrease the identity risk score associated with the subscriber. The various transactions described and their effects on a subscriber's identity risk score are discussed in further detail below. Once a subscriber's identity score has been modified, the service provider may loop back tosteps -
FIG. 3 is a flowchart illustrating a method for updating or initializing a database having subscriber information. Instep 300, a service provider may determine the number of subscribers, e.g., represented by the counter variable i, currently enrolled in the service provider's database in order to iterate through all subscribers. Initially, the number of subscribers, i, may correspond to the number of subscribers that need to be processed. Instep 305, the service provider may determine whether the number of subscribers that need to be processed is greater than 0. In other words, the service provider may determine whether any subscribers need to be processed. If the number of subscribers that require processing is greater than 0, the service provider may transmit subscriber information such as name, address, social security number and other information associated with a first subscriber to a third party identity service instep 310. The third party identity service may be used to determine an identifier associated with the first subscriber. Identifiers may be assigned by a third party identity service to an entity for purposes of identification without having to disclose personal information about the entity. Instep 315, an identifier may be received from the third party identity service. Identifiers may be universal or temporary. Universal identifiers relate to identifier-entity correspondences that have already been established. That is, the third party identity service is able to match the submitted subscriber information to information stored in its database. In contrast, if the third party identity service is unable to match the subscriber information, the identity service may issue a temporary identifier instead. - Upon receipt, the service provider may store the received identifier in association with the subscriber in
step 320. That is, the identifier is stored such that subscriber information may be located and/or identified using the identifier and vice versa. Instep 325, an initial identity score may be set for the subscriber. The identity score may be an initial default score or may be determined based on a set of predefined factors. For example, the identity score may correspond to a confidence level returned by the third party identity service and/or an amount of experience the service provider has had with the subscriber. - In
step 330, the financial service may optionally remove sensitive information associated with the subscriber or subscriber entry thereof from the database. Such a process may reduce security exposure should a hacker ever obtain access to the database. Instep 335, the service provider may decrement the number of subscribers by 1 to update the number of subscribers that still need to be processed. The process may then return to step 305, where the service provider may determine if other subscribers need to be processed (i.e., if i>0). If so, a second subscriber may be processed as described above. If not, the process may end. - In instances where a new subscriber has enrolled or is enrolling, a service provider may determine an initial identity risk score based on various information. A service provider, as used herein, facilitates processing of electronic financial transactions such as bill payment, money transfers, on-line purchases and the like.
FIG. 4 is a flowchart illustrating a method for generating an identity risk score for a newly enrolling subscriber. Instep 400, the service provider may receive information including personal data (e.g., name, social security number, birth date, telephone number, driver's license number and state, email address) in association with an enrollment process. Instep 405, the service provider may create a new subscriber entry in a database. A subscriber entry, as used herein, refers generally to one or more records containing information relating to a subscriber. A user may be associated with multiple subscriber entries, as discussed earlier. The new entry may be initially populated with the information provided by the subscriber during enrollment. In one or more configurations, the new entry may be temporary until the service provider is able to verify the subscriber's identity to a level of satisfaction. As such, in one example, if a subscriber's initial risk score is determined to be too low, service may be denied to the new subscriber until the service provider is able to verify the subscriber's identity with more confidence and thereby increase the identity risk score. If verification is not accomplished (possibly within a certain period of time), the new entry may be deleted from the database. - In
step 410, the service provider may determine whether the new subscriber information already exists in the database by comparing the information with existing information already stored in the database. In one example, an individual or other entity may already be a subscriber of the service provided by the service provider through a first service relationship and is now enrolling as a new subscriber through a second service relationship. Accordingly, some or all of the information about the individual or other entity may be duplicative of the existing subscriber entry. If, instep 415, the service provider determines that a match is found, the service provider may copy the universal or temporary identifier associated with the matching entry to the new subscriber entry instep 420. Additionally, the service provider may set the identity risk of the new subscriber to an initial risk score instep 423. In one example, the initial risk score may be copied from the matching entry. Alternatively, the identity risk score may be determined based on various predefined factors. Instep 425, the service provider may subsequently determine whether any unresolved negative experiences are associated with the matching entry. In one example, an unresolved negative experience may be generated and/or identified if funds associated with a payment made on behalf of a subscriber remain uncollected. Flags may be set to indicate unresolved negative experiences for appropriate subscribers. If there exists one or more unresolved negative experiences, the new subscriber may be blocked instep 430 from performing any actions until the issues are resolved. In fact, the new subscriber may be instructed instep 435 to contact a customer service center to resolve the issue. If, however, no unresolved negative experiences are found instep 425, the new subscriber may be allowed to use the service. - If no subscriber entries are found to match the new subscriber entry, the enrollment information of the new subscriber may be submitted to an identity service for verification in
step 440. The identity service may be a third party identity service or, alternatively or additionally, be an in-house identity service. In either case, instep 445, the service provider may receive a universal or temporary identifier, as discussed earlier, associated with the subscriber in response to its submission. Additionally, a confidence level may also be received as part of the response from the identity service indicating a level of confidence with which the subscriber's identity was verified. Instep 450, the service provider may compare the received identifier with the identifiers stored in the database. If a match is found insteps step 460. The risk value may be determined based on the service provider's inability to match the subscriber's information and/or the identity service's ability to match identifier information. That is, the service's inability to match the subscriber's information may decrease the identity risk score (i.e., less confident) by a first amount while the ability to match the identifier may modify the identity risk score upward (i.e., more confident) by a second amount. A variety of other identity risk score considerations may also be factored into the calculation of the new subscriber's identity risk score. Once the identity risk score has been determined instep 460, the service may proceed to step 425 to determine whether unresolved negative experiences exist. - If, however, no match of the identifier is found in
steps step 465. In one instance, the identity risk score may be set to a relatively low value since the service provider is not able to match the subscriber to any previous subscriber's in the service's database. One of ordinary skill in the art will appreciate that an identity risk score may be calculated in a variety of manners and taking into consideration a multitude of factors. For example, the confidence level that is received from the identity service may serve to increase or decrease a subscriber's identity risk score. Once the identity risk score is set, the subscriber may proceed to use the service. - Once a subscriber has enrolled and a new subscriber entry has been created in a service provider's database, the subscriber may proceed to perform a variety of functions, unless blocked as a result of unresolved negative experiences and as allowed by the identity risk score. In one example, a subscriber may wish to add financial account information to his or her account. The financial account information may identify an account from which funds may be obtained for paying for various services, products, bills and the like.
-
FIG. 5 is a flowchart illustrating a method for modifying an identity risk score associated with a subscriber adding new financial account information. Instep 500, a request may be received from a subscriber to add a financial account to his or her service account. The request may include information such as a type of financial account (e.g., checking, money market, credit), financial institution name, routing transit number, account number, and the like. Using this submitted information, a service provider may determine whether the financial account already exists in the database instep 505. For example, the service provider may compare the financial account information submitted with existing financial accounts that are stored in the database. If a matching financial account is found instep 510, the service provider may further determine whether the account is associated with the same subscriber identifier or with the same group instep 515. Types of groups may include a household group (i.e., a group of individuals having a family relationship), a friend group, a business group, and a social group among others. In short, a group may be defined based on one or more types of relationships between entities. Determining whether two subscribers are associated with the same group may involve requesting a group identifier from an identity service. If the group identifier associated with each subscriber adding the financial account and the subscriber already having the financial account match, the service may determine that the two subscribers belong to the same group. In one example, the service provider may compare address, telephone number, surnames and other information to determine whether the two subscribers are related to the same household group. A variety of other processes may be used in addition to or in place of the above described methods for determining whether two subscribers are associated with the same group. - If, in
step 515, the service provider determines that the subscribers have the same identifier and/or are related to the same group, the service provider may increase the first subscriber's identity risk score by a specified amount instep 520. The increase may reflect an increased certainty of the first subscriber's identity derived based on known relationships between subscribers and financial account information. If, however, the service provider determines that there is no match in identifier or group, the request for adding a financial account may be submitted for research and resolution instep 525. In one example, the request may be submitted for manual resolution. Manual resolution may include submitting the request to service provider personnel who may manually research correspondences between the financial account and the subscriber. Alternatively, research and resolution of the discrepancy may be handled by one or more automated systems. For example, a research and resolution system may transmit an automated e-mail message to the financial institution holding the financial account to request verification. - If a financial account match is not found in
step 510, the service provider may submit the financial account information to an identity service for verification that the account is associated with the requesting subscriber instep 527. The request may include the subscriber's universal or temporary identifier along with the financial account information. If the identity service is able to confirm the association instep 530, the subscriber's identity risk score may be increased instep 535. Instep 540, the service provider may further determine whether an updated identifier has been received from the identity service. An identifier may be updated if the identifier is temporary and the identity service is able to match a universal identifier to the subscriber based on new information. For example, in the above instance, the financial account information may be used to confirm a subscriber's identity and association with a universal identifier. Accordingly, a temporary identifier that was previously issued may be replaced or updated by the universal identifier. As discussed, a temporary identifier may be assigned if an identifier associated with a subscriber's information could not be found by the identity service. If an updated identifier is received, the subscriber's identifier may be replaced with the updated identifier instep 545. - According to one or more aspects, once the subscriber identifier is updated in
step 545, the service provider may optionally determine whether the updated identifier is associated with any unresolved negative experiences.FIG. 8 is a flowchart illustrating a method for determining whether unresolved negative experiences exist. Instep 800, a service provider may compare the received updated identifier with the subscriber database to determine whether any other subscriber entries exist with the same identifier. Instep 805, the service provider may determine whether any matching entries were found. If not, the process may end there or proceed to another step in the underlying process (e.g., step 550 ofFIG. 5 ). If, however, the service provider finds one or more matches to the updated identifier, the service provider may determine whether those subscriber entries associated with the matching identifier are associated with unresolved negative experiences instep 810. If no unresolved negative experiences are found, the process may end or proceed to another step in the underlying process (e.g., step 550 ofFIG. 5 ). - If, on the other hand, unresolved negative experiences are found, the service provider may request that the subscriber contact customer service in order to resolve the issue(s) in
step 820. In one or more instances, a following step might not be performed until the negative experiences have been resolved. For example, a subscriber's identity risk score might not be increased (e.g., step 550 ofFIG. 5 ) until the unresolved negative experiences are cleared. - Referring again to
FIG. 5 , once a subscriber's identifier has been updated, the subscriber's identity risk score may be increased instep 550. Further, instep 555, the service provider may request account confirmation from the subscriber if the subscriber's association with the financial account information is not confirmed by the identity service instep 630. The account confirmation process may include various confirmation algorithms including depositing a random amount of money into the financial account and asking the subscriber to verify that amount. Other confirmation algorithms that may be used are disclosed in U.S. patent application Ser. No. 10/284,462, entitled “System and Method for Verifying a Financial Instrument Using a Preferred Single Values” and filed on Oct. 31, 2002 and U.S. Pat. No. 7,177,846, entitled “A Technique For Account Authentication” and issued on Feb. 13, 2007, both of which are hereby incorporated by reference in their entirety. If the account is confirmed by the subscriber (as determined in step 660), the subscriber's identity risk score may be increased in step 665. If, however, the account is not confirmed, the subscriber's identity risk score may be decreased in step 670. - The modification of an identity risk score based on a subscriber's interaction with a service provider provides a more accurate and flexible method of determining the certainty associated with a subscriber's identity.
-
FIG. 6 is a flowchart illustrating a method for adjusting an identity risk score based on a service provider's ability to confirm payee information association with the subscriber. Instep 600, a service provider may receive a request from the subscriber to add a payee to his account. A payee may correspond to a biller, a merchant, another individual or the like, typically providing goods or a service to the subscriber. Instep 605, the service provider may compare the payee information to existing payee information associated with the same identifier and/or group. If a match is found instep 610, the identity risk score associated with the subscriber may be increased instep 612. If however, a match is not found, the service provider may determine whether an association between the payee and the subscriber can be confirmed by an identity service instep 615. For example, in some instances, payees might only be confirmed by an identity service if the payees are major creditors. The determination ofstep 615 may be performed by comparing the payee information to a list of verifiable payees or category of payees. If the payee information cannot be verified using an identity service or known information (i.e., information stored in the service provider's database), the process may terminate without increasing or decreasing the subscriber's identity risk score. - If, however, the payee information can be verified with an identity service in
step 615, a request for confirmation may be sent to the identity service instep 620. The request may include the subscriber's universal or temporary identifier as well as the payee information. Instep 625, the service provider may determine whether the identity service was able to confirm an association between the payee and the subscriber. If so, the subscriber's identity risk score may be increased instep 630. In addition, the service provider may determine whether an updated identifier has been identified by and received from the identity service instep 635. Again, an updated identifier may be received if the subscriber's identity was previously indeterminable or unconfirmed. In such instances, a temporary identifier may be issued by an identity service. Additionally or alternatively, an updated identifier may also be received if a subscriber was mistakenly identified by a first identifier. Upon determining a correct second identifier, the identity service may provide an update to the service provider with the second identifier. If an updated identifier is received, the service provider may update the database with the new identifier information instep 640. Furthermore, the service provider may increase the identity risk score associated with the subscriber instep 645. - Additionally, in one or more configurations, the service provider may further determine whether the updated identifier is associated with unresolved negative experiences. As discussed above,
FIG. 8 is a flowchart illustrating a method for identifying and managing unresolved negative experiences. Accordingly, such a method may be used once an updated is received and the database has been updated, e.g., as shown instep 640 ofFIG. 6 . - Referring again to
FIG. 6 , if an association between the payee and the subscriber cannot be confirmed by the identity service instep 625, the identity risk score associated with the subscriber may be decreased or reduced instep 650. The amount by which an identity risk score is increased or decreased may be determined in a variety of manners including predefined algorithms and/or manual evaluations that are known in the art. - As discussed above, in many instances, an identifier associated with a subscriber may be subsequently updated or replaced by a new identifier. In one example, a temporary identifier issued for a subscriber may be replaced by a universal identifier upon verification of the subscriber's identity. The updating of a subscriber's identifier may involve other processes including updating the identity risk score associated with the subscriber and determining whether unresolved negative experiences exist.
-
FIG. 7 is a flowchart illustrating a method for updating an identifier associated with a subscriber and modifying an identity risk score of the subscriber based on the updated identifier. Instep 700, a service provider may receive an updated identifier. The updated identifier may be received from an identity service and may further include identification of the old identifier (e.g., a temporary identifier) the new updated identifier (e.g., a universal identifier) is to replace. Instep 705, the financial service may identify the corresponding subscriber entry in the database using the old identifier. Once identified, the subscriber entry may be updated with the new identifier instep 710. Instep 715, the identity risk score associated with the subscriber may be increased. In one or more arrangements, if the new identifier corresponds to a confirmed universal identifier, the identity risk score of a subscriber may be increased in light of the higher level of confidence or certainty associated with a universal identifier (as compared to a temporary identifier). - In
step 720, the service provider may further search for one or more subscriber entries that match the updated identifier. If a match is found instep 725, the service provider may determine whether the matched subscriber entry includes any unresolved negative experiences instep 730. If unresolved negative experiences are indicated, the subscriber whose identifier was updated may be blocked from using the functions and services provided by the service provider instep 735 and asked to contact customer service to resolve the negative experiences instep 740. Unresolved negative experiences may include inability to collect funds associated with a payment performed on behalf of the subscriber, non-payment of a bill, poor credit, legal actions taken against the subscriber and the like. If, on the other hand, either no identifier match was found (step 725) or no unresolved negative experiences were identified (step 730), the process may end and the subscriber may be allowed access to the service provider's functions. - Identity risk scores may be restricted to values between an upper and a lower threshold. As such, identity risk scores might not be able to be increased above a certain ceiling and/or decreased below a certain floor. Additionally, trends in identity risk score modifications may be factored into any determination of future increases or decreases of the score and/or any interpretations of the identity risk score. For example, if a subscriber has had a trend of three (3) consecutive increases in identity risk score, a high level of certainty may attributed to the identity risk score even if the identity risk score is still relatively low. In another example, if a subscriber has a relatively high identity risk score but has received downward adjustments the two (2) previous instances, there may be concern that the subscriber's identity has been stolen or that the identity risk score should be interpreted with more caution.
- While the discussion thus far has generally been directed toward modification of an identity risk score based on various types of transactions, an identity risk score may also have impacts on types of transactions and functions available to a subscriber. In one or more configurations, having a identity risk score higher or lower than a certain threshold may affect the types and scope of functionality available.
- For example, subscribers having a low identity risk score (i.e., lower than the threshold) may be restricted to the types of payees that they may add (e.g., to just reversible merchants), limited to the number of payments that can be submitted in a certain period of time, limited to a maximum amount of payment and/or restrictions in other functional aspects (e.g., ability to modify/view profile information, bill information, payee information, payment history).
- According to one or more aspects, upon processing a subscriber's login information and determining that the subscriber's identity score is below the predefined threshold, the restricted functionalities may be grayed out or otherwise made unavailable.
FIG. 9 illustrates a user interface showing awelcome screen 900 for a service provider with functionality restricted from subscriber use. For example,view bill option 905 is grayed out, indicating an unavailability of that function. Similarly, a viewpayment history option 910 is also grayed out to indicate to the subscriber that this function is not available to him or her (HDD→ You might not want to show the latter grayed out, as then the subscriber is caught in a Catch-22. One way to improve the score is to submit a financial account that's recognized—but that's done through modifying personal info!). - In another example, a subscriber may be restricted from viewing a bill, viewing or modifying his or her profile, viewing or modifying payee information and/or viewing payment history if his or her identity risk score is not sufficiently high. Similarly, payment requests may be denied if the subscriber's identity risk does not meet the threshold. Alternatively or additionally, a subscriber's payment request may always be accepted by a service provider regardless of the subscriber's identity risk score. However, in accepting the payment request, the request may be flagged according to the subscriber's identity risk score. As such, when the payment request is submitted for processing, the payment request might not be processed if the subscriber's identity risk score is too low.
-
FIG. 10 is a flowchart illustrating a method for identifying functionality available to a subscriber based on the subscriber's identity risk score. Instep 1000, a subscriber may login to a service provider. Instep 1005, the service provider may extract an identity risk score associated with the subscriber from the service provider's database. Instep 1010, the identity risk score may be compared to one or more predefined identity risk score thresholds to determine whether the subscriber's identity risk score exceeds the one or more thresholds. If the subscriber's identity risk score exceeds or meets the one or more thresholds (as determined in step 1015), the service provider may present a first set of available functions to the subscriber instep 1020. In contrast, if the subscriber's identity risk score does not exceed the one or more thresholds, the service provider may provide the subscriber with a second or restricted set of available functions instep 1025. In one or more arrangements, the second or restricted set of available functions may be a subset of less than all of the functions included in the first set of available functions. Further, according to one or more aspects, a risk value determined based on the identity risk score and one of a credit risk score and a fraud risk score may be used in place of or in addition to the subscriber's identity risk score. For example, a risk value may be a combination of a subscriber's identity risk score and his credit risk score, where the identity risk score is weighed twice as much as the credit risk score. - In one or more arrangements, multiple thresholds may be defined for accessing functions provided by a service provider. That is rather than using a single threshold to define two sets of functionality, multiple thresholds may be used to define more than two sets of functionality available based on identity risk score. Accordingly, as a subscriber's identity risk score increases, additional functions may be added to a set of available functions provided the identity risk score meets new thresholds.
FIG. 11 illustrates an identity risk score scale 1100 showingmultiple score thresholds -
FIG. 12 is a flowchart illustrating a method for obtaining supplemental authentication information if one or more transactions are rejected by a financial commerce service. Instep 1200, a subscriber may be informed that a requested transaction has been denied. For example, processing of a subscriber's payment request may be denied if the subscriber's identity risk score is too low. In such a case, the service may prompt the subscriber with a denial message. Instep 1205, the service provider may provide an opportunity for the subscriber to provide further authentication information relating to his or her identity. The service provider may, in one or more arrangements, prompt the user for additional authentication information such as mother's maiden name or previous address. Alternatively or additionally, the user or another entity, such as the user's sponsor may be allowed to select the manner in which he or she provides supplemental authentication information. Various manners of providing supplemental authentication information may include a one-time password or token, an out-of-wallet question and/or customer care intervention via e-mail or phone. Instep 1210, the service provider may determine whether the user has satisfactorily authenticated his identity based on the supplemental information. If the subscriber has authenticated his identity, the subscriber's identity risk score may be raised instep 1215 and provided access to the previously denied functionality in step 1220 (e.g., the payment request may be released for processing). - If the subscriber fails to provide satisfactory authentication in
step 1205, the service provider may present the subscriber with a final denial of service instep 1225. Alternatively, a service may provide a subscriber with multiple opportunities (e.g., 3) before providing a final denial of service. - Further, in one or more configurations, a subscriber's identity risk score may be raised or lowered based on a login profile and/or other login validation information. A login profile or login validation information may include personal information (e.g., security questions), patterns of behavior (e.g., when a subscriber typically logs in or performs various activities), biometric data (e.g., fingerprints or voiceprints) and the like. Thus, if a subscriber is able to login successfully by validating one or more pieces of information stored in the login profile, the subscriber's identity risk score may be increased (or decreased depending on the score interpretation). In one or more examples, login validation may further be performed using a key fob or Radio Frequency ID (RFID) device. That is, if a subscriber is able to validate his or her login using a valid key fob or RFID device, the subscriber's identity risk score may increased or decreased accordingly.
- The methods and features recited herein may further be implemented through any number of computer readable media that are able to store computer readable instructions. Examples of computer readable media that may be used include RAM (e.g.,
RAM 134 ofFIG. 1 ), ROM (e.g.,ROM 136 ofFIG. 1 ), EEPROM, flash memory or other memory technology, CD-ROM, DVD or other optical disk storage, magnetic cassettes, magnetic tape, magnetic storage and the like. For example, the methods and features may be implemented as software stored in a CD-ROM or DVD. Upon installation on a device such ascomputing device 105 ofFIG. 1 , instructions may be loaded into RAM and executed by a processor (e.g.,processor 130 ofFIG. 1 ) - Further, the methods and features recited herein may be implemented using a variety of devices and/or system. Referring to
FIG. 1 , a processor such asprocessor 130 may be used to execute the instructions stored in the computer readable media. Data that needs to be stored, e.g., subscriber entries, may be stored in a local database such asstorage 132 and/or on a remote device such asstorage database 115. The execution of various instructions may also span different devices in a networked environment (e.g., networked system 100). In one example,device 105 may be responsible for managing the database of subscription entries while computingdevice 110 is configured to initialize, update and/or otherwise modify subscriber identity risk scores. - Aspects described herein have been discussed in terms of exemplary embodiments thereof. Numerous other embodiments, modifications and variations within the scope and spirit of the appended claims will occur to persons of ordinary skill in the art from a review of this disclosure.
Claims (47)
1. A method comprising:
establishing an identity risk score for a subscriber of a financial service, wherein the identity risk score corresponds to a degree of certainty to which an identity of the subscriber is able to be verified;
receiving a transaction on behalf of the subscriber, wherein the transaction includes information that has not been previously received in association with the subscriber; and
altering the identity risk score as a result of processing the received transaction information.
2. The method of claim 1 , further comprising:
determining a set of functionality available to the subscriber based on the altered identity risk score; and
providing the set of functionality to the subscriber.
3. The method of claim 2 , wherein the set of functionality available includes at least one of: (i) enrollment processing, (ii) login processing, (iii) processing a request to view a bill, (iv) payment request processing, (v) payment processing, (vi) processing a request to view or modify subscriber profile information, (vii) processing a request to view or modify payee information, (viii) processing a request to view payment history, and (ix) collections processing.
4. The method of claim 2 , wherein determining the set of functionality available to the subscriber based on the altered identity risk score includes comparing a value, derived from at least the altered identity risk score, with a threshold value.
5. The method of claim 4 , wherein the value is further derived from the altered identity risk score in combination with at least one of: (i) a fraud risk score and (ii) a credit risk score.
6. The method of claim 1 , wherein establishing the identity risk score for the subscriber includes matching the subscriber to a second subscriber of the financial service.
7. The method of claim 6 , further comprising:
determining whether the second subscriber is associated with an unresolved negative experience; and
in response to determining that the second subscriber is associated with the unresolved negative experience, denying at least one service function of the financial service to the subscriber.
8. The method of claim 1 , wherein establishing the identity risk score for the subscriber includes:
at least one of receiving an identifier associated with the subscriber from a third party identity service, and generating the identifier associated with the subscriber; and
storing the identifier in association with the subscriber in a database.
9. The method of claim 8 , further including:
removing at least one item of sensitive information associated with the subscriber from the database.
10. The method of claim 1 , wherein the information is first information and wherein establishing the identity risk score comprises:
transmitting second information associated with the subscriber to a third party identity service; and
receiving a confidence level from the third party identity service, wherein the confidence level corresponds to the degree of certainty to which the identity of the subscriber is able to be verified.
11. The method of claim 1 , wherein the received transaction information includes an account identifier of a financial account and wherein processing the received transaction information includes determining that a second subscriber of the financial service is associated with the financial account.
12. The method of claim 11 , wherein determining that the second subscriber of the financial service is associated with the financial account is performed based on at least one of: (i) an identifier identifying an entity associated with the financial account and (ii) a group identifier identifying a group that includes the subscriber and the second subscriber.
13. The method of claim 11 , wherein processing the received transaction information includes:
transmitting the account identifier and other information associated with the subscriber to a third party identity service;
receiving a response from the third party identity service indicating whether an association between the subscriber and the financial account corresponding to the account identifier exists; and
determining that the response indicates that the association between the subscriber and the financial account exists, wherein altering the identity risk score includes increasing the identity risk score.
14. The method of claim 11 , wherein processing the received transaction information includes:
transmitting the account identifier and other information associated with the subscriber to a third party identity service;
receiving a response from the third party identity service indicating that an association between the subscriber and the financial account corresponding to the account identifier does not exist, wherein altering the identity risk score includes decreasing the identity risk score.
15. The method of claim 1 , wherein altering the identity risk score includes one of: increasing the identity risk score and decreasing the identity risk score.
16. The method of claim 1 , wherein the received transaction information includes new or revised payee information.
17. The method of claim 1 , wherein processing the received transaction information includes:
determining whether a second subscriber of the financial service is associated with the received transaction information based on at least one of: (i) an identifier identifying an entity corresponding to the subscriber and (ii) a group identifier identifying a group that includes the subscriber and the second subscriber;
transmitting the received transaction information and other information associated with the subscriber to a third party identity service; and
receiving a response from the third party identity service indicating whether an association between the subscriber and the received transaction information exists,
wherein altering the identity risk score includes increasing the identity risk score in response to determining that the response indicates the association exists.
18. The method of claim 1 , further comprising:
receiving a first identifier from a third party identity service;
storing the first identifier in association with the subscriber;
receiving the first identifier and a second identifier from the third party identity service;
identifying the subscriber on the basis of the first identifier; and
storing the second identifier in association with the subscriber.
19. The method of claim 18 , wherein the steps of receiving a first identifier, storing the first identifier and receiving the first identifier and the second identifier are associated with establishing the identity risk score and wherein the steps of identifying the subscriber and storing the second identifier are associated with altering the identity risk score.
20. The method of claim 1 , wherein altering the identity risk score is only performed if an altered identity risk score drops below a predefined maximum identity risk score.
21. A method for determining a set of functions available to a subscriber comprising:
determining a risk value associated with a subscriber, wherein the risk value is based on at least two of: (i) an identity risk score associated with the subscriber, (ii) a credit risk score associated with the subscriber, and (iii) a fraud risk score associated with the subscriber;
determining whether the risk value is above a threshold; and
providing the subscriber with a first set of one or more available functions if the risk value is above the threshold.
22. The method of claim 21 wherein a first of the at least two risk scores is weighted differently from a second of the at least two risk scores.
23. The method of claim 21 , further comprising providing the subscriber with a second set of one or more available functions if the risk value is below the threshold, wherein the first set of one or more available functions includes at least one function not in the second set of one or more available functions.
24. A system comprising:
a processor; and
memory storing computer readable instructions that, when executed by the processor, cause the system to perform a method comprising:
establishing an identity risk score for a subscriber of a financial service, wherein the identity risk score corresponds to a degree of certainty to which an identity of the subscriber is able to be verified;
receiving a transaction on behalf of the subscriber, wherein the transaction includes information that has not been previously received in association with the subscriber; and
altering the identity risk score as a result of processing the received transaction information.
25. The system of claim 24 , wherein the memory further includes computer readable instructions for:
determining a set of functionality available to the subscriber based on the altered identity risk score; and
providing the set of functionality to the subscriber.
26. The system of claim 25 , wherein the set of functionality available includes at least one of: (i) enrollment processing, (ii) login processing, (iii) processing a request to view a bill, (iv) payment request processing, (v) payment processing, (vi) processing a request to view or modify subscriber profile information, (vii) processing a request to view or modify payee information, (viii) processing a request to view payment history, and (ix) collections processing.
27. The system of claim 25 , wherein determining the set of functionality available to the subscriber based on the altered identity risk score includes comparing a value, derived from at least the altered identity risk score, with a threshold value.
28. The system of claim 27 , wherein the value is further derived from the altered identity risk score in combination with at least one of: (i) a fraud risk score and (ii) a credit risk score.
29. The system of claim 24 , wherein establishing the identity risk score for the subscriber includes matching the subscriber to a second subscriber of the financial service.
30. The system of claim 29 , wherein the memory further includes computer readable instructions for:
determining whether the second subscriber is associated with an unresolved negative experience; and
in response to determining that the second subscriber is associated with the unresolved negative experience, denying at least one service function of the financial service to the subscriber.
31. The system of claim 24 , wherein establishing the identity risk score for the subscriber includes at least one of:
receiving an identifier associated with the subscriber from a third party identity service; and
generating the identifier associated with the subscriber.
32. The system of claim 24 , wherein the information is first information and wherein establishing the identity risk score comprises:
transmitting second information associated with the subscriber to a third party identity service; and
receiving a confidence level from the third party identity service, wherein the confidence level corresponds to the degree of certainty to which the identity of the subscriber is able to be verified.
33. The system of claim 24 , wherein establishing the identity risk score includes:
receiving an identifier associated with the subscriber;
storing the identifier in associating with the subscriber in a database; and
removing at least one item of sensitive information associated with the subscriber from the database.
34. The system of claim 24 , wherein the received transaction information includes an account identifier of a financial account and wherein processing the received transaction information includes determining that a second subscriber of the financial service is associated with the financial account.
35. The system of claim 34 , wherein determining that the second subscriber of the financial service is associated with the financial account is performed based on at least one of: (i) an identifier identifying an entity associated with the financial account and (ii) a group identifier identifying a group that includes the subscriber and the second subscriber.
36. The system of claim 34 , wherein processing the received transaction information includes:
transmitting the account identifier and other information associated with the subscriber to a third party identity service;
receiving a response from the third party identity service indicating whether an association between the subscriber and the financial account corresponding to the account identifier exists; and
determining that the response indicates that the association between the subscriber and the financial account exists, wherein altering the identity risk score includes increasing the identity risk score.
37. The system of claim 34 , wherein processing the received transaction information includes:
transmitting the account identifier and other information associated with the subscriber to a third party identity service;
receiving a response from the third party identity service indicating that an association between the subscriber and the financial account corresponding to the account identifier does not exist, wherein altering the identity risk score includes decreasing the identity risk score.
38. The system of claim 24 , wherein altering the identity risk score includes one of: increasing the identity risk score and decreasing the identity risk score.
39. The system of claim 24 , wherein the received transaction information includes new or revised payee information.
40. The system of claim 24 , wherein processing the received transaction information includes:
determining whether a second subscriber of the financial service is associated with the received transaction information based on at least one of: (i) an identifier identifying an entity corresponding to the subscriber and (ii) a group identifier identifying a group that includes the subscriber and the second subscriber;
transmitting the received transaction information and other information associated with the subscriber to a third party identity service; and
receiving a response from the third party identity service indicating whether an association between the subscriber and the received transaction information exists,
wherein altering the identity risk score includes increasing the identity risk score in response to determining that the response indicates the association exists.
41. The system of claim 24 , further comprising:
receiving a first identifier from a third party identity service;
storing the first identifier in association with the subscriber;
receiving the first identifier and a second identifier from the third party identity service;
identifying the subscriber on the basis of the first identifier; and
storing the second identifier in association with the subscriber.
42. The system of claim 41 , wherein the steps of receiving a first identifier, storing the first identifier and receiving the first identifier and the second identifier are associated with establishing the identity risk score and wherein the steps of identifying the subscriber and storing the second identifier are associated with altering the identity risk score
43. The system of claim 24 , wherein altering the identity risk score is only performed if an altered identity risk score drops below a predefined maximum identity risk score.
44. A system comprising:
a processor; and
memory storing computer readable instructions that, when executed by a processor, cause the system to perform a method including:
determining a risk value associated with a subscriber, wherein the risk value is based on at least two of: (i) an identity risk score associated with the subscriber, (ii) a credit risk score associated with the subscriber, and (iii) a fraud risk score associated with the subscriber;
determining whether the risk value is above a threshold; and
providing the subscriber with a first set of one or more available functions if the risk value is above the threshold
45. The system of claim 44 wherein a first of the at least two risk scores is weighted differently from a second of the at least two risk scores.
46. The system of claim 44 , wherein the memory further includes instructions for providing the subscriber with a second set of one or more available functions if the risk value is below the threshold, wherein the first set of one or more available functions includes at least one function not in the second set of one or more available functions.
47. A system comprising:
means for establishing an identity risk score for a subscriber of a financial service, wherein the identity risk score corresponds to a degree of certainty to which an identity of the subscriber is able to be verified;
means for receiving a transaction on behalf of the subscriber, wherein the transaction includes information that has not been previously received in association with the subscriber; and
means for altering the identity risk score as a result of processing the received transaction information.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/769,282 US20090006230A1 (en) | 2007-06-27 | 2007-06-27 | Identity Risk Scoring |
US14/617,622 US10049359B2 (en) | 2007-06-27 | 2015-02-09 | Identity risk scoring |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/769,282 US20090006230A1 (en) | 2007-06-27 | 2007-06-27 | Identity Risk Scoring |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/617,622 Continuation US10049359B2 (en) | 2007-06-27 | 2015-02-09 | Identity risk scoring |
Publications (1)
Publication Number | Publication Date |
---|---|
US20090006230A1 true US20090006230A1 (en) | 2009-01-01 |
Family
ID=40161742
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/769,282 Abandoned US20090006230A1 (en) | 2007-06-27 | 2007-06-27 | Identity Risk Scoring |
US14/617,622 Active 2029-02-28 US10049359B2 (en) | 2007-06-27 | 2015-02-09 | Identity risk scoring |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/617,622 Active 2029-02-28 US10049359B2 (en) | 2007-06-27 | 2015-02-09 | Identity risk scoring |
Country Status (1)
Country | Link |
---|---|
US (2) | US20090006230A1 (en) |
Cited By (122)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070012757A1 (en) * | 2005-07-14 | 2007-01-18 | First Data Corporation | Identity verification switch |
US20070043577A1 (en) * | 2005-08-16 | 2007-02-22 | Sheldon Kasower | Apparatus and method of enabling a victim of identity theft to resolve and prevent fraud |
US20080288299A1 (en) * | 2006-10-31 | 2008-11-20 | Genmobi Technologies, Inc. | System and method for user identity validation for online transactions |
US20100107244A1 (en) * | 2008-10-24 | 2010-04-29 | International Business Machines Corporation | Trust Event Notification and Actions Based on Thresholds and Associated Trust Metadata Scores |
US20100106560A1 (en) * | 2008-10-24 | 2010-04-29 | International Business Machines Corporation | Generating Composite Trust Value Scores Based on Assignable Priorities, Atomic Metadata Values and Associated Composite Trust Value Scores |
US20100106558A1 (en) * | 2008-10-24 | 2010-04-29 | International Business Machines Corporation | Trust Index Framework for Providing Data and Associated Trust Metadata |
US20100106559A1 (en) * | 2008-10-24 | 2010-04-29 | International Business Machines Corporation | Configurable Trust Context Assignable to Facts and Associated Trust Metadata |
US20110016534A1 (en) * | 2009-07-16 | 2011-01-20 | Palo Alto Research Center Incorporated | Implicit authentication |
US20110137760A1 (en) * | 2009-12-03 | 2011-06-09 | Rudie Todd C | Method, system, and computer program product for customer linking and identification capability for institutions |
US20110137788A1 (en) * | 2009-12-04 | 2011-06-09 | Merkle Robert A | Systems and methods for evaluating the ability of borrowers to repay loans |
US20110166869A1 (en) * | 2010-01-04 | 2011-07-07 | Bank Of America Corporation | Providing an Indication of the Validity of the Identity of an Individual |
US20110265162A1 (en) * | 2010-04-21 | 2011-10-27 | International Business Machines Corporation | Holistic risk-based identity establishment for eligibility determinations in context of an application |
US8175889B1 (en) | 2005-04-06 | 2012-05-08 | Experian Information Solutions, Inc. | Systems and methods for tracking changes of address based on service disconnect/connect data |
US8195549B2 (en) | 2002-09-21 | 2012-06-05 | Consumerinfo.Com, Inc. | Systems and methods of on-line credit information monitoring and control |
US8276157B2 (en) | 2009-10-23 | 2012-09-25 | International Business Machines Corporation | Monitoring information assets and information asset topologies |
US8312033B1 (en) | 2008-06-26 | 2012-11-13 | Experian Marketing Solutions, Inc. | Systems and methods for providing an integrated identifier |
US20130060600A1 (en) * | 2011-09-06 | 2013-03-07 | Aon Benfield Global, Inc. | Risk reporting log |
US8464939B1 (en) | 2007-12-14 | 2013-06-18 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US8473318B2 (en) * | 2011-07-19 | 2013-06-25 | Bank Of America Corporation | Risk score determination |
US8478674B1 (en) | 2010-11-12 | 2013-07-02 | Consumerinfo.Com, Inc. | Application clusters |
US20130185180A1 (en) * | 2012-01-18 | 2013-07-18 | Bank Of America Corporation | Determining the investigation priority of potential suspicious events within a financial institution |
US20130262213A1 (en) * | 2012-04-03 | 2013-10-03 | Prashant Jamkhedkar | Systems, Methods, And Computer Program Products Providing Payment With Non-Traditional Sources Of Value |
US8595219B1 (en) | 2012-05-16 | 2013-11-26 | Trans Union, Llc | System and method for contextual and free format matching of addresses |
US8618913B1 (en) * | 2009-10-19 | 2013-12-31 | Emc Corporation | Radio frequency identification enabled mobile device |
US8631486B1 (en) * | 2009-03-31 | 2014-01-14 | Emc Corporation | Adaptive identity classification |
US8781953B2 (en) | 2003-03-21 | 2014-07-15 | Consumerinfo.Com, Inc. | Card management system and method |
US8782217B1 (en) | 2010-11-10 | 2014-07-15 | Safetyweb, Inc. | Online identity management |
US8856894B1 (en) | 2012-11-28 | 2014-10-07 | Consumerinfo.Com, Inc. | Always on authentication |
US8972400B1 (en) | 2013-03-11 | 2015-03-03 | Consumerinfo.Com, Inc. | Profile data management |
US8978159B1 (en) * | 2012-12-31 | 2015-03-10 | Emc Corporation | Methods and apparatus for mediating access to derivatives of sensitive data |
US20150095986A1 (en) * | 2013-09-30 | 2015-04-02 | Bank Of America Corporation | Identification, Verification, and Authentication Scoring |
EP2740067A4 (en) * | 2011-08-05 | 2015-04-29 | Safefaces LLC | Methods and systems for identity verification |
US20150154600A1 (en) * | 2013-12-04 | 2015-06-04 | Moneygram International, Inc. | Method and Apparatus for Risk Identification and Mitigation |
US9106691B1 (en) | 2011-09-16 | 2015-08-11 | Consumerinfo.Com, Inc. | Systems and methods of identity protection and management |
US20150234830A1 (en) * | 2012-09-19 | 2015-08-20 | Check Yourself Llc | Method and system for creating and managing a verified online profile |
US9147042B1 (en) | 2010-11-22 | 2015-09-29 | Experian Information Solutions, Inc. | Systems and methods for data verification |
US9171306B1 (en) | 2010-03-29 | 2015-10-27 | Bank Of America Corporation | Risk-based transaction authentication |
CN105009132A (en) * | 2013-03-11 | 2015-10-28 | 惠普发展公司,有限责任合伙企业 | Event correlation based on confidence factor |
US9210156B1 (en) * | 2014-06-16 | 2015-12-08 | Lexisnexis Risk Solutions Inc. | Systems and methods for multi-stage identity authentication |
US9219723B1 (en) | 2013-12-20 | 2015-12-22 | Certify Global Inc. | Source device for systems and methods of verifying an authentication using dynamic scoring |
US9256904B1 (en) | 2008-08-14 | 2016-02-09 | Experian Information Solutions, Inc. | Multi-bureau credit file freeze and unfreeze |
US9282090B2 (en) | 2011-08-05 | 2016-03-08 | Safefaces LLC | Methods and systems for identity verification in a social network using ratings |
US9338658B1 (en) * | 2014-09-25 | 2016-05-10 | Sprint Communications Company L.P. | Telecommunication service provider customer account portal for strategic partners |
USD759690S1 (en) | 2014-03-25 | 2016-06-21 | Consumerinfo.Com, Inc. | Display screen or portion thereof with graphical user interface |
USD759689S1 (en) | 2014-03-25 | 2016-06-21 | Consumerinfo.Com, Inc. | Display screen or portion thereof with graphical user interface |
USD760256S1 (en) | 2014-03-25 | 2016-06-28 | Consumerinfo.Com, Inc. | Display screen or portion thereof with graphical user interface |
US9400589B1 (en) | 2002-05-30 | 2016-07-26 | Consumerinfo.Com, Inc. | Circular rotational interface for display of consumer credit information |
US9406065B2 (en) | 2014-03-04 | 2016-08-02 | Bank Of America Corporation | Customer token preferences interface |
US9406085B1 (en) | 2013-03-14 | 2016-08-02 | Consumerinfo.Com, Inc. | System and methods for credit dispute processing, resolution, and reporting |
US9424572B2 (en) | 2014-03-04 | 2016-08-23 | Bank Of America Corporation | Online banking digital wallet management |
US9443268B1 (en) | 2013-08-16 | 2016-09-13 | Consumerinfo.Com, Inc. | Bill payment and reporting |
US9477737B1 (en) | 2013-11-20 | 2016-10-25 | Consumerinfo.Com, Inc. | Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules |
US9525685B2 (en) | 2014-02-07 | 2016-12-20 | Bank Of America Corporation | User authentication based on other applications |
US9536263B1 (en) | 2011-10-13 | 2017-01-03 | Consumerinfo.Com, Inc. | Debt services candidate locator |
US9600817B2 (en) | 2014-03-04 | 2017-03-21 | Bank Of America Corporation | Foreign exchange token |
US9600844B2 (en) | 2014-03-04 | 2017-03-21 | Bank Of America Corporation | Foreign cross-issued token |
US9607336B1 (en) | 2011-06-16 | 2017-03-28 | Consumerinfo.Com, Inc. | Providing credit inquiry alerts |
US9628495B2 (en) | 2014-02-07 | 2017-04-18 | Bank Of America Corporation | Self-selected user access based on specific authentication types |
US20170109854A1 (en) * | 2015-10-14 | 2017-04-20 | Robert Wayne Birdsong | Methods and systems for managing access to a database |
US9639678B2 (en) | 2012-06-29 | 2017-05-02 | Microsoft Technology Licensing, Llc | Identity risk score generation and implementation |
CN106611133A (en) * | 2015-10-27 | 2017-05-03 | 阿里巴巴集团控股有限公司 | Risk identification method and equipment |
US20170126732A1 (en) * | 2014-12-11 | 2017-05-04 | Zerofox, Inc. | Social network security monitoring |
US9647999B2 (en) | 2014-02-07 | 2017-05-09 | Bank Of America Corporation | Authentication level of function bucket based on circumstances |
US9654541B1 (en) | 2012-11-12 | 2017-05-16 | Consumerinfo.Com, Inc. | Aggregating user web browsing data |
US9652633B2 (en) | 2014-11-25 | 2017-05-16 | Certify Global Inc. | Systems and methods of verifying an authenticated document biosignature |
US9710852B1 (en) | 2002-05-30 | 2017-07-18 | Consumerinfo.Com, Inc. | Credit report timeline user interface |
US9721268B2 (en) | 2014-03-04 | 2017-08-01 | Bank Of America Corporation | Providing offers associated with payment credentials authenticated in a specific digital wallet |
US9721248B2 (en) | 2014-03-04 | 2017-08-01 | Bank Of America Corporation | ATM token cash withdrawal |
US9721147B1 (en) | 2013-05-23 | 2017-08-01 | Consumerinfo.Com, Inc. | Digital identity |
US9729536B2 (en) | 2015-10-30 | 2017-08-08 | Bank Of America Corporation | Tiered identification federated authentication network system |
US9819680B2 (en) | 2014-02-07 | 2017-11-14 | Bank Of America Corporation | Determining user authentication requirements based on the current location of the user in comparison to the users's normal boundary of location |
US9830597B2 (en) | 2014-03-04 | 2017-11-28 | Bank Of America Corporation | Formation and funding of a shared token |
US9830646B1 (en) | 2012-11-30 | 2017-11-28 | Consumerinfo.Com, Inc. | Credit score goals and alerts systems and methods |
US9853959B1 (en) | 2012-05-07 | 2017-12-26 | Consumerinfo.Com, Inc. | Storage and maintenance of personal data |
US9870589B1 (en) | 2013-03-14 | 2018-01-16 | Consumerinfo.Com, Inc. | Credit utilization tracking and reporting |
US9892457B1 (en) | 2014-04-16 | 2018-02-13 | Consumerinfo.Com, Inc. | Providing credit data in search results |
US20180053164A1 (en) * | 2008-08-12 | 2018-02-22 | Branch Banking And Trust Company | Method for Retail On-Line Account Opening With Early Warning Methodology |
US20180121907A1 (en) * | 2016-10-27 | 2018-05-03 | Mastercard International Incorporated | Systems and methods for enhanced verification of new users to a network based service |
US9965606B2 (en) | 2014-02-07 | 2018-05-08 | Bank Of America Corporation | Determining user authentication based on user/device interaction |
US10002352B2 (en) | 2014-03-04 | 2018-06-19 | Bank Of America Corporation | Digital wallet exposure reduction |
US10043213B2 (en) * | 2012-07-03 | 2018-08-07 | Lexisnexis Risk Solutions Fl Inc. | Systems and methods for improving computation efficiency in the detection of fraud indicators for loans with multiple applicants |
US10102570B1 (en) | 2013-03-14 | 2018-10-16 | Consumerinfo.Com, Inc. | Account vulnerability alerts |
US10169761B1 (en) | 2013-03-15 | 2019-01-01 | ConsumerInfo.com Inc. | Adjustment of knowledge-based authentication |
US10176233B1 (en) | 2011-07-08 | 2019-01-08 | Consumerinfo.Com, Inc. | Lifescore |
US20190026827A1 (en) * | 2008-08-12 | 2019-01-24 | Branch Banking And Trust Company | Method for retail on-line account opening |
WO2019034991A1 (en) * | 2017-08-14 | 2019-02-21 | Patil Rajeev Shant | An automated system for processing visa applications and method thereof |
US10255598B1 (en) | 2012-12-06 | 2019-04-09 | Consumerinfo.Com, Inc. | Credit card account data extraction |
US10262364B2 (en) | 2007-12-14 | 2019-04-16 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US10268635B2 (en) | 2016-06-17 | 2019-04-23 | Bank Of America Corporation | System for data rotation through tokenization |
US10291644B1 (en) * | 2016-12-21 | 2019-05-14 | Symantec Corporation | System and method for prioritizing endpoints and detecting potential routes to high value assets |
US10313519B1 (en) * | 2012-08-28 | 2019-06-04 | West Corporation | Intelligent interactive voice response system for processing customer communications |
US10313480B2 (en) | 2017-06-22 | 2019-06-04 | Bank Of America Corporation | Data transmission between networked resources |
US10325314B1 (en) | 2013-11-15 | 2019-06-18 | Consumerinfo.Com, Inc. | Payment reporting systems |
US10360733B2 (en) | 2017-06-20 | 2019-07-23 | Bank Of America Corporation | System controlled augmented resource facility |
US10373240B1 (en) | 2014-04-25 | 2019-08-06 | Csidentity Corporation | Systems, methods and computer-program products for eligibility verification |
US10460367B2 (en) | 2016-04-29 | 2019-10-29 | Bank Of America Corporation | System for user authentication based on linking a randomly generated number to the user and a physical item |
US10511692B2 (en) | 2017-06-22 | 2019-12-17 | Bank Of America Corporation | Data transmission to a networked resource based on contextual information |
US10516567B2 (en) | 2015-07-10 | 2019-12-24 | Zerofox, Inc. | Identification of vulnerability to social phishing |
US10524165B2 (en) | 2017-06-22 | 2019-12-31 | Bank Of America Corporation | Dynamic utilization of alternative resources based on token association |
US10574662B2 (en) | 2017-06-20 | 2020-02-25 | Bank Of America Corporation | System for authentication of a user based on multi-factor passively acquired data |
US10581843B2 (en) | 2014-11-25 | 2020-03-03 | Certify Global Inc. | Systems and methods of verifying an authenticated document biosignature encoding restricted access information |
US10621657B2 (en) | 2008-11-05 | 2020-04-14 | Consumerinfo.Com, Inc. | Systems and methods of credit information reporting |
US10664936B2 (en) | 2013-03-15 | 2020-05-26 | Csidentity Corporation | Authentication systems and methods for on-demand products |
US10671749B2 (en) | 2018-09-05 | 2020-06-02 | Consumerinfo.Com, Inc. | Authenticated access and aggregation database platform |
US10685398B1 (en) | 2013-04-23 | 2020-06-16 | Consumerinfo.Com, Inc. | Presenting credit score information |
US10726113B2 (en) | 2014-11-25 | 2020-07-28 | Certify Global Inc. | Systems and methods of verifying an authenticated document biosignature glyph containing a selected image |
US10810218B2 (en) | 2011-10-14 | 2020-10-20 | Transunion, Llc | System and method for matching of database records based on similarities to search queries |
US10868824B2 (en) | 2017-07-31 | 2020-12-15 | Zerofox, Inc. | Organizational social threat reporting |
US10911234B2 (en) | 2018-06-22 | 2021-02-02 | Experian Information Solutions, Inc. | System and method for a token gateway environment |
US11005839B1 (en) * | 2018-03-11 | 2021-05-11 | Acceptto Corporation | System and method to identify abnormalities to continuously measure transaction risk |
US20210174358A1 (en) * | 2013-11-27 | 2021-06-10 | Apple Inc. | Credential provisioning for an electronic device |
US20210182373A1 (en) * | 2014-08-28 | 2021-06-17 | Facetec, Inc. | Method to add remotely collected biometric images or templates to a database record of personal information |
US11165801B2 (en) | 2017-08-15 | 2021-11-02 | Zerofox, Inc. | Social threat correlation |
US11238656B1 (en) | 2019-02-22 | 2022-02-01 | Consumerinfo.Com, Inc. | System and method for an augmented reality experience via an artificial intelligence bot |
US11252573B1 (en) | 2019-08-04 | 2022-02-15 | Acceptto Corporation | System and method for rapid check-in and inheriting trust using a mobile device |
US11315179B1 (en) | 2018-11-16 | 2022-04-26 | Consumerinfo.Com, Inc. | Methods and apparatuses for customized card recommendations |
US11329998B1 (en) | 2020-08-31 | 2022-05-10 | Secureauth Corporation | Identification (ID) proofing and risk engine integration system and method |
US11367323B1 (en) | 2018-01-16 | 2022-06-21 | Secureauth Corporation | System and method for secure pair and unpair processing using a dynamic level of assurance (LOA) score |
US11403400B2 (en) | 2017-08-31 | 2022-08-02 | Zerofox, Inc. | Troll account detection |
US11418527B2 (en) | 2017-08-22 | 2022-08-16 | ZeroFOX, Inc | Malicious social media account identification |
WO2022212306A1 (en) * | 2021-03-29 | 2022-10-06 | Allstate Insurance Company | Systems and methods for classification and time series calibration in identity health analysis |
US11941065B1 (en) | 2019-09-13 | 2024-03-26 | Experian Information Solutions, Inc. | Single identifier platform for storing entity data |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130091052A1 (en) * | 2011-10-07 | 2013-04-11 | Paal Kaperdal | Systems and methods for generating new accounts with a financial institution |
US10424011B2 (en) * | 2011-11-02 | 2019-09-24 | Gain Credit Holdings, Inc | Systems and methods for shared lending risk |
CN104836780B (en) * | 2014-02-12 | 2017-03-15 | 腾讯科技(深圳)有限公司 | Data interactive method, checking terminal, server and system |
US10469263B2 (en) * | 2016-06-06 | 2019-11-05 | Refinitiv Us Organization Llc | Systems and methods for providing identity scores |
CN108510399B (en) * | 2017-07-25 | 2020-11-24 | 平安科技(深圳)有限公司 | Method and device for automatically distributing insurance policy, computer equipment and storage medium |
US10944766B2 (en) * | 2017-09-22 | 2021-03-09 | Microsoft Technology Licensing, Llc | Configurable cyber-attack trackers |
US10791137B2 (en) | 2018-03-14 | 2020-09-29 | Synack, Inc. | Risk assessment and remediation |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020087469A1 (en) * | 2000-12-28 | 2002-07-04 | Ravi Ganesan | Technique of registration for and direction of electronic payments in real-time |
US20020087471A1 (en) * | 2000-12-28 | 2002-07-04 | Ravi Ganesan | Multiple mode registration and payment processing |
US6513018B1 (en) * | 1994-05-05 | 2003-01-28 | Fair, Isaac And Company, Inc. | Method and apparatus for scoring the likelihood of a desired performance result |
US20030199869A1 (en) * | 1998-10-23 | 2003-10-23 | Johnson Kristin D. | Vessel sealing instrument |
US20040019568A1 (en) * | 2002-07-29 | 2004-01-29 | Checkfree Services Corporation | Technique for account authentication |
US20040088255A1 (en) * | 2002-11-01 | 2004-05-06 | Zielke William D. | Matching consumers with billers having bills available for electronic presentment |
US20050097320A1 (en) * | 2003-09-12 | 2005-05-05 | Lior Golan | System and method for risk based authentication |
US20050283429A1 (en) * | 2004-06-17 | 2005-12-22 | Bates Michael R | Scored negative file system and method |
US20060212386A1 (en) * | 2005-03-15 | 2006-09-21 | Willey Dawn M | Credit scoring method and system |
US20070136573A1 (en) * | 2005-12-05 | 2007-06-14 | Joseph Steinberg | System and method of using two or more multi-factor authentication mechanisms to authenticate online parties |
US20070226138A1 (en) * | 2006-03-22 | 2007-09-27 | Adam Koltnow | Systems and methods for subscriber to payee cross pollination |
US20080103798A1 (en) * | 2006-10-25 | 2008-05-01 | Domenikos Steven D | Identity Protection |
US7458508B1 (en) * | 2003-05-12 | 2008-12-02 | Id Analytics, Inc. | System and method for identity-based fraud detection |
US20120265675A1 (en) * | 2001-03-20 | 2012-10-18 | Goldman, Sachs & Co. | Proprietary Risk Management Clearinghouse |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002037219A2 (en) * | 2000-11-02 | 2002-05-10 | Cybersource Corporation | Method and apparatus for evaluating fraud risk in an electronic commerce transaction |
EP1339199A1 (en) * | 2002-02-22 | 2003-08-27 | Hewlett-Packard Company | Dynamic user authentication |
US6810480B1 (en) * | 2002-10-21 | 2004-10-26 | Sprint Communications Company L.P. | Verification of identity and continued presence of computer users |
GB2400461B (en) * | 2003-04-07 | 2006-05-31 | Hewlett Packard Development Co | Control of access to of commands to computing apparatus |
US8224753B2 (en) * | 2004-12-07 | 2012-07-17 | Farsheed Atef | System and method for identity verification and management |
JP4954979B2 (en) * | 2005-04-29 | 2012-06-20 | オラクル・インターナショナル・コーポレイション | Systems and methods for fraud monitoring, detection, and hierarchical user authentication |
US8239677B2 (en) * | 2006-10-10 | 2012-08-07 | Equifax Inc. | Verification and authentication systems and methods |
-
2007
- 2007-06-27 US US11/769,282 patent/US20090006230A1/en not_active Abandoned
-
2015
- 2015-02-09 US US14/617,622 patent/US10049359B2/en active Active
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6513018B1 (en) * | 1994-05-05 | 2003-01-28 | Fair, Isaac And Company, Inc. | Method and apparatus for scoring the likelihood of a desired performance result |
US20030199869A1 (en) * | 1998-10-23 | 2003-10-23 | Johnson Kristin D. | Vessel sealing instrument |
US20020087471A1 (en) * | 2000-12-28 | 2002-07-04 | Ravi Ganesan | Multiple mode registration and payment processing |
US20020087469A1 (en) * | 2000-12-28 | 2002-07-04 | Ravi Ganesan | Technique of registration for and direction of electronic payments in real-time |
US20120265675A1 (en) * | 2001-03-20 | 2012-10-18 | Goldman, Sachs & Co. | Proprietary Risk Management Clearinghouse |
US20040019568A1 (en) * | 2002-07-29 | 2004-01-29 | Checkfree Services Corporation | Technique for account authentication |
US20040088255A1 (en) * | 2002-11-01 | 2004-05-06 | Zielke William D. | Matching consumers with billers having bills available for electronic presentment |
US7458508B1 (en) * | 2003-05-12 | 2008-12-02 | Id Analytics, Inc. | System and method for identity-based fraud detection |
US20050097320A1 (en) * | 2003-09-12 | 2005-05-05 | Lior Golan | System and method for risk based authentication |
US20050283429A1 (en) * | 2004-06-17 | 2005-12-22 | Bates Michael R | Scored negative file system and method |
US20060212386A1 (en) * | 2005-03-15 | 2006-09-21 | Willey Dawn M | Credit scoring method and system |
US20070136573A1 (en) * | 2005-12-05 | 2007-06-14 | Joseph Steinberg | System and method of using two or more multi-factor authentication mechanisms to authenticate online parties |
US20070226138A1 (en) * | 2006-03-22 | 2007-09-27 | Adam Koltnow | Systems and methods for subscriber to payee cross pollination |
US20080103798A1 (en) * | 2006-10-25 | 2008-05-01 | Domenikos Steven D | Identity Protection |
Cited By (224)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9710852B1 (en) | 2002-05-30 | 2017-07-18 | Consumerinfo.Com, Inc. | Credit report timeline user interface |
US9400589B1 (en) | 2002-05-30 | 2016-07-26 | Consumerinfo.Com, Inc. | Circular rotational interface for display of consumer credit information |
US8515844B2 (en) | 2002-09-21 | 2013-08-20 | Consumerinfo.Com, Inc. | Systems and methods of on-line credit information monitoring and control |
US8195549B2 (en) | 2002-09-21 | 2012-06-05 | Consumerinfo.Com, Inc. | Systems and methods of on-line credit information monitoring and control |
US8781953B2 (en) | 2003-03-21 | 2014-07-15 | Consumerinfo.Com, Inc. | Card management system and method |
US8175889B1 (en) | 2005-04-06 | 2012-05-08 | Experian Information Solutions, Inc. | Systems and methods for tracking changes of address based on service disconnect/connect data |
US20070012757A1 (en) * | 2005-07-14 | 2007-01-18 | First Data Corporation | Identity verification switch |
US8109435B2 (en) * | 2005-07-14 | 2012-02-07 | Early Warning Services, Llc | Identity verification switch |
US20070043577A1 (en) * | 2005-08-16 | 2007-02-22 | Sheldon Kasower | Apparatus and method of enabling a victim of identity theft to resolve and prevent fraud |
US20080288299A1 (en) * | 2006-10-31 | 2008-11-20 | Genmobi Technologies, Inc. | System and method for user identity validation for online transactions |
US9767513B1 (en) | 2007-12-14 | 2017-09-19 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US11379916B1 (en) | 2007-12-14 | 2022-07-05 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US9230283B1 (en) | 2007-12-14 | 2016-01-05 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US9542682B1 (en) | 2007-12-14 | 2017-01-10 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US10614519B2 (en) | 2007-12-14 | 2020-04-07 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US10262364B2 (en) | 2007-12-14 | 2019-04-16 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US8464939B1 (en) | 2007-12-14 | 2013-06-18 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US10878499B2 (en) | 2007-12-14 | 2020-12-29 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US11769112B2 (en) | 2008-06-26 | 2023-09-26 | Experian Marketing Solutions, Llc | Systems and methods for providing an integrated identifier |
US10075446B2 (en) | 2008-06-26 | 2018-09-11 | Experian Marketing Solutions, Inc. | Systems and methods for providing an integrated identifier |
US8312033B1 (en) | 2008-06-26 | 2012-11-13 | Experian Marketing Solutions, Inc. | Systems and methods for providing an integrated identifier |
US11157872B2 (en) | 2008-06-26 | 2021-10-26 | Experian Marketing Solutions, Llc | Systems and methods for providing an integrated identifier |
US8954459B1 (en) | 2008-06-26 | 2015-02-10 | Experian Marketing Solutions, Inc. | Systems and methods for providing an integrated identifier |
US20190026827A1 (en) * | 2008-08-12 | 2019-01-24 | Branch Banking And Trust Company | Method for retail on-line account opening |
US20180053164A1 (en) * | 2008-08-12 | 2018-02-22 | Branch Banking And Trust Company | Method for Retail On-Line Account Opening With Early Warning Methodology |
US10650448B1 (en) | 2008-08-14 | 2020-05-12 | Experian Information Solutions, Inc. | Multi-bureau credit file freeze and unfreeze |
US9792648B1 (en) | 2008-08-14 | 2017-10-17 | Experian Information Solutions, Inc. | Multi-bureau credit file freeze and unfreeze |
US11636540B1 (en) | 2008-08-14 | 2023-04-25 | Experian Information Solutions, Inc. | Multi-bureau credit file freeze and unfreeze |
US9256904B1 (en) | 2008-08-14 | 2016-02-09 | Experian Information Solutions, Inc. | Multi-bureau credit file freeze and unfreeze |
US10115155B1 (en) | 2008-08-14 | 2018-10-30 | Experian Information Solution, Inc. | Multi-bureau credit file freeze and unfreeze |
US11004147B1 (en) | 2008-08-14 | 2021-05-11 | Experian Information Solutions, Inc. | Multi-bureau credit file freeze and unfreeze |
US9489694B2 (en) | 2008-08-14 | 2016-11-08 | Experian Information Solutions, Inc. | Multi-bureau credit file freeze and unfreeze |
US8290960B2 (en) | 2008-10-24 | 2012-10-16 | International Business Machines Corporation | Configurable trust context assignable to facts and associated trust metadata |
US8108330B2 (en) * | 2008-10-24 | 2012-01-31 | International Business Machines Corporation | Generating composite trust value scores, and atomic metadata values and associated composite trust value scores using a plurality of algorithms |
US20100106559A1 (en) * | 2008-10-24 | 2010-04-29 | International Business Machines Corporation | Configurable Trust Context Assignable to Facts and Associated Trust Metadata |
US20100106558A1 (en) * | 2008-10-24 | 2010-04-29 | International Business Machines Corporation | Trust Index Framework for Providing Data and Associated Trust Metadata |
US8443189B2 (en) | 2008-10-24 | 2013-05-14 | International Business Machines Corporation | Trust event notification and actions based on thresholds and associated trust metadata scores |
US20100106560A1 (en) * | 2008-10-24 | 2010-04-29 | International Business Machines Corporation | Generating Composite Trust Value Scores Based on Assignable Priorities, Atomic Metadata Values and Associated Composite Trust Value Scores |
US20100107244A1 (en) * | 2008-10-24 | 2010-04-29 | International Business Machines Corporation | Trust Event Notification and Actions Based on Thresholds and Associated Trust Metadata Scores |
US10621657B2 (en) | 2008-11-05 | 2020-04-14 | Consumerinfo.Com, Inc. | Systems and methods of credit information reporting |
US8631486B1 (en) * | 2009-03-31 | 2014-01-14 | Emc Corporation | Adaptive identity classification |
US8312157B2 (en) * | 2009-07-16 | 2012-11-13 | Palo Alto Research Center Incorporated | Implicit authentication |
US20110016534A1 (en) * | 2009-07-16 | 2011-01-20 | Palo Alto Research Center Incorporated | Implicit authentication |
US8618913B1 (en) * | 2009-10-19 | 2013-12-31 | Emc Corporation | Radio frequency identification enabled mobile device |
US8935709B2 (en) | 2009-10-23 | 2015-01-13 | International Business Machines Corporation | Monitoring information assets and information asset topologies |
US8276157B2 (en) | 2009-10-23 | 2012-09-25 | International Business Machines Corporation | Monitoring information assets and information asset topologies |
US20110137760A1 (en) * | 2009-12-03 | 2011-06-09 | Rudie Todd C | Method, system, and computer program product for customer linking and identification capability for institutions |
US8706615B2 (en) | 2009-12-04 | 2014-04-22 | Robert A. Merkle | Systems and methods for evaluating the ability of borrowers to repay loans |
US20110137788A1 (en) * | 2009-12-04 | 2011-06-09 | Merkle Robert A | Systems and methods for evaluating the ability of borrowers to repay loans |
US20110166869A1 (en) * | 2010-01-04 | 2011-07-07 | Bank Of America Corporation | Providing an Indication of the Validity of the Identity of an Individual |
US9171306B1 (en) | 2010-03-29 | 2015-10-27 | Bank Of America Corporation | Risk-based transaction authentication |
US8375427B2 (en) * | 2010-04-21 | 2013-02-12 | International Business Machines Corporation | Holistic risk-based identity establishment for eligibility determinations in context of an application |
US20110265162A1 (en) * | 2010-04-21 | 2011-10-27 | International Business Machines Corporation | Holistic risk-based identity establishment for eligibility determinations in context of an application |
US8782217B1 (en) | 2010-11-10 | 2014-07-15 | Safetyweb, Inc. | Online identity management |
US8818888B1 (en) | 2010-11-12 | 2014-08-26 | Consumerinfo.Com, Inc. | Application clusters |
US8478674B1 (en) | 2010-11-12 | 2013-07-02 | Consumerinfo.Com, Inc. | Application clusters |
US9147042B1 (en) | 2010-11-22 | 2015-09-29 | Experian Information Solutions, Inc. | Systems and methods for data verification |
US9684905B1 (en) | 2010-11-22 | 2017-06-20 | Experian Information Solutions, Inc. | Systems and methods for data verification |
US11954655B1 (en) | 2011-06-16 | 2024-04-09 | Consumerinfo.Com, Inc. | Authentication alerts |
US10685336B1 (en) | 2011-06-16 | 2020-06-16 | Consumerinfo.Com, Inc. | Authentication alerts |
US9607336B1 (en) | 2011-06-16 | 2017-03-28 | Consumerinfo.Com, Inc. | Providing credit inquiry alerts |
US10115079B1 (en) | 2011-06-16 | 2018-10-30 | Consumerinfo.Com, Inc. | Authentication alerts |
US10719873B1 (en) | 2011-06-16 | 2020-07-21 | Consumerinfo.Com, Inc. | Providing credit inquiry alerts |
US9665854B1 (en) | 2011-06-16 | 2017-05-30 | Consumerinfo.Com, Inc. | Authentication alerts |
US11232413B1 (en) | 2011-06-16 | 2022-01-25 | Consumerinfo.Com, Inc. | Authentication alerts |
US11665253B1 (en) | 2011-07-08 | 2023-05-30 | Consumerinfo.Com, Inc. | LifeScore |
US10798197B2 (en) | 2011-07-08 | 2020-10-06 | Consumerinfo.Com, Inc. | Lifescore |
US10176233B1 (en) | 2011-07-08 | 2019-01-08 | Consumerinfo.Com, Inc. | Lifescore |
US8473318B2 (en) * | 2011-07-19 | 2013-06-25 | Bank Of America Corporation | Risk score determination |
US9282090B2 (en) | 2011-08-05 | 2016-03-08 | Safefaces LLC | Methods and systems for identity verification in a social network using ratings |
EP2740067A4 (en) * | 2011-08-05 | 2015-04-29 | Safefaces LLC | Methods and systems for identity verification |
US20130060600A1 (en) * | 2011-09-06 | 2013-03-07 | Aon Benfield Global, Inc. | Risk reporting log |
US9106691B1 (en) | 2011-09-16 | 2015-08-11 | Consumerinfo.Com, Inc. | Systems and methods of identity protection and management |
US10061936B1 (en) | 2011-09-16 | 2018-08-28 | Consumerinfo.Com, Inc. | Systems and methods of identity protection and management |
US9542553B1 (en) | 2011-09-16 | 2017-01-10 | Consumerinfo.Com, Inc. | Systems and methods of identity protection and management |
US11087022B2 (en) | 2011-09-16 | 2021-08-10 | Consumerinfo.Com, Inc. | Systems and methods of identity protection and management |
US10642999B2 (en) | 2011-09-16 | 2020-05-05 | Consumerinfo.Com, Inc. | Systems and methods of identity protection and management |
US11790112B1 (en) | 2011-09-16 | 2023-10-17 | Consumerinfo.Com, Inc. | Systems and methods of identity protection and management |
US9536263B1 (en) | 2011-10-13 | 2017-01-03 | Consumerinfo.Com, Inc. | Debt services candidate locator |
US9972048B1 (en) | 2011-10-13 | 2018-05-15 | Consumerinfo.Com, Inc. | Debt services candidate locator |
US11200620B2 (en) | 2011-10-13 | 2021-12-14 | Consumerinfo.Com, Inc. | Debt services candidate locator |
US10810218B2 (en) | 2011-10-14 | 2020-10-20 | Transunion, Llc | System and method for matching of database records based on similarities to search queries |
US11816121B2 (en) | 2011-10-14 | 2023-11-14 | Trans Union Llc | System and method for matching of database records based on similarities to search queries |
US20130185180A1 (en) * | 2012-01-18 | 2013-07-18 | Bank Of America Corporation | Determining the investigation priority of potential suspicious events within a financial institution |
US20130262213A1 (en) * | 2012-04-03 | 2013-10-03 | Prashant Jamkhedkar | Systems, Methods, And Computer Program Products Providing Payment With Non-Traditional Sources Of Value |
US9853959B1 (en) | 2012-05-07 | 2017-12-26 | Consumerinfo.Com, Inc. | Storage and maintenance of personal data |
US11356430B1 (en) | 2012-05-07 | 2022-06-07 | Consumerinfo.Com, Inc. | Storage and maintenance of personal data |
US8595219B1 (en) | 2012-05-16 | 2013-11-26 | Trans Union, Llc | System and method for contextual and free format matching of addresses |
US9292581B2 (en) | 2012-05-16 | 2016-03-22 | Trans Union, Llc | System and method for contextual and free format matching of addresses |
US10055561B2 (en) | 2012-06-29 | 2018-08-21 | Microsoft Technology Licensing, Llc | Identity risk score generation and implementation |
US9639678B2 (en) | 2012-06-29 | 2017-05-02 | Microsoft Technology Licensing, Llc | Identity risk score generation and implementation |
US20180322572A1 (en) * | 2012-07-03 | 2018-11-08 | Lexisnexis Risk Solutions Fl Inc. | Systems and Methods for Improving Computation Efficiency in the Detection of Fraud Indicators for Loans |
US10043213B2 (en) * | 2012-07-03 | 2018-08-07 | Lexisnexis Risk Solutions Fl Inc. | Systems and methods for improving computation efficiency in the detection of fraud indicators for loans with multiple applicants |
US10762561B2 (en) * | 2012-07-03 | 2020-09-01 | Lexisnexis Risk Solutions Fl Inc. | Systems and methods for improving computation efficiency in the detection of fraud indicators for loans |
US10313519B1 (en) * | 2012-08-28 | 2019-06-04 | West Corporation | Intelligent interactive voice response system for processing customer communications |
US10931820B1 (en) * | 2012-08-28 | 2021-02-23 | West Corporation | Intelligent interactive voice response system for processing customer communications |
US20150234830A1 (en) * | 2012-09-19 | 2015-08-20 | Check Yourself Llc | Method and system for creating and managing a verified online profile |
US9654541B1 (en) | 2012-11-12 | 2017-05-16 | Consumerinfo.Com, Inc. | Aggregating user web browsing data |
US11012491B1 (en) | 2012-11-12 | 2021-05-18 | ConsumerInfor.com, Inc. | Aggregating user web browsing data |
US11863310B1 (en) | 2012-11-12 | 2024-01-02 | Consumerinfo.Com, Inc. | Aggregating user web browsing data |
US10277659B1 (en) | 2012-11-12 | 2019-04-30 | Consumerinfo.Com, Inc. | Aggregating user web browsing data |
US8856894B1 (en) | 2012-11-28 | 2014-10-07 | Consumerinfo.Com, Inc. | Always on authentication |
US10366450B1 (en) | 2012-11-30 | 2019-07-30 | Consumerinfo.Com, Inc. | Credit data analysis |
US11651426B1 (en) | 2012-11-30 | 2023-05-16 | Consumerlnfo.com, Inc. | Credit score goals and alerts systems and methods |
US10963959B2 (en) | 2012-11-30 | 2021-03-30 | Consumerinfo. Com, Inc. | Presentation of credit score factors |
US11308551B1 (en) | 2012-11-30 | 2022-04-19 | Consumerinfo.Com, Inc. | Credit data analysis |
US11132742B1 (en) | 2012-11-30 | 2021-09-28 | Consumerlnfo.com, Inc. | Credit score goals and alerts systems and methods |
US9830646B1 (en) | 2012-11-30 | 2017-11-28 | Consumerinfo.Com, Inc. | Credit score goals and alerts systems and methods |
US10255598B1 (en) | 2012-12-06 | 2019-04-09 | Consumerinfo.Com, Inc. | Credit card account data extraction |
US8978159B1 (en) * | 2012-12-31 | 2015-03-10 | Emc Corporation | Methods and apparatus for mediating access to derivatives of sensitive data |
US20160019388A1 (en) * | 2013-03-11 | 2016-01-21 | Hewlett-Packard Development Company, L.P. | Event correlation based on confidence factor |
US8972400B1 (en) | 2013-03-11 | 2015-03-03 | Consumerinfo.Com, Inc. | Profile data management |
CN105009132A (en) * | 2013-03-11 | 2015-10-28 | 惠普发展公司,有限责任合伙企业 | Event correlation based on confidence factor |
US10296739B2 (en) * | 2013-03-11 | 2019-05-21 | Entit Software Llc | Event correlation based on confidence factor |
US11514519B1 (en) | 2013-03-14 | 2022-11-29 | Consumerinfo.Com, Inc. | System and methods for credit dispute processing, resolution, and reporting |
US9406085B1 (en) | 2013-03-14 | 2016-08-02 | Consumerinfo.Com, Inc. | System and methods for credit dispute processing, resolution, and reporting |
US11769200B1 (en) | 2013-03-14 | 2023-09-26 | Consumerinfo.Com, Inc. | Account vulnerability alerts |
US9870589B1 (en) | 2013-03-14 | 2018-01-16 | Consumerinfo.Com, Inc. | Credit utilization tracking and reporting |
US10102570B1 (en) | 2013-03-14 | 2018-10-16 | Consumerinfo.Com, Inc. | Account vulnerability alerts |
US10929925B1 (en) | 2013-03-14 | 2021-02-23 | Consumerlnfo.com, Inc. | System and methods for credit dispute processing, resolution, and reporting |
US11113759B1 (en) | 2013-03-14 | 2021-09-07 | Consumerinfo.Com, Inc. | Account vulnerability alerts |
US9697568B1 (en) | 2013-03-14 | 2017-07-04 | Consumerinfo.Com, Inc. | System and methods for credit dispute processing, resolution, and reporting |
US10043214B1 (en) | 2013-03-14 | 2018-08-07 | Consumerinfo.Com, Inc. | System and methods for credit dispute processing, resolution, and reporting |
US11775979B1 (en) | 2013-03-15 | 2023-10-03 | Consumerinfo.Com, Inc. | Adjustment of knowledge-based authentication |
US10664936B2 (en) | 2013-03-15 | 2020-05-26 | Csidentity Corporation | Authentication systems and methods for on-demand products |
US10169761B1 (en) | 2013-03-15 | 2019-01-01 | ConsumerInfo.com Inc. | Adjustment of knowledge-based authentication |
US10740762B2 (en) | 2013-03-15 | 2020-08-11 | Consumerinfo.Com, Inc. | Adjustment of knowledge-based authentication |
US11288677B1 (en) | 2013-03-15 | 2022-03-29 | Consumerlnfo.com, Inc. | Adjustment of knowledge-based authentication |
US11790473B2 (en) | 2013-03-15 | 2023-10-17 | Csidentity Corporation | Systems and methods of delayed authentication and billing for on-demand products |
US11164271B2 (en) | 2013-03-15 | 2021-11-02 | Csidentity Corporation | Systems and methods of delayed authentication and billing for on-demand products |
US10685398B1 (en) | 2013-04-23 | 2020-06-16 | Consumerinfo.Com, Inc. | Presenting credit score information |
US11120519B2 (en) | 2013-05-23 | 2021-09-14 | Consumerinfo.Com, Inc. | Digital identity |
US9721147B1 (en) | 2013-05-23 | 2017-08-01 | Consumerinfo.Com, Inc. | Digital identity |
US11803929B1 (en) | 2013-05-23 | 2023-10-31 | Consumerinfo.Com, Inc. | Digital identity |
US10453159B2 (en) | 2013-05-23 | 2019-10-22 | Consumerinfo.Com, Inc. | Digital identity |
US9443268B1 (en) | 2013-08-16 | 2016-09-13 | Consumerinfo.Com, Inc. | Bill payment and reporting |
US20150095986A1 (en) * | 2013-09-30 | 2015-04-02 | Bank Of America Corporation | Identification, Verification, and Authentication Scoring |
US9380041B2 (en) * | 2013-09-30 | 2016-06-28 | Bank Of America Corporation | Identification, verification, and authentication scoring |
US10269065B1 (en) | 2013-11-15 | 2019-04-23 | Consumerinfo.Com, Inc. | Bill payment and reporting |
US10325314B1 (en) | 2013-11-15 | 2019-06-18 | Consumerinfo.Com, Inc. | Payment reporting systems |
US9477737B1 (en) | 2013-11-20 | 2016-10-25 | Consumerinfo.Com, Inc. | Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules |
US11461364B1 (en) | 2013-11-20 | 2022-10-04 | Consumerinfo.Com, Inc. | Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules |
US10025842B1 (en) | 2013-11-20 | 2018-07-17 | Consumerinfo.Com, Inc. | Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules |
US10628448B1 (en) | 2013-11-20 | 2020-04-21 | Consumerinfo.Com, Inc. | Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules |
US20210174358A1 (en) * | 2013-11-27 | 2021-06-10 | Apple Inc. | Credential provisioning for an electronic device |
US20150154600A1 (en) * | 2013-12-04 | 2015-06-04 | Moneygram International, Inc. | Method and Apparatus for Risk Identification and Mitigation |
US10205725B2 (en) | 2013-12-20 | 2019-02-12 | Certify Global Inc. | Source device and systems and methods of verifying an identity using dynamic scoring |
US9219723B1 (en) | 2013-12-20 | 2015-12-22 | Certify Global Inc. | Source device for systems and methods of verifying an authentication using dynamic scoring |
US10243960B2 (en) | 2013-12-20 | 2019-03-26 | Certify Global Inc. | Source device and systems and methods of verifying an identification using dynamic scoring |
US9628476B2 (en) | 2013-12-20 | 2017-04-18 | Certify Global Inc. | Source device and systems and methods of verifying an authentication using dynamic scoring |
US9525685B2 (en) | 2014-02-07 | 2016-12-20 | Bank Of America Corporation | User authentication based on other applications |
US9628495B2 (en) | 2014-02-07 | 2017-04-18 | Bank Of America Corporation | Self-selected user access based on specific authentication types |
US9819680B2 (en) | 2014-02-07 | 2017-11-14 | Bank Of America Corporation | Determining user authentication requirements based on the current location of the user in comparison to the users's normal boundary of location |
US10050962B2 (en) | 2014-02-07 | 2018-08-14 | Bank Of America Corporation | Determining user authentication requirements along a continuum based on a current state of the user and/or the attributes related to the function requiring authentication |
US9965606B2 (en) | 2014-02-07 | 2018-05-08 | Bank Of America Corporation | Determining user authentication based on user/device interaction |
US9647999B2 (en) | 2014-02-07 | 2017-05-09 | Bank Of America Corporation | Authentication level of function bucket based on circumstances |
US9600844B2 (en) | 2014-03-04 | 2017-03-21 | Bank Of America Corporation | Foreign cross-issued token |
US9639836B2 (en) | 2014-03-04 | 2017-05-02 | Bank Of America Corporation | Online banking digital wallet management |
US9830597B2 (en) | 2014-03-04 | 2017-11-28 | Bank Of America Corporation | Formation and funding of a shared token |
US9721248B2 (en) | 2014-03-04 | 2017-08-01 | Bank Of America Corporation | ATM token cash withdrawal |
US9600817B2 (en) | 2014-03-04 | 2017-03-21 | Bank Of America Corporation | Foreign exchange token |
US9652764B2 (en) | 2014-03-04 | 2017-05-16 | Bank Of America Corporation | Online banking digital wallet management |
US10762483B2 (en) | 2014-03-04 | 2020-09-01 | Bank Of America Corporation | ATM token cash withdrawal |
US10002352B2 (en) | 2014-03-04 | 2018-06-19 | Bank Of America Corporation | Digital wallet exposure reduction |
US9424572B2 (en) | 2014-03-04 | 2016-08-23 | Bank Of America Corporation | Online banking digital wallet management |
US9406065B2 (en) | 2014-03-04 | 2016-08-02 | Bank Of America Corporation | Customer token preferences interface |
US9721268B2 (en) | 2014-03-04 | 2017-08-01 | Bank Of America Corporation | Providing offers associated with payment credentials authenticated in a specific digital wallet |
US10134030B2 (en) | 2014-03-04 | 2018-11-20 | Bank Of America Corporation | Customer token preferences interface |
US10140610B2 (en) | 2014-03-04 | 2018-11-27 | Bank Of America Corporation | Customer token preferences interface |
USD759690S1 (en) | 2014-03-25 | 2016-06-21 | Consumerinfo.Com, Inc. | Display screen or portion thereof with graphical user interface |
USD759689S1 (en) | 2014-03-25 | 2016-06-21 | Consumerinfo.Com, Inc. | Display screen or portion thereof with graphical user interface |
USD760256S1 (en) | 2014-03-25 | 2016-06-28 | Consumerinfo.Com, Inc. | Display screen or portion thereof with graphical user interface |
US10482532B1 (en) | 2014-04-16 | 2019-11-19 | Consumerinfo.Com, Inc. | Providing credit data in search results |
US9892457B1 (en) | 2014-04-16 | 2018-02-13 | Consumerinfo.Com, Inc. | Providing credit data in search results |
US10373240B1 (en) | 2014-04-25 | 2019-08-06 | Csidentity Corporation | Systems, methods and computer-program products for eligibility verification |
US11074641B1 (en) | 2014-04-25 | 2021-07-27 | Csidentity Corporation | Systems, methods and computer-program products for eligibility verification |
US11587150B1 (en) | 2014-04-25 | 2023-02-21 | Csidentity Corporation | Systems and methods for eligibility verification |
US9210156B1 (en) * | 2014-06-16 | 2015-12-08 | Lexisnexis Risk Solutions Inc. | Systems and methods for multi-stage identity authentication |
US20210182373A1 (en) * | 2014-08-28 | 2021-06-17 | Facetec, Inc. | Method to add remotely collected biometric images or templates to a database record of personal information |
US9338658B1 (en) * | 2014-09-25 | 2016-05-10 | Sprint Communications Company L.P. | Telecommunication service provider customer account portal for strategic partners |
US10581843B2 (en) | 2014-11-25 | 2020-03-03 | Certify Global Inc. | Systems and methods of verifying an authenticated document biosignature encoding restricted access information |
US10726113B2 (en) | 2014-11-25 | 2020-07-28 | Certify Global Inc. | Systems and methods of verifying an authenticated document biosignature glyph containing a selected image |
US10229289B2 (en) | 2014-11-25 | 2019-03-12 | Certify Global Inc. | Systems and methods of generating an authenticated document biosignature |
US9652633B2 (en) | 2014-11-25 | 2017-05-16 | Certify Global Inc. | Systems and methods of verifying an authenticated document biosignature |
US20170126732A1 (en) * | 2014-12-11 | 2017-05-04 | Zerofox, Inc. | Social network security monitoring |
US10491623B2 (en) * | 2014-12-11 | 2019-11-26 | Zerofox, Inc. | Social network security monitoring |
US10999130B2 (en) | 2015-07-10 | 2021-05-04 | Zerofox, Inc. | Identification of vulnerability to social phishing |
US10516567B2 (en) | 2015-07-10 | 2019-12-24 | Zerofox, Inc. | Identification of vulnerability to social phishing |
US20170109854A1 (en) * | 2015-10-14 | 2017-04-20 | Robert Wayne Birdsong | Methods and systems for managing access to a database |
CN106611133A (en) * | 2015-10-27 | 2017-05-03 | 阿里巴巴集团控股有限公司 | Risk identification method and equipment |
US9965523B2 (en) | 2015-10-30 | 2018-05-08 | Bank Of America Corporation | Tiered identification federated authentication network system |
US9729536B2 (en) | 2015-10-30 | 2017-08-08 | Bank Of America Corporation | Tiered identification federated authentication network system |
US10460367B2 (en) | 2016-04-29 | 2019-10-29 | Bank Of America Corporation | System for user authentication based on linking a randomly generated number to the user and a physical item |
US10268635B2 (en) | 2016-06-17 | 2019-04-23 | Bank Of America Corporation | System for data rotation through tokenization |
US20180121907A1 (en) * | 2016-10-27 | 2018-05-03 | Mastercard International Incorporated | Systems and methods for enhanced verification of new users to a network based service |
US10291644B1 (en) * | 2016-12-21 | 2019-05-14 | Symantec Corporation | System and method for prioritizing endpoints and detecting potential routes to high value assets |
US10574662B2 (en) | 2017-06-20 | 2020-02-25 | Bank Of America Corporation | System for authentication of a user based on multi-factor passively acquired data |
US10360733B2 (en) | 2017-06-20 | 2019-07-23 | Bank Of America Corporation | System controlled augmented resource facility |
US11171963B2 (en) | 2017-06-20 | 2021-11-09 | Bank Of America Corporation | System for authentication of a user based on multi-factor passively acquired data |
US10524165B2 (en) | 2017-06-22 | 2019-12-31 | Bank Of America Corporation | Dynamic utilization of alternative resources based on token association |
US10313480B2 (en) | 2017-06-22 | 2019-06-04 | Bank Of America Corporation | Data transmission between networked resources |
US10511692B2 (en) | 2017-06-22 | 2019-12-17 | Bank Of America Corporation | Data transmission to a networked resource based on contextual information |
US11190617B2 (en) | 2017-06-22 | 2021-11-30 | Bank Of America Corporation | Data transmission to a networked resource based on contextual information |
US10986541B2 (en) | 2017-06-22 | 2021-04-20 | Bank Of America Corporation | Dynamic utilization of alternative resources based on token association |
US10868824B2 (en) | 2017-07-31 | 2020-12-15 | Zerofox, Inc. | Organizational social threat reporting |
WO2019034991A1 (en) * | 2017-08-14 | 2019-02-21 | Patil Rajeev Shant | An automated system for processing visa applications and method thereof |
US11165801B2 (en) | 2017-08-15 | 2021-11-02 | Zerofox, Inc. | Social threat correlation |
US11418527B2 (en) | 2017-08-22 | 2022-08-16 | ZeroFOX, Inc | Malicious social media account identification |
US11403400B2 (en) | 2017-08-31 | 2022-08-02 | Zerofox, Inc. | Troll account detection |
US11367323B1 (en) | 2018-01-16 | 2022-06-21 | Secureauth Corporation | System and method for secure pair and unpair processing using a dynamic level of assurance (LOA) score |
US11005839B1 (en) * | 2018-03-11 | 2021-05-11 | Acceptto Corporation | System and method to identify abnormalities to continuously measure transaction risk |
US11588639B2 (en) | 2018-06-22 | 2023-02-21 | Experian Information Solutions, Inc. | System and method for a token gateway environment |
US10911234B2 (en) | 2018-06-22 | 2021-02-02 | Experian Information Solutions, Inc. | System and method for a token gateway environment |
US11265324B2 (en) | 2018-09-05 | 2022-03-01 | Consumerinfo.Com, Inc. | User permissions for access to secure data at third-party |
US11399029B2 (en) | 2018-09-05 | 2022-07-26 | Consumerinfo.Com, Inc. | Database platform for realtime updating of user data from third party sources |
US10880313B2 (en) | 2018-09-05 | 2020-12-29 | Consumerinfo.Com, Inc. | Database platform for realtime updating of user data from third party sources |
US10671749B2 (en) | 2018-09-05 | 2020-06-02 | Consumerinfo.Com, Inc. | Authenticated access and aggregation database platform |
US11315179B1 (en) | 2018-11-16 | 2022-04-26 | Consumerinfo.Com, Inc. | Methods and apparatuses for customized card recommendations |
US11238656B1 (en) | 2019-02-22 | 2022-02-01 | Consumerinfo.Com, Inc. | System and method for an augmented reality experience via an artificial intelligence bot |
US11842454B1 (en) | 2019-02-22 | 2023-12-12 | Consumerinfo.Com, Inc. | System and method for an augmented reality experience via an artificial intelligence bot |
US11252573B1 (en) | 2019-08-04 | 2022-02-15 | Acceptto Corporation | System and method for rapid check-in and inheriting trust using a mobile device |
US11941065B1 (en) | 2019-09-13 | 2024-03-26 | Experian Information Solutions, Inc. | Single identifier platform for storing entity data |
US11329998B1 (en) | 2020-08-31 | 2022-05-10 | Secureauth Corporation | Identification (ID) proofing and risk engine integration system and method |
WO2022212306A1 (en) * | 2021-03-29 | 2022-10-06 | Allstate Insurance Company | Systems and methods for classification and time series calibration in identity health analysis |
Also Published As
Publication number | Publication date |
---|---|
US20150154599A1 (en) | 2015-06-04 |
US10049359B2 (en) | 2018-08-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10049359B2 (en) | Identity risk scoring | |
US10896419B2 (en) | Systems and methods for authenticating user identities in networked computer systems | |
US8745698B1 (en) | Dynamic authentication engine | |
US8239677B2 (en) | Verification and authentication systems and methods | |
US20200074545A1 (en) | Method for real on-line account opening | |
AU765797B2 (en) | System and method for private and secure financial transactions | |
AU2006275920B2 (en) | Methods and systems for improved security for financial transactions through a trusted third party entity | |
CN104200152B (en) | System and method for risk-based authentication | |
US8224753B2 (en) | System and method for identity verification and management | |
US20170132631A1 (en) | System and method for user identity validation for online transactions | |
US20030195859A1 (en) | System and methods for authenticating and monitoring transactions | |
US20130212640A1 (en) | Methods and systems for authenticating users | |
US20110035788A1 (en) | Methods and systems for authenticating users | |
US20120066758A1 (en) | Online User Authentication | |
AU2011207602B2 (en) | Verification mechanism | |
US20190213585A1 (en) | Systems, methods and computer program products for otp based authorization of electronic payment transactions | |
US11494769B2 (en) | System, methods and computer program products for identity authentication for electronic payment transactions | |
US20180375847A1 (en) | Stored value user identification system using blockchain or math-based function | |
US20080281907A1 (en) | System and method for globally issuing and validating assets | |
US11615421B2 (en) | Methods, system and computer program product for selectively responding to presentation of payment card information | |
US11756147B1 (en) | Systems and methods for verifying the authenticity of documents | |
KR20220072576A (en) | Cryptocurrency withdrawal processing method and exchange system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: CHECKFREE CORPORATION, GEORGIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LYDA, PAUL J.;BORGER, BRETT V.;MCCABE, JAMES PATRICK;AND OTHERS;REEL/FRAME:019770/0642;SIGNING DATES FROM 20070723 TO 20070724 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |