US20110087574A1 - Method and apparatus for identity theft prevention - Google Patents

Method and apparatus for identity theft prevention Download PDF

Info

Publication number
US20110087574A1
US20110087574A1 US12/905,982 US90598210A US2011087574A1 US 20110087574 A1 US20110087574 A1 US 20110087574A1 US 90598210 A US90598210 A US 90598210A US 2011087574 A1 US2011087574 A1 US 2011087574A1
Authority
US
United States
Prior art keywords
consumer
identifier
payment instrument
consumer identifier
computer system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/905,982
Inventor
Scott J. Loftesness
Carol C. Benson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US12/905,982 priority Critical patent/US20110087574A1/en
Publication of US20110087574A1 publication Critical patent/US20110087574A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q99/00Subject matter not provided for in other groups of this subclass

Definitions

  • the present invention is related to computer software and more specifically to computer software for financial services.
  • Participating companies include Citibank, Dell, Diners Club, Discover Financial Services, First North American National Bank and Sprint (See: “Software Helps Spot Fraud in Credit Applications”, Wall Street Journal, May 14, 2003). IDanalytics claims its system can identify 15% to 40% of fraudulent applications. Importantly, there is no mechanism that guarantees to a consumer that identity theft will not occur.
  • a system and method can be utilized by credit grantors in the United States to obtain consumer assurance and agreement prior to opening new credit accounts thereby significantly reducing the possibility of successful identity theft being perpetrated.
  • FIG. 1 is a block schematic diagram of a conventional computer system.
  • FIG. 2 is a flowchart illustrating a method of issuing a credit card or other credit instrument to a user according to one embodiment of the present invention.
  • the present invention may be implemented as computer software on a conventional computer system.
  • a conventional computer system 150 for practicing the present invention is shown.
  • Processor 160 retrieves and executes software instructions stored in storage 162 such as memory, which may be Random Access Memory (RAM) and may control other components to perform the present invention.
  • Storage 162 may be used to store program instructions or data or both.
  • Storage 164 such as a computer disk drive or other nonvolatile storage, may provide storage of data or program instructions. In one embodiment, storage 164 provides longer term storage of instructions and data, with storage 162 providing storage for data or instructions that may only be required for a shorter time than that of storage 164 .
  • Input device 166 such as a computer keyboard or mouse or both allows user input to the system 150 .
  • Output 168 allows the system to provide information such as instructions, data or other information to the user of the system 150 .
  • Storage input device 170 such as a conventional floppy disk drive or CD-ROM drive accepts via input 172 computer program products 174 such as a conventional floppy disk or CD-ROM or other nonvolatile storage media that may be used to transport computer instructions or data to the system 150 .
  • Computer program product 174 has encoded thereon computer readable program code devices 176 , such as magnetic charges in the case of a floppy disk or optical encodings in the case of a CD-ROM which are encoded as program instructions, data or both to configure the computer system 150 to operate as described below.
  • each computer system 150 is a conventional SUN MICROSYSTEMS ULTRA 10 workstation running the SOLARIS operating system commercially available from SUN MICROSYSTEMS, Inc. of Mountain View, Calif., a PENTIUM-compatible personal computer system such as are available from DELL COMPUTER CORPORATION of Round Rock, Tex. running a version of the WINDOWS operating system (such as 95, 98, Me, XP, NT or 2000) commercially available from MICROSOFT Corporation of Redmond Wash. or a Macintosh computer system running the MACOS or OPENSTEP operating system commercially available from APPLE COMPUTER CORPORATION of Cupertino, Calif. and the NETSCAPE browser commercially available from NETSCAPE COMMUNICATIONS CORPORATION of Mountain View, Calif. or INTERNET EXPLORER browser commercially available from MICROSOFT above, although other systems may be used.
  • SOLARIS operating system commercially available from SUN MICROSYSTEMS
  • ICS Issuers' Clearinghouse Service
  • Visa could help its cardholders by addressing one of the major sources of identity theft. By offering a mechanism that requires the active consent of a cardholder prior to opening a new Visa card account. Let's call that mechanism “Proof Positive from Visa”. In so doing, Visa could provide “proof positive” to both the cardholder and the potential new Visa card issuer that only the real cardholder has, in fact, requested the new credit card account. The Proof Positive mechanism would leverage the investments already made in the Issuers' Clearinghouse Service developed by Visa and MasterCard.
  • ICS provides them with information that assists in making the credit granting decision for a new account. Proof Positive would enable Visa to guarantee that cardholders who register to participate in the program would never experience new account Visa card-related identity theft.
  • FIG. 2 is a flowchart illustrating a method of issuing a credit card or other instrument to a user according to one embodiment of the present invention.
  • PPfV Proof Positive from Visa
  • a Visa cardholder would register 210 an existing Visa card for PPfV with a participating issuing bank online. If not already enrolled in Verified by Visa (“VbV”) 212 , the cardholder could enroll 214 in VbV (or another means of authentication) for that card. Through this process, that specific Visa issuer becomes the PPfV registered issuer for that consumer.
  • VbV Verified by Visa
  • the issuer then enters 216 the cardholder's primary PPfV card number and Social Security Number (SSN) into the ICS (or other) database which then sets 218 a PPfV-enrolled indicator for that SSN.
  • SSN Social Security Number
  • the issuer may be identified from the card number or an identifier of the issuer may also be entered into the ICS or other database.
  • the PPfV registered card issuer would then send 232 an email or other communication to the cardholder requesting that the cardholder authorize or decline issuance of the new card. (Note that this email confirmation process could be performed on the issuer's behalf by Visa as an adjunct service to ICS.)
  • the email would contain an active link which, when selected by the cardholder (or if the cardholder otherwise indicated assent to the card being issued) 234 , would trigger 236 a pop-up window requesting VbV or other authentication 238 and explicit cardholder approval (or decline) for opening the new account and such approval or decline would be received 240 .
  • the results of the authentication and approval/decline would be sent 242 by the PPfV registered card issuer to ICS (unless ICS was receiving the approval or decline directly).
  • ICS would then notify the new card issuer that they are either “good to go” 246 or forbidden to issue the card 248 and the new card issuer would issue 250 the card only if the good to go notification was received and would not issue the card if they were notified that they were forbidden to issue the card 252 .
  • ICS as a trusted, neutral, third party, in one embodiment, neither of the two issuers participating in this process would know the identity of the other issuer.
  • the PPfV card issuer would receive notification that the consumer may be attempting to open a new card account with a different issuer.
  • Alternative designs may be able to completely eliminate the PPfV issuer notification should it be considered problematic.
  • the ICS system could directly obtain a purchase authorization request from one of several proxy merchants in order to obtain a VbV validation response from PPfV issuer.
  • the present invention applies to the issuance of all credit instruments, not just credit cards.

Abstract

A system and method issues a credit card or other credit instrument to a user by first obtaining authorization and authentication from the user.

Description

    RELATED APPLICATIONS
  • This application claims the benefit of U.S. provisional patent application Ser. No. 60/473,175 entitled, “Identity Theft Application Prevention” filed on May 22, 2003 by Scott James Loftesness and Carol Coye Benson and is incorporated herein by reference in its entirety.
  • FIELD OF THE INVENTION
  • The present invention is related to computer software and more specifically to computer software for financial services.
  • BACKGROUND OF THE INVENTION
  • Identity theft in the United States is already a large and rapidly growing problem. A recent estimate by analyst Jim Hurley of the Aberdeen Group indicate it is growing at 300% annually from a base estimated at $221 billion in financial losses in 2003. Quoting from his analysis:
      • Profits are high; risks are low. At $9,800 per-incident, identity theft is paying much better than bank robbery, while organized identity theft criminal rings are largely immune from criminal prosecution. (See: The Business of Identity Theft—Not Just a Consumer Problem, Aberdeen Group, May 2003)
  • Visa and its member banks have a serious interest in preventing identity theft, and in helping consumers—and defrauded banks—minimize any losses when identity theft occurs. The Role of Bank Cards in Identity Theft One technique that identity thieves use is to establish new, fraudulent credit card accounts using stolen names, Social Security numbers, and other supporting identification. Although this is only one of the many types of crimes identity thieves commit, the relative ease with which this can be accomplished is one of the primary reasons for the growth of identity theft. Quite simply, the ability to open new, fraudulent credit card accounts and to use these cards to purchase goods or obtain cash advances is one of the financial beacons that attracts many identity thieves. Industry initiatives (such as Visa's recent announcement of an identity theft management program in cooperation with Call to Action) focus primarily on what consumers should do to protect their personal information or to help minimize the impact once an identity theft has already occurred. Credit bureaus have programs designed to help consumers manage post-incident identity theft and, through various email-based alert programs, help consumers detect identity theft earlier. New startups have emerged which are also attempting to address the problem of identity theft. For example, San Diego-based IDanalytics, a startup funded last fall by Canaan Ventures and Trinity Ventures, recently announced it was working with thirteen leading credit grantors to apply pattern recognition technology to detect and prevent identity theft at the point of application. Participating companies include Citibank, Dell, Diners Club, Discover Financial Services, First North American National Bank and Sprint (See: “Software Helps Spot Fraud in Credit Applications”, Wall Street Journal, May 14, 2003). IDanalytics claims its system can identify 15% to 40% of fraudulent applications. Importantly, there is no mechanism that guarantees to a consumer that identity theft will not occur.
  • SUMMARY OF INVENTION
  • A system and method can be utilized by credit grantors in the United States to obtain consumer assurance and agreement prior to opening new credit accounts thereby significantly reducing the possibility of successful identity theft being perpetrated.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block schematic diagram of a conventional computer system.
  • FIG. 2 is a flowchart illustrating a method of issuing a credit card or other credit instrument to a user according to one embodiment of the present invention.
  • DETAILED DESCRIPTION OF A PREFERRED EMBODIMENT
  • The present invention may be implemented as computer software on a conventional computer system. Referring now to FIG. 1, a conventional computer system 150 for practicing the present invention is shown. Processor 160 retrieves and executes software instructions stored in storage 162 such as memory, which may be Random Access Memory (RAM) and may control other components to perform the present invention. Storage 162 may be used to store program instructions or data or both. Storage 164, such as a computer disk drive or other nonvolatile storage, may provide storage of data or program instructions. In one embodiment, storage 164 provides longer term storage of instructions and data, with storage 162 providing storage for data or instructions that may only be required for a shorter time than that of storage 164. Input device 166 such as a computer keyboard or mouse or both allows user input to the system 150. Output 168, such as a display or printer, allows the system to provide information such as instructions, data or other information to the user of the system 150. Storage input device 170 such as a conventional floppy disk drive or CD-ROM drive accepts via input 172 computer program products 174 such as a conventional floppy disk or CD-ROM or other nonvolatile storage media that may be used to transport computer instructions or data to the system 150. Computer program product 174 has encoded thereon computer readable program code devices 176, such as magnetic charges in the case of a floppy disk or optical encodings in the case of a CD-ROM which are encoded as program instructions, data or both to configure the computer system 150 to operate as described below.
  • In one embodiment, each computer system 150 is a conventional SUN MICROSYSTEMS ULTRA 10 workstation running the SOLARIS operating system commercially available from SUN MICROSYSTEMS, Inc. of Mountain View, Calif., a PENTIUM-compatible personal computer system such as are available from DELL COMPUTER CORPORATION of Round Rock, Tex. running a version of the WINDOWS operating system (such as 95, 98, Me, XP, NT or 2000) commercially available from MICROSOFT Corporation of Redmond Wash. or a Macintosh computer system running the MACOS or OPENSTEP operating system commercially available from APPLE COMPUTER CORPORATION of Cupertino, Calif. and the NETSCAPE browser commercially available from NETSCAPE COMMUNICATIONS CORPORATION of Mountain View, Calif. or INTERNET EXPLORER browser commercially available from MICROSOFT above, although other systems may be used.
  • Banks in the United States that offer credit cards currently use a service created by Visa and MasterCard called the Issuers' Clearinghouse Service (ICS). ICS provides credit grantors with certain limited shared information about card applicants. In one application of this invention, Visa could help its cardholders by addressing one of the major sources of identity theft. By offering a mechanism that requires the active consent of a cardholder prior to opening a new Visa card account. Let's call that mechanism “Proof Positive from Visa”. In so doing, Visa could provide “proof positive” to both the cardholder and the potential new Visa card issuer that only the real cardholder has, in fact, requested the new credit card account. The Proof Positive mechanism would leverage the investments already made in the Issuers' Clearinghouse Service developed by Visa and MasterCard. Currently, Visa and MasterCard issuers are required to report and check all new Visa card applications against the ICS database. In response, ICS provides them with information that assists in making the credit granting decision for a new account. Proof Positive would enable Visa to guarantee that cardholders who register to participate in the program would never experience new account Visa card-related identity theft.
  • FIG. 2 is a flowchart illustrating a method of issuing a credit card or other instrument to a user according to one embodiment of the present invention. One way that Proof Positive from Visa (“PPfV”) could work is as follows: A Visa cardholder would register 210 an existing Visa card for PPfV with a participating issuing bank online. If not already enrolled in Verified by Visa (“VbV”) 212, the cardholder could enroll 214 in VbV (or another means of authentication) for that card. Through this process, that specific Visa issuer becomes the PPfV registered issuer for that consumer. The issuer then enters 216 the cardholder's primary PPfV card number and Social Security Number (SSN) into the ICS (or other) database which then sets 218 a PPfV-enrolled indicator for that SSN. The issuer may be identified from the card number or an identifier of the issuer may also be entered into the ICS or other database.
  • As usual with ICS, all new Visa card applications would continue to be sent 220 through ICS which would perform an additional check 222 to determine if the SSN on the application submitted matched a registered PPfV cardholder. If an SSN match occurred 224, the new card issuer would be notified 226 by ICS and would not be able to proceed with issuing the new card until it had received an additional clearance message from ICS, and if an SSN match did not occur 224, the new card issuer could issue the card 250 or attempt other methods of authentication and authorization. ICS would notify 230 the PPfV registered card issuer for that cardholder that a PPfV verification is now requested or required from their cardholder. The PPfV registered card issuer would then send 232 an email or other communication to the cardholder requesting that the cardholder authorize or decline issuance of the new card. (Note that this email confirmation process could be performed on the issuer's behalf by Visa as an adjunct service to ICS.) The email would contain an active link which, when selected by the cardholder (or if the cardholder otherwise indicated assent to the card being issued) 234, would trigger 236 a pop-up window requesting VbV or other authentication 238 and explicit cardholder approval (or decline) for opening the new account and such approval or decline would be received 240. The results of the authentication and approval/decline would be sent 242 by the PPfV registered card issuer to ICS (unless ICS was receiving the approval or decline directly). Based on the results of the authentication and approval process 244, ICS would then notify the new card issuer that they are either “good to go” 246 or forbidden to issue the card 248 and the new card issuer would issue 250 the card only if the good to go notification was received and would not issue the card if they were notified that they were forbidden to issue the card 252. Through the use of ICS as a trusted, neutral, third party, in one embodiment, neither of the two issuers participating in this process would know the identity of the other issuer. With this basic design, the PPfV card issuer would receive notification that the consumer may be attempting to open a new card account with a different issuer. Alternative designs may be able to completely eliminate the PPfV issuer notification should it be considered problematic. For example, in one alternative implementation the ICS system could directly obtain a purchase authorization request from one of several proxy merchants in order to obtain a VbV validation response from PPfV issuer. The present invention applies to the issuance of all credit instruments, not just credit cards.

Claims (20)

1. A method for preventing an unauthorized issuance of a credit instrument, the method comprising:
associating by a first party a means of communication with an identifier of a user;
providing from a second party to the first party the identifier of the user responsive to the second party attempting to have issued the credit instrument to that user;
contacting the user by the second party responsive to the providing step;
authenticating the user responsive to the contact;
receiving from the user an indication of whether the user assents to the issuance of the credit instrument; and
issuing the credit instrument responsive to the authentication and the indication of assent.
2. The method of claim 1 wherein the providing step is performed via a third party.
3. The method of claim 2 wherein the providing step is performed in a manner that does not reveal an identity of the first and second parties to one another.
4. A method comprising:
receiving information regarding an application for the issuance of a payment instrument along with a consumer identifier;
determining, by a computer system, if the consumer identifier matches a stored consumer identifier; and
sending an alert to a consumer associated with the consumer identifier after determining, by the computer system, if the consumer identifier matches the stored consumer identifier.
5. The method of claim 4 wherein the payment instrument is a credit card.
6. The method of claim 4 wherein the consumer identifier is a social security number.
7. The method of claim 4 wherein sending the alert to the consumer comprises sending the alert to a phone of the consumer.
8. The method of claim 4 further comprising issuing the payment instrument by an issuer bank if the consumer identifier does not match the stored consumer identifier.
9. The method of claim 4 wherein the payment instrument is a first payment instrument, and wherein the information regarding the application is received from a first issuer and the stored consumer identifier is stored in response to enrollment of a second payment instrument of the consumer in an authentication program, wherein the second payment instrument is issued by a second issuer.
10. The method of claim 9 wherein the computer system is part of the Issuer's Clearinghouse Service.
11. The method of claim 10 wherein the first and second issuers are not aware of each other's identity as the method is performed.
12. The method of claim 10 further comprising receiving a response to the alert, from the consumer.
13. The method of claim 4 wherein sending an alert to the consumer comprises sending an e-mail to the consumer.
14. The method of claim 13 wherein the e-mail contains an active link which triggers a pop up window requesting that the consumer approve of the application.
15. A computer system comprising a processor and a computer readable medium coupled to the processor, the computer readable medium comprising code, executable by the processor to implement a method comprising:
receiving information regarding an application for the issuance of a payment instrument along with a consumer identifier;
determining if the consumer identifier matches a stored consumer identifier; and
sending an alert to a consumer associated with the consumer identifier after determining if the consumer identifier matches a stored consumer identifier.
16. The computer system of claim 15 wherein the payment instrument is a credit card.
17. The computer system of claim 15 wherein the consumer identifier is a social security number.
18. The computer system of claim 15 wherein sending an alert to the consumer associated with the consumer identifier comprises sending an e-mail to the consumer.
19. The computer system of claim 15 wherein the payment instrument is a first payment instrument, and wherein the information regarding the application is received from a first issuer and the stored consumer identifier is stored in response to enrollment of a second payment instrument of the consumer in an authentication program, wherein the second payment instrument is issued by a second issuer.
20. The computer system of claim 19 wherein the first and second payment instruments are credit cards.
US12/905,982 2003-05-22 2010-10-15 Method and apparatus for identity theft prevention Abandoned US20110087574A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/905,982 US20110087574A1 (en) 2003-05-22 2010-10-15 Method and apparatus for identity theft prevention

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US47317503P 2003-05-22 2003-05-22
US10/850,975 US7840459B1 (en) 2003-05-22 2004-05-21 Method and apparatus for identity theft prevention
US12/905,982 US20110087574A1 (en) 2003-05-22 2010-10-15 Method and apparatus for identity theft prevention

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/850,975 Continuation US7840459B1 (en) 2003-05-22 2004-05-21 Method and apparatus for identity theft prevention

Publications (1)

Publication Number Publication Date
US20110087574A1 true US20110087574A1 (en) 2011-04-14

Family

ID=43087349

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/850,975 Active 2027-05-08 US7840459B1 (en) 2003-05-22 2004-05-21 Method and apparatus for identity theft prevention
US12/905,982 Abandoned US20110087574A1 (en) 2003-05-22 2010-10-15 Method and apparatus for identity theft prevention

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/850,975 Active 2027-05-08 US7840459B1 (en) 2003-05-22 2004-05-21 Method and apparatus for identity theft prevention

Country Status (1)

Country Link
US (2) US7840459B1 (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8359278B2 (en) 2006-10-25 2013-01-22 IndentityTruth, Inc. Identity protection
US9292850B2 (en) 2007-09-10 2016-03-22 Visa U.S.A. Inc. Host capture
US8219489B2 (en) 2008-07-29 2012-07-10 Visa U.S.A. Inc. Transaction processing using a global unique identifier
US9652802B1 (en) 2010-03-24 2017-05-16 Consumerinfo.Com, Inc. Indirect monitoring and reporting of a user's credit data
US9619801B2 (en) * 2010-08-02 2017-04-11 Stanton Management Group, Inc. User positive approval and authentication services (UPAAS)
CA2827478C (en) 2011-02-18 2020-07-28 Csidentity Corporation System and methods for identifying compromised personally identifiable information on the internet
US8819793B2 (en) 2011-09-20 2014-08-26 Csidentity Corporation Systems and methods for secure and efficient enrollment into a federation which utilizes a biometric repository
US11030562B1 (en) 2011-10-31 2021-06-08 Consumerinfo.Com, Inc. Pre-data breach monitoring
US8812387B1 (en) 2013-03-14 2014-08-19 Csidentity Corporation System and method for identifying related credit inquiries
US10339527B1 (en) 2014-10-31 2019-07-02 Experian Information Solutions, Inc. System and architecture for electronic fraud detection
US11151468B1 (en) 2015-07-02 2021-10-19 Experian Information Solutions, Inc. Behavior analysis using distributed representations of event data
US10699028B1 (en) 2017-09-28 2020-06-30 Csidentity Corporation Identity security architecture systems and methods
US10896472B1 (en) 2017-11-14 2021-01-19 Csidentity Corporation Security and identity verification system and architecture

Citations (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5708422A (en) * 1995-05-31 1998-01-13 At&T Transaction authorization and alert system
US5774882A (en) * 1992-03-12 1998-06-30 Keen; Regina D. Credit approval system
US20010053239A1 (en) * 1997-11-12 2001-12-20 Jasper Consulting, Inc. Credit card fraud elimination system
US20020013711A1 (en) * 2000-04-14 2002-01-31 Arun Ahuja Method and system for notifying customers of transaction opportunities
US6347307B1 (en) * 1999-06-14 2002-02-12 Integral Development Corp. System and method for conducting web-based financial transactions in capital markets
US20020023054A1 (en) * 2000-04-13 2002-02-21 Gillespie Kenneth E. Method and system for protecting credit card transactions
US20020046152A1 (en) * 2000-07-19 2002-04-18 Kinney Catherine R. Method and system for credit authorization in a member exchange
US20020073344A1 (en) * 2000-12-08 2002-06-13 Maritzen L. Michael Method and apparatus for preventing an unauthorized transaction
US20020087460A1 (en) * 2001-01-04 2002-07-04 Hornung Katharine A. Method for identity theft protection
US20030046237A1 (en) * 2000-05-09 2003-03-06 James Uberti Method and system for enabling the issuance of biometrically secured online credit or other online payment transactions without tokens
US20030163413A1 (en) * 2002-02-28 2003-08-28 Wiczkowski Frank T. Method of conducting anonymous transactions over the internet
US20040006537A1 (en) * 2002-03-04 2004-01-08 First Data Corporation Method and system for processing credit card related transactions
US20040054619A1 (en) * 2002-09-18 2004-03-18 Watson Tamara C. Methods and apparatus for evaluating a credit application
US20040153663A1 (en) * 2002-11-01 2004-08-05 Clark Robert T. System, method and computer program product for assessing risk of identity theft
US20050021476A1 (en) * 2001-07-06 2005-01-27 Candella George J. Method and system for detecting identify theft in non-personal and personal transactions
US20050071282A1 (en) * 2003-09-29 2005-03-31 Lu Hongqian Karen System and method for preventing identity theft using a secure computing device
US20050144143A1 (en) * 2003-09-03 2005-06-30 Steven Freiberg Method and system for identity theft prevention, detection and victim assistance
US20050165667A1 (en) * 2004-01-27 2005-07-28 Cox George C. System and method for customer video authentication to prevent identity theft
US6931380B2 (en) * 1998-04-27 2005-08-16 Aurora Wireless Technologies, Ltd. System and method for detecting high credit risk customers
US20050209914A1 (en) * 1999-06-22 2005-09-22 Nguyen Justin T System and method for enterprise event marketing and management automation
US20070061256A1 (en) * 2000-03-16 2007-03-15 Harexinfotech, Inc. Optical payment transceiver and system using the same
US7240363B1 (en) * 1999-10-06 2007-07-03 Ellingson Robert E System and method for thwarting identity theft and other identity misrepresentations
US20070198405A1 (en) * 1999-11-05 2007-08-23 American Express Travel Related Services Company, Inc. Systems and methods for facilitating commercial transactions between parties residing at remote locations
US20080235043A1 (en) * 2005-03-29 2008-09-25 Alexander Goulandris System and Method For Communicating Messages Between Users of a System
US7686214B1 (en) * 2003-05-12 2010-03-30 Id Analytics, Inc. System and method for identity-based fraud detection using a plurality of historical identity records
US7792715B1 (en) * 2002-09-21 2010-09-07 Mighty Net, Incorporated Method of on-line credit information monitoring and control
US20110125645A1 (en) * 2001-05-29 2011-05-26 American Express Travel Related Services Company, System and method for facilitating a subsidiary card account

Patent Citations (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5774882A (en) * 1992-03-12 1998-06-30 Keen; Regina D. Credit approval system
US5708422A (en) * 1995-05-31 1998-01-13 At&T Transaction authorization and alert system
US20010053239A1 (en) * 1997-11-12 2001-12-20 Jasper Consulting, Inc. Credit card fraud elimination system
US6931380B2 (en) * 1998-04-27 2005-08-16 Aurora Wireless Technologies, Ltd. System and method for detecting high credit risk customers
US6347307B1 (en) * 1999-06-14 2002-02-12 Integral Development Corp. System and method for conducting web-based financial transactions in capital markets
US20050209914A1 (en) * 1999-06-22 2005-09-22 Nguyen Justin T System and method for enterprise event marketing and management automation
US7240363B1 (en) * 1999-10-06 2007-07-03 Ellingson Robert E System and method for thwarting identity theft and other identity misrepresentations
US7756785B2 (en) * 1999-11-05 2010-07-13 American Express Travel Related Services Company, Inc. Systems and methods for facilitating commercial transactions between parties residing at remote locations
US7426492B1 (en) * 1999-11-05 2008-09-16 American Express Travel Related Services Company, Inc. Systems and methods for facilitating commercial transactions between parties residing at remote locations
US20070198405A1 (en) * 1999-11-05 2007-08-23 American Express Travel Related Services Company, Inc. Systems and methods for facilitating commercial transactions between parties residing at remote locations
US20070061256A1 (en) * 2000-03-16 2007-03-15 Harexinfotech, Inc. Optical payment transceiver and system using the same
US20020023054A1 (en) * 2000-04-13 2002-02-21 Gillespie Kenneth E. Method and system for protecting credit card transactions
US20020013711A1 (en) * 2000-04-14 2002-01-31 Arun Ahuja Method and system for notifying customers of transaction opportunities
US20030046237A1 (en) * 2000-05-09 2003-03-06 James Uberti Method and system for enabling the issuance of biometrically secured online credit or other online payment transactions without tokens
US20020046152A1 (en) * 2000-07-19 2002-04-18 Kinney Catherine R. Method and system for credit authorization in a member exchange
US20020073344A1 (en) * 2000-12-08 2002-06-13 Maritzen L. Michael Method and apparatus for preventing an unauthorized transaction
US20020087460A1 (en) * 2001-01-04 2002-07-04 Hornung Katharine A. Method for identity theft protection
US20110125645A1 (en) * 2001-05-29 2011-05-26 American Express Travel Related Services Company, System and method for facilitating a subsidiary card account
US20050021476A1 (en) * 2001-07-06 2005-01-27 Candella George J. Method and system for detecting identify theft in non-personal and personal transactions
US20030163413A1 (en) * 2002-02-28 2003-08-28 Wiczkowski Frank T. Method of conducting anonymous transactions over the internet
US20040006537A1 (en) * 2002-03-04 2004-01-08 First Data Corporation Method and system for processing credit card related transactions
US20040054619A1 (en) * 2002-09-18 2004-03-18 Watson Tamara C. Methods and apparatus for evaluating a credit application
US7356506B2 (en) * 2002-09-18 2008-04-08 General Electric Capital Corporation Methods and apparatus for evaluating a credit application
US7792715B1 (en) * 2002-09-21 2010-09-07 Mighty Net, Incorporated Method of on-line credit information monitoring and control
US20110270727A1 (en) * 2002-09-21 2011-11-03 Sheldon Kasower Systems and methods of on-line credit information monitoring and control
US20040153663A1 (en) * 2002-11-01 2004-08-05 Clark Robert T. System, method and computer program product for assessing risk of identity theft
US7686214B1 (en) * 2003-05-12 2010-03-30 Id Analytics, Inc. System and method for identity-based fraud detection using a plurality of historical identity records
US20050144143A1 (en) * 2003-09-03 2005-06-30 Steven Freiberg Method and system for identity theft prevention, detection and victim assistance
US20050071282A1 (en) * 2003-09-29 2005-03-31 Lu Hongqian Karen System and method for preventing identity theft using a secure computing device
US20050165667A1 (en) * 2004-01-27 2005-07-28 Cox George C. System and method for customer video authentication to prevent identity theft
US20080235043A1 (en) * 2005-03-29 2008-09-25 Alexander Goulandris System and Method For Communicating Messages Between Users of a System

Also Published As

Publication number Publication date
US7840459B1 (en) 2010-11-23

Similar Documents

Publication Publication Date Title
US20110087574A1 (en) Method and apparatus for identity theft prevention
US11803846B2 (en) Securing external systems with account token substitution
US11416866B2 (en) Systems and methods for data desensitization
US10460382B2 (en) Fraud reduction system for transactions
US20180240115A1 (en) Methods and systems for payments assurance
RU2699686C1 (en) Use of improved card holder authentication token
US8768837B2 (en) Method and system for controlling risk in a payment transaction
US9916578B2 (en) Method and system for processing internet purchase transactions
US8296232B2 (en) Systems and methods for screening payment transactions
US8170953B1 (en) Systems and method for screening payment transactions
US20120203698A1 (en) Method and System for Fraud Detection and Notification
US20110173122A1 (en) Systems and methods of bank security in online commerce
US20100229245A1 (en) System of security that prevents abuse of identity data in global commerce via mobile wireless authorizations
AU2011207602B2 (en) Verification mechanism
US11429966B1 (en) Dynamic code payment card verification methods and systems
US11847620B1 (en) Math based currency credit card
AU2010276370B2 (en) An apparatus including data bearing medium for seasoning a device using data obtained from multiple transaction environments
Khattri et al. Development of integrated distance authentication and fingerprint authorization mechanism to reduce fraudulent online transaction
Parusheva Card-not-present fraud–challenges and counteractions
Peters Emerging ecommerce credit and debit card protocols
US20070156606A1 (en) Method of securing a check transaction
Dhameja et al. Clarifying liability for twenty-first-century payment fraud
Dhakade et al. Review on Fraud Detection in Electronic Payment Gateway
CN117642761A (en) Hosted point-of-sale service
Javani et al. A New Credit Card Payment System Based on 3D-Secureᵀᴹ Using One-time-use Transaction Numbers

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION