US20120130898A1 - Mobile directory number and email verification of financial transactions - Google Patents

Mobile directory number and email verification of financial transactions Download PDF

Info

Publication number
US20120130898A1
US20120130898A1 US13/382,900 US201013382900A US2012130898A1 US 20120130898 A1 US20120130898 A1 US 20120130898A1 US 201013382900 A US201013382900 A US 201013382900A US 2012130898 A1 US2012130898 A1 US 2012130898A1
Authority
US
United States
Prior art keywords
data
email
financial
financial transaction
wireless device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/382,900
Inventor
Randall A. Snyder
Thomas S. Ginter
Michael F. Buhrmann
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Visa International Service Association
Original Assignee
FINSPHERE Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by FINSPHERE Inc filed Critical FINSPHERE Inc
Priority to US13/382,900 priority Critical patent/US20120130898A1/en
Assigned to FINSPHERE, INC. reassignment FINSPHERE, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GINTER, THOMAS S, BUHRMANN, MICHAEL F, SNYDER, RANDALL A
Publication of US20120130898A1 publication Critical patent/US20120130898A1/en
Assigned to VISA INTERNATIONAL SERVICE ASSOCIATION reassignment VISA INTERNATIONAL SERVICE ASSOCIATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FINSPHERE CORPORATION
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • G06Q20/3223Realising banking transactions through M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • G06Q20/3224Transactions dependent on location of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/42Confirmation, e.g. check or permission by the legal debtor of payment
    • G06Q20/425Confirmation, e.g. check or permission by the legal debtor of payment using two different networks, one for transaction and one for security confirmation

Definitions

  • CNP fraud Card-not-present (CNP) and card-present (CP) financial fraud is an increasing problem that plagues the financial industry.
  • CNP transactions the customer's card is not physically available for a merchant to inspect.
  • the merchant must rely on the cardholder (or someone purporting to be the cardholder) to present the information on the card by some indirect means, whether by mail, telephone or over the Internet when the cardholder is not present at the point of sale.
  • CNP fraud solutions continue to be introduced such as Address Verification Service (AVS), Visa® Advanced Authorization (VAA), and MasterCard SecureCode®
  • AVS Address Verification Service
  • VAA Visa® Advanced Authorization
  • MasterCard SecureCode® Online fraud continues to grow at a rapid pace.
  • CP transactions the customer's card is available for a merchant to inspect, but various means of counterfeiting cards have emerged.
  • Multiple CP fraud solutions continue to be introduced, such as predictive analytics solutions, decisioning solutions and rules-based solutions. However, CP fraud also continues to grow.
  • Card-based financial fraud may occur, for example, when a payment instrument is stolen.
  • Payment instruments include credit card account numbers, debit card account numbers and the like. Using stolen account numbers, purchases may be made or new fraudulent accounts may be established using additional personal data, whether that personal data is legitimate or not.
  • fraudulent merchant accounts may be established based on collusion of fraudulent buyers and sellers using stolen payment instruments.
  • financial fraud using stolen payment instruments may occur for a variety of circumstances, including, but not limited to, first-time orders on a merchant website where a new account profile is registered, first-time orders on a merchant website where account profiles are not required to be registered and subsequent orders on a merchant website with an existing account profile where the existing account profile has been previously used.
  • a telephone directory number is the actual dialable phone number used to call a person on a telephone.
  • An MDN is the dialable phone number used to call a person on a mobile phone.
  • Email addresses are typically required to be provided to an online merchant when making a retail purchase over the Internet. In many cases, these unique means of communicating with individuals are also associated with personal information associated with a financial account, such as a debit card or credit card account with a bank or financial institution. Many financial institutions require telephone numbers, email addresses or both to be associated with a person's account so they can be contacted by the institution for a variety of purposes, such as marketing of bank products, alerting for changes in account status, when financial fraud is suspected or other reasons.
  • Telephone directory numbers and MDNs can be up to 15 digits long and are unique numbers worldwide. These numbers are associated with both a unique individual as well as a telecommunications network carrier that services particular numbers. Similarly, email addresses are also associated with both a unique individual and an email service provider. Because of this uniqueness, telephone numbers (both mobile and wireline) as well as email addresses can be considered an extension of the unique identity of a person in many cases.
  • the 15-digit directory number format for all directory numbers worldwide is internationally standardized by the International Telecommunications Union (ITU) in ITU - T Recommendation E. 164 —The International Public Telecommunication Numbering Plan .
  • the format of this standardized number is comprised of a 1- to 3-digit country code (CC) and a national significant number.
  • the national significant number is comprised of a national destination code (NDC) and a subscriber number (SN).
  • NDC national destination code
  • SN subscriber number
  • access to these numbers may provide geographic information that may be pertinent to the identity and whereabouts of a person associated with the numbers.
  • the email address format for all email addresses worldwide is internationally standardized by the Internet Engineering Task Force in Request For Comment ( RFC ) 5321 Simple Mail Transfer Protocol and RFC 5322 Internet Message Format .
  • the format of this standardized email address is “local-part@domain.”
  • the value of the “local-part” portion of the address typically indicates the name of an individual that is the email user, but can take on a variety characters.
  • the value of the “domain” portion of the address typically indicates the name of an organization associated with the email user, but can also take on a variety characters.
  • the character strings that make up the entire email address may provide information that is pertinent to the identity of a person associated with the address.
  • Card associations and payment networks such as Visa®, MasterCard®, American Express®, Discover® and others, rely on a combination of fraud detection tools to combat financial fraud. For example, an analysis of Internet data and order parameters as well as address verification, customer behavior analysis, screening mechanisms, rules based algorithms, etc. may lead to the conclusion that a particular online order is suspect.
  • An object of an embodiment of the present invention is to provide a system, and its methods of use, to detect fraudulent transactions based on information derived from a payment network pertaining to payment transactions, information derived from a wireless network pertaining to particular wireless device IDs (e.g. mobile directory numbers) and information derived from a financial institution pertaining to cardholders associated with financial accounts.
  • the invention relates generally to protecting the identity of a cardholder and detecting identity theft by using the wireless device ID of the cardholder's wireless device (e.g. mobile phone) and validating that wireless device ID using data obtained from a payment network and a financial institution pertaining to the cardholder. This data may be used to validate the wireless device ID obtained from the payment network where such validation may be used for a variety of applications, such as assisting in the detection and prevention of identity theft, fraudulent behavior or activity that may be engaged in by a purported cardholder.
  • Another object of an embodiment of the present invention is to provide a system, and its methods of use, to detect fraudulent transactions based on information derived from a payment network pertaining to payment transactions, information derived from a wireless network pertaining to particular wireless device IDs (e.g. MDNs) and information derived from a financial institution pertaining to cardholders associated with financial accounts.
  • Data pertaining to the wireless device ID obtained from a wireless network 102 and data pertaining to the cardholder obtained from a financial institution can be used as the basis for a statistical analysis, resulting in an identity risk value.
  • Data that may be obtained and derived include the wireless device ID (e.g.
  • supplementary subscription data associated with the wireless device such as the network serving the wireless device, age of the subscription, name on the subscription, porting history of the directory number, and subscribed supplementary features (e.g. call forwarding), may be indicative of financial fraud. This data may be used for a variety of applications, such as assisting in the detection and prevention of identity theft, fraudulent behavior or activity that may be engaged in by a purported cardholder.
  • Yet another object of an embodiment of the present invention is to provide a system, and its methods of use, to detect fraudulent transactions based on information derived from a payment network pertaining to payment transactions, information derived from a financial institution pertaining to cardholders associated with financial accounts and information derived from an email service provider pertaining to particular email addresses and Internet Protocol (IP) data pertaining to cardholders associated with email accounts.
  • IP Internet Protocol
  • This data may be used to validate the email address data obtained from the payment network where such validation may be used for a variety of applications, such as assisting in the detection and prevention of identity theft, fraudulent behavior or activity that may be engaged in by a purported cardholder.
  • Yet another object of an embodiment of the present invention is to provide a system, and its methods of use, to detect fraudulent transactions based on information derived from a payment network pertaining to payment transactions, information derived from a financial institution pertaining to cardholders associated with financial accounts and information derived from an email service provider pertaining to particular email addresses and Internet Protocol (IP) data pertaining to cardholders associated with email accounts.
  • IP Internet Protocol
  • Data pertaining to the email addresses obtained from a financial institution and data pertaining to the cardholder obtained from an email service provider can be used as the basis for a statistical analysis, resulting in an identity risk value.
  • Data that may be obtained and derived include the email address, IP address data associated with the email address and the format and characteristics of the email address itself.
  • IP address data may be indicative of financial fraud as IP address data may be indicative of location data where an email account has been accessed by an individual. This data may be used for a variety of applications, such as assisting in the detection and prevention of identity theft, fraudulent behavior or activity that may be engaged in by a purported cardholder.
  • Yet another object of an embodiment of the present invention is to provide a system, and its method of use, for detecting identity theft based on analysis of a multiplicity of provided and stored parameters associated with derived locations, historical locations, supplementary subscription data about a wireless device ID (e.g. MDN) associated with a wireless device, historical use of a particular wireless device ID, derived data about an email address, historical use of an email address, IP address data and historical patterns of locations and use of MDNs and email addresses.
  • a wireless device ID e.g. MDN
  • a further exemplary embodiment of the present invention applies to and has utility for detecting and preventing identity theft.
  • Identity theft occurs, for example, when an individual's identity credentials are compromised, or otherwise stolen, by perpetrators of fraud. These perpetrators use the identity credentials of individual victims to obtain some financial or other benefit at a cost to the victim.
  • FIG. 1 depicts the functional entities and modules of an exemplary Mobile Directory Number and Email Transaction Verification System formed in accordance with an embodiment of the present invention. Included in the example is a Transaction Verification Processing Module, a Wireless Device Location Module, an Identity Database, one or more Wireless Network Data Logic Resources and one or more Email Data Logic Resources in accordance with the principles of the present invention.
  • FIG. 2 depicts an exemplary Identity Database used to associate unique financial account (card) numbers, wireless device IDs (e.g. MDNs) and email addresses with wireless network derived location data, wireless network derived supplemental data (e.g. subscription data), email service provider data and identity risk values.
  • card unique financial account
  • wireless device IDs e.g. MDNs
  • email addresses e.g. email addresses
  • wireless network derived location data e.g. MDNs
  • wireless network derived supplemental data e.g. subscription data
  • email service provider data e.g. email service provider data
  • FIG. 3 depicts exemplary Wireless Network Data Logic Resources including wireless device location data, wireless network supplemental data (e.g. subscription data) and one or more logic resources.
  • wireless network supplemental data e.g. subscription data
  • FIG. 4 depicts exemplary Email Data Logic Resources including IP address data and one or more logic resources.
  • FIG. 5 depicts an exemplary flow diagram of the Mobile Directory Number and Email Transaction Verification System using Wireless Network Data Logic Resources.
  • FIG. 6 depicts an exemplary flow diagram of the Mobile Directory Number and Email Transaction Verification System using Email Data Logic Resources.
  • FIG. 7 depicts an exemplary information flow chart disclosing operation of the embodiments of the Mobile Directory Number and Email Transaction Verification System using Wireless Network Data Logic Resources.
  • FIG. 8 depicts an exemplary information flow chart disclosing operation of the embodiments of the Mobile Directory Number and Email Transaction Verification System using Email Data Logic Resources.
  • FIG. 9 depicts computer system components of an exemplary Mobile Directory Number and Email Transaction Verification System including a computer processor, communications interface and memory components where the exemplary functional entities and modules of the Mobile Directory Number and Email Transaction Verification System reside in an example embodiment.
  • FIG. 1 depicts the functional entities and modules of an exemplary Mobile Directory Number and Email Transaction Verification System 100 .
  • FIG. 1 shows a block diagram of a system for Mobile Directory Number and Email Transaction Verification. (The System 100 may also be referred to as a Mobile Directory Number and Email Transaction Verification System.) Embodiments of the Mobile Directory Number and Email Transaction Verification System 100 , based upon information received from a payment network 118 , a wireless network 102 , an account holder profile at a financial institution 116 and an account holder profile at an email service provider 114 , and optionally other information, assess the likelihood that a financial transaction is fraudulent.
  • Examples of financial transactions that may cause information to be received from a payment network 118 include the purchase of a product or service using a credit card or the like, where the product or service is purchased by an account holder at a particular location (point of purchase) or at a remote location (such as a “mail order” purchase, “telephone order” purchase or purchase from an Internet website).
  • Point of purchase transactions may include, for example, use of a debit card or credit card to obtain cash from an automatic teller machine (ATM) or use of a debit card or credit card to purchase products or services at a point of sale employing an electronic point of sale terminal.
  • ATM automatic teller machine
  • embodiments of the Mobile Directory Number and Email Transaction Verification System 100 may be configured to provide an assessment of the likelihood of fraud for any type of financial transaction.
  • an exemplary Mobile Directory Number and Email Transaction Verification System 100 used to verify financial transactions based on a mobile directory number (MDN) received from one of a payment network 118 , an account holder profile from a financial institution 116 or both.
  • MDN mobile directory number
  • the Mobile Directory Number and Email Transaction Verification System 100 may be used to verify financial transactions based on an email address, IP address data or both received from one of a payment network 118 , an account holder profile from a financial institution 116 or both.
  • the example depicts a Transaction Verification Processing Module 104 , a Wireless Device Location Module 112 , an Identity Database 106 , one or more Wireless Network Data Logic Resources 108 and one or more Email Data Logic Resources 110 in accordance with the principles of the present invention.
  • the Wireless Device Location Module 112 supports communications used to receive, or request and receive, location data and supplementary wireless network data, such as wireless device subscription data associated with a particular wireless device, from the wireless network 102 .
  • the Transaction Verification Processing Module 104 obtains financial transaction data from a payment network 118 that may be associated with a financial transaction made by an account holder.
  • the Transaction Verification Processing Module 104 also obtains account number data and optionally one or more of mobile directory number (MDN) data, email address data and IP address data associated with the account holder making the financial transaction.
  • MDN mobile directory number
  • the account number data, MDN data, email address data and IP address data may have been previously provided to the payment network 118 in a variety of ways.
  • the account number data, MDN data and email address data may be provided directly by an account holder, for example, into an Internet website form displayed on a computing device 120 while making a purchase for a product or service.
  • IP address data may be provided, for example, directly by an online merchant which may be obtained from a computer such as the computing device 120 associated with an online Internet session with the online merchant.
  • the Transaction Verification Processing Module 104 receives the account number data, optional MDN data, optional email address data and optional IP address data pertaining to a financial transaction and passes this data to the Identity Database 106 .
  • This data pertaining to the account holder making the financial transaction may or may not have been previously stored in the Identity database 106 .
  • the Identity Database 106 stores the received data for use in the financial transaction verification process.
  • the Transaction Verification Processing Module 104 sends the received account number data pertaining to a financial transaction to the financial institution 116 , along with a request for additional account profile data associated with the account holder.
  • the financial institution 116 maintains an account profile for the account number associated with the account holder making the financial transaction.
  • the additional account profile data requested from the financial institution 116 may include one or more of the previously stored account holder's MDN, other phone numbers associated with the account (such as additional mobile, home or business phone numbers) and one or more email addresses.
  • the financial institution 116 responds to this request for data by sending one or more of the previously stored account holder's MDN, other phone numbers associated with the account and one or more email addresses.
  • the Transaction Verification Processing Module 104 receives this additional account profile data, it passes the data to the Identity Database 106 for storage and use for the financial transaction verification process.
  • a first embodiment of the Mobile Directory Number and Email Transaction Verification System 100 may be based upon a query-response communication mechanism between the Mobile Directory Number and Email Transaction Verification System 100 and the payment network 118 that requests validation of the MDN supplied and associated with a financial transaction. If an MDN associated with a financial transaction is obtained via the payment network 118 and an MDN associated with the financial account corresponding to the financial transaction is obtained via the account holder profile from the financial institution 116 , the obtained MDNs may be analyzed and compared. This analysis and comparison may be performed by the Transaction Verification Processing Module 104 itself or another module within the Mobile Directory Number and Email Verification System 100 without deviating from the principles of the present invention.
  • the financial transaction may be verified if the result of the analysis and comparison reveals that the received MDNs are identical. If the obtained MDNs are not identical, an indication that the financial transaction was performed by an individual other than the actual account holder may be deduced. At this point, an indication that the financial transaction is either verified or not verified may be passed to the payment network 118 , which may or may not result in the financial transaction being either authorized or declined.
  • the Mobile Directory Number and Email Transaction Verification System 100 may be based upon a query-response communication mechanism between the Mobile Directory Number and Email Transaction Verification System 100 and the payment network 118 that requests validation of the email address supplied and associated with a financial transaction. If an email address associated with the financial transaction is obtained via the payment network 118 and an email address associated with the financial account corresponding to the financial transaction is obtained via the account holder profile from the financial institution 116 , the obtained email addresses may be analyzed and compared. This analysis and comparison may be performed by the Transaction Verification Processing Module 104 itself or another module within the Mobile Directory Number and Email Verification System 100 without deviating from the principles of the present invention. The financial transaction may be verified if the result of the analysis and comparison reveals that received email addresses are identical.
  • an indication that the financial transaction was performed by an individual other than the actual account holder may be deduced.
  • an indication that the financial transaction is either verified or not verified may be passed to the payment network 118 , which may or may not result in the financial transaction being either authorized or declined.
  • the first embodiment generally does not require location data, or other wireless network supplementary subscription data for the provided MDN. Furthermore, the first embodiment generally does not require IP address-based location data for the provided email address. This embodiment functions without the need for wireless network connectivity for location queries or supplementary wireless network subscription data queries associated with the MDN and without the need for email service provider connectivity for historical IP address data. If the MDN, email address or both is deemed valid and a match with the respective MDN, email address or both associated with the financial transaction, then no further action may need to be taken.
  • An alternate embodiment includes the addition of wireless network location data and/or wireless network supplementary subscription data obtained from a wireless network 102 , other telephone directory number data associated with the MDN of the account holder obtained from the financial institution 116 and IP address data obtained from the email service provider 114 as part of the Mobile Directory Number and Email Transaction Verification System 100 .
  • This alternate embodiment includes connectivity to the wireless network 102 serving the wireless device 124 associated with the MDN and/or connectivity to the email service provider 114 associated with the email address.
  • This alternate embodiment has the benefit of adding value to the Mobile Directory Number and Email Transaction Verification System 100 for the verification and analysis of an MDN and/or email address associated with a financial transaction provided in the first embodiment.
  • a request may be made to the wireless network 102 for location data and supplementary subscription data for the provided MDN.
  • This request may be made, for example, by the Transaction Verification Processing Module 104 via the Wireless Device Location Module 112 using the MDN obtained, for example, from the payment network 118 or the account holder profile from the financial institution 116 .
  • the Transaction Verification Processing Module 104 passes the wireless device ID (e.g.
  • Wireless Device Location Module 112 that is used to obtain the location of a wireless device such as the wireless device 124 , for example, and optionally supplementary data associated with a wireless network subscription, from the wireless network 102 .
  • the Wireless Device Location Module 112 requests wireless device location data and/or wireless network supplementary subscription data from the wireless network 102 .
  • the wireless network 102 may obtain this data, for example, from a network supplemental information system 126 .
  • the wireless network 102 responds to the request from the Wireless Device Location Module 112 for wireless device location data and/or wireless network supplementary subscription data.
  • Wireless device location data provided from the wireless network 102 may include current or last known location data pertaining to the wireless device 124 .
  • a request may be made to the email service provider 114 for historical IP address data for the provided email address.
  • This request may be made, for example, by the Transaction Verification Processing Module 104 using the email address obtained, for example, from the payment network 118 or the account holder profile at the financial institution 116 .
  • the Transaction Verification Processing Module 104 passes the email address associated with the financial transaction to the email service provider 114 to request historical IP address data from the email service provider 114 .
  • the email service provider 114 may obtain this data, for example, from the account holder profile associated with the email address.
  • IP address data provided from the email service provider may include previous IP addresses from which the email account associated with the provided email address was accessed and the date and time associated with the IP address from which the email account was accessed.
  • Non-limiting examples of wireless device location data that may be available and obtained from the wireless network 102 pertaining to the MDN obtained from the payment network 118 or obtained from the account holder profile at the financial institution 116 include:
  • Non-limiting examples of one or more of the following wireless network supplementary subscription data may be available and obtained from the wireless network 102 or from other telecommunications networks.
  • the supplementary subscription data may pertain to other obtained directory numbers associated with the account holder that were obtained via the account holder profile at the financial institution 116 , to the MDN obtained from the payment network 118 , or to the MDN obtained from the account holder profile at the financial institution 116 .
  • These non-limiting examples include:
  • wireless supplementary subscription data may be obtained from a wireless network 102 or other telecommunications networks, and the methods and formats for which this data is provided.
  • Non-limiting examples of one or more of the following geographic location data that may be derived from the format of the obtained MDN, or other obtained directory numbers associated with the account holder and obtained via the account holder profile at the financial institution 116 , are:
  • the derivation of geographic location data from the CC and/or NDC of one or more obtained directory numbers may occur, for example, at the Transaction Verification Processing Module 104 itself or another module within the Mobile Directory Number and Email Verification System 100 without deviating from the principles of the present invention.
  • Those of ordinary skill in the art will understand and appreciate these example types of data that may be derived about the format of a directory number and the methods for which this data is derived.
  • IP address data may be available and obtained from an email service provider pertaining to the email address obtained from the payment network 118 or obtained from the account holder profile at the financial institution 116 are:
  • the derivation of geographic location data from the IP address may occur, for example, at the Transaction Verification Processing Module 104 itself or another module within the Mobile Directory Number and Email Verification System 100 without deviating from the principles of the present invention.
  • Those of ordinary skill in the art will understand and appreciate these example types of data that may be derived about the format of an IP address and the methods for which this data is derived.
  • Non-limiting examples of one or more of the following identity information data that may be derived from the format of an obtained email address associated with an account holder and pertaining to the email address obtained from the payment network 118 or obtained from an account holder profile at the financial institution 116 are:
  • the derivation of identity data from the local-part and/or domain of one or more obtained email addresses may occur, for example, at the Transaction Verification Processing Module 104 itself or another module within the Mobile Directory Number and Email Verification System 100 without deviating from the principles of the present invention.
  • identity data may be derived about the format of an email address and the methods for which this data is derived.
  • the Wireless Device Location Module 112 passes the wireless device location data and wireless network supplementary subscription data associated with the MDN to the Identity Database 106 directly or indirectly via the Transaction Verification Processing Module 104 for storage and use for the financial transaction verification process.
  • the geographic location data derived from the format of the obtained directory numbers e.g. CC and NDC, are also passed to the Identity Database 106 for storage and use for the financial transaction verification process.
  • the Transaction Verification Processing Module 104 passes the obtained IP address data and email address data associated with the email address to the Identity Database 106 , directly or indirectly, for storage and use for the financial transaction verification process.
  • the Transaction Verification Processing Module 104 and the Identity Database 106 provide the appropriate data and parameters associated with the MDN to the Wireless Network Data Logic Resources 108 to determine an Identity Risk Value 216 associated with a financial transaction and an individual associated with the financial transaction and represented by the MDN. Similarly, the Transaction Verification Processing Module 104 and the Identity Database 106 provide the appropriate data and parameters associated with the email address to the Email Data Logic Resources 110 to determine an Identity Risk Value 216 associated with a financial transaction and an individual associated with the financial transaction and represented by the email address.
  • the Identity Risk Value 216 may be determined using data and parameters in a manner as described with respect to FIGS. 3 and 4 , for example.
  • the data may be provided directly to one or more Wireless Network Data Logic Resources 108 and/or one or more Email Data Logic Resources 110 by the appropriate modules or databases, or via the Transaction Verification Processing Module 104 .
  • One or more Wireless Network Data Logic Resources 108 and/or one or more Email Data Logic Resources 110 are used to calculate, generate or otherwise determine an Identity Risk Value 216 pertaining to the financial transaction. If both Wireless Network Data Logic Resources 108 and Email Data Logic Resources are used independently to calculate, generate or otherwise determine an Identity Risk Value 216 pertaining to the financial transaction, the resulting multiple identity risk values may be, for example, statistically merged, averaged or otherwise combined into a single identity risk value.
  • the resulting multiple identity risk values may be preserved as independent results.
  • the calculations may include statistical and probabilistic algorithms to generate or otherwise determine identity risk values, thereby indicating the level of risk of a financial transaction and whether it is likely or not that the financial transaction may be fraudulent.
  • the Transaction Verification Processing Module 104 may then pass the identity risk values associated with a particular financial transaction to the payment network 118 as part of the query-response communication between the Mobile Directory Number and Email Transaction Verification System 100 and the payment network 118 .
  • the identity risk values pertaining to the financial transaction that are passed to the payment network 118 may or may not result in the financial transaction being either authorized or declined.
  • the stored identity risk values associated with a wireless device ID e.g. MDN
  • an email address may subsequently be accessed and used in additional statistical and probabilistic algorithms or calculations for utility, for example, in determining irregular or fraudulent behavior associated with other transactions.
  • the alternate embodiment of the present invention may be used in conjunction with the first embodiment of the present invention as a further analysis to attempt to verify the financial transaction, or the alternate embodiment of the present invention may be used regardless of whether the first embodiment of the present invention is employed.
  • the Mobile Directory Number and Email Transaction Verification System 100 shown in FIG. 1 can be implemented using a computer system 122 having at least one processor, at least one memory component in signal communication with the processor, and at least one communications interface in signal communication with the processor.
  • the Identity Database 106 , the Wireless Network Data Logic Resources 108 and the Email Data Logic Resources 110 can be stored in the memory, for example.
  • Programming instructions can also be stored in memory that when run by the processor cause the processor to be configured to implement the functions of the Transaction Verification Processing Module 104 and the Wireless Device Location Module 112 .
  • the Transaction Verification Processing Module 104 and the Wireless Device Location Module 112 can be implemented with different processors.
  • the communications interface can allow the processor to communicate with the wireless network 102 when running the processes of the Wireless Device Location Module 112 .
  • the communications interface can also allow the processor to receive data from the payment network 118 , the financial institution 116 and the email service provider 114 as well as to send identity risk value results to other systems. The results can be sent to systems that triggered a financial transaction or to other systems. In some embodiments, more than one communications interface can be used. It should also be understood that the Mobile Directory Number and Email Transaction Verification System 100 can be implemented in a distributed manner using a plurality of computer systems such as the computer system 122 shown in FIG. 9 , for example.
  • the Mobile Directory Number and Email Transaction Verification System 100 is used in a process of verifying an electronic financial transaction where one or more locations of the wireless device 124 and supplementary wireless network subscription data that are obtained or derived from a wireless network 102 , one or more locations derived from other telephone directory numbers that are obtained from an account holder profile at the financial institution 116 and IP address data that are obtained from an account holder profile at the email service provider 114 are incorporated into the Wireless Network Data Logic Resources 108 and Email Data Logic Resources 110 to generate an identity risk value, to assist in creating a statistical model that can determine a likelihood that a financial transaction is fraudulent.
  • the Mobile Directory Number and Email Transaction Verification System 100 can be used with any type of electronic financial transaction. Two non-limiting example types of financial transactions of interest are card-not-present (CNP) and card present (CP) financial transactions.
  • CNP card-not-present
  • CP card present
  • the financial transaction can be triggered by various types of financial applications.
  • a consumer desiring to make a purchase, withdraw money, transfer money between accounts, etc. can initiate an electronic financial transaction by using a computer network such as the Internet.
  • the consumer can enter payment information such as a credit card or debit card account number, the consumer's MDN, the consumer's email address, the consumer's name and the consumer's address using an input device in signal communication with a computer used by the consumer.
  • the payment information can then be transmitted to a computerized payment network 118 associated with a bank.
  • the consumer can use a payment instrument, such as a credit card or debit card, containing an account number at an electronic point-of-sale terminal associated with a retail merchant.
  • the payment information can then be transmitted to a computerized payment network 118 associated with a bank.
  • the payment network 118 can generate a financial transaction by sending financial transaction data that includes the consumer's MDN to the Mobile Directory Number and Email Transaction Verification System 100 .
  • the Mobile Directory Number and Email Transaction Verification System 100 receives the financial transaction data through the communications interface.
  • a processor configured to implement the functions of the Transaction Verification Processing Module 104 and the Wireless Device Location Module 112 requests information pertaining to a device associated with the consumer's MDN from the wireless network 102 . This information may include a location of the device, for example.
  • the processor generates identity risk values based on at least one of the Wireless Network Data Logic Resources 108 , Email Data Logic Resources 110 and Identity Database 106 .
  • the processor then sends a response based on the identity risk value back to the payment network 118 .
  • a payment processing system associated with the payment network 118 or the retail merchant Based upon the received information provided by the Mobile Directory Number and Email Transaction Verification System 100 , the payment network 118 , a payment processing system associated with the payment network 118 or the retail merchant generates an acceptance decision based on the response and, in some cases, other predetermined criteria. If the acceptance decision is positive, the payment network 118 , a payment processing system associated with the payment network 118 or the retail merchant allows the transaction to proceed and the consumer is notified that the financial transaction was successful, such as by displaying a confirmation number on a display device in signal communication with the computer used by the consumer. If the acceptance decision is negative, the payment network 118 , a payment processing system associated with the payment network 118 or the retail merchant may not allow the financial transaction to proceed and notifies the consumer in a similar manner.
  • Embodiments of the Mobile Directory Number and Email Transaction Verification System 100 may be used to assess the likelihood of fraud of a financial transaction before the financial transaction is in progress, while the financial transaction is in progress and/or make an assessment after the financial transaction has concluded.
  • pre-authorization may be used to verify the identity of the purchaser prior to delivery of a goods or service to the purchaser. If the financial transaction pertains to a point of purchase transaction, a prior transaction approval process could be completed before the purchaser leaves the premises. As another non-limiting example, if the financial transaction pertains to an Internet purchase transaction, the transaction approval process could be completed before the purchased goods are mailed to the purchaser.
  • the likelihood of fraud of a particular financial transaction is assessed in response to receiving a request from a transaction entity that is conducting, or is associated with, the financial transaction.
  • transaction entities include payment networks, banks, credit card companies, Internet service providers and sellers of goods and/or services.
  • FIG. 2 depicts exemplary entries in the exemplary Identity Database 106 ( FIG. 1 ).
  • a first entry includes an association among an Account Number 202 , a Wireless Device ID 204 (e.g. in this case an MDN), wireless network derived Location Data 206 , wireless network derived Historical Location Data 208 including a historical location and the date and time the historical location was derived, wireless network derived Carrier Supplemental Data 210 (e.g. in this case supplementary subscription data), an Email Address 212 , email address Historical IP Address Data 214 including a historical IP address and the date and time the historical IP address was used to access an email account associated with the email address 212 and an Identity Risk Value 216 .
  • the Account Number 202 is received from the payment network 118 shown in FIG.
  • the Wireless Device ID 204 is used by the Wireless Device Location Module 106 in FIG. 1 to either request the Location Data 206 from the wireless network 102 or autonomously receive the Location Data 206 from the wireless network 102 .
  • the obtained Location Data 206 is then associated with some location context or geographic place, additional obtained Carrier Supplemental Data 210 as well as the Historical Location Date and Time 208 in the database.
  • the entries for Carrier Supplemental Data 210 may be pre-populated or otherwise derived or obtained from the wireless network 102 or supporting communications data networks.
  • the Email Address 212 is used by the Transaction Verification Processing Module 104 shown in FIG.
  • IP Address Data 214 is then associated with some location context or geographic place as well as the IP Address Date and Time 214 in the database.
  • the Historical Location Date and Time 208 contains entries representing the date and time of a particular obtained wireless device location to assist in determining, for example, an Identity Risk Value 216 .
  • the IP Address Data Date and Time 214 contains entries representing the date and time the email account associated with the email address 212 was accessed to assist in determining, for example, the Identity Risk Value 216 .
  • the Identity Risk Value 216 for the associated Account Number 202 is generated due to some previous financial transaction or process and may take on a null or default value if a value has not previously been calculated.
  • the Identity Risk Value 216 may be used in one or more Wireless Network Data Logic Resources 108 ( FIG. 1 ), one or more Email Data Logic Resources 110 ( FIG. 1 ) or both to generate subsequent Identity Risk Values that may be stored in the exemplary Identity Database 106 .
  • FIG. 3 depicts exemplary entries for one or more exemplary Wireless Network Data Logic Resources 108 shown in FIG. 1 .
  • the entries include Wireless Network Data Logic Resources Location Data 302 and Wireless Network Data Logic Resources Supplemental Data 304 .
  • the location data 302 and/or the supplemental data 304 are used to provide information and data to Logic Resources 306 that indicate particular data parameters and factors for the data parameters used by the Wireless Network Data Logic Resources 108 shown in FIG. 1 .
  • a first entry includes Location Data 302 , Supplemental Data 304 and the particular Logic Resource 306 associated with the calculation or generation of Identity Risk Values 216 in FIG. 2 .
  • the Location Data 302 is comprised of particular Locations 308 and Weighting Factors 310 for those Locations 308 associated with a particular Logic Resource 306 .
  • the Locations 308 e.g. MSCID, CID, CC, NDC, LAC, GPS or some other derived location type
  • the Locations 308 are locations associated with a Wireless Device ID (e.g. MDN) 204 as shown in FIG. 2 corresponding to a financial transaction and obtained via the payment network 118 or other telephone directory numbers associated with a financial institution account holder profile 116 in FIG. 1 , associated with some financial transaction requiring an Identity Risk Value 216 in FIG. 2 for utility, such as for detecting identity theft and financial fraud.
  • the Weighting Factors 310 are used to provide a relative value of the importance of a particular Location 308 used for a particular Logic Resource 306 .
  • the values of these Weighting Factors 310 may be changed automatically based upon the distance and time variances among any of the location and time parameters used. This enables the Wireless Network Data Logic Resources 108 shown in FIG. 1 to provide identity risk values indicating a likelihood of identity theft or financial fraud for a particular financial transaction associated with an Account Number 202 associated with a Wireless Device ID (e.g. MDN) 204 as shown in FIG. 2 .
  • the Supplemental Data 304 is comprised of particular Data Types 312 and Weighting Factors 314 for those Data Types 312 associated with a particular Logic Resource 306 .
  • the Data Types 312 are supplementary subscription data associated with a Wireless Device ID (e.g. MDN) 204 in or other telephone directory numbers associated with a financial institution account holder profile 116 , associated with some financial transaction requiring an Identity Risk Value 216 for utility, such as for detecting identity theft and financial fraud.
  • the Weighting Factors 314 are used to provide a relative value of the importance of a particular Data Type 312 used for a particular Logic Resource 306 . The values of these Weighting Factors 312 may be changed automatically based upon variances among any of the Carrier Supplemental Data 210 used.
  • Wireless Network Data Logic Resources 108 shown in FIG. 1 This enables the Wireless Network Data Logic Resources 108 shown in FIG. 1 to provide identity risk values indicating a likelihood of identity theft or financial fraud for a particular financial transaction associated with an Account Number 202 associated with a Wireless Device ID (e.g. MDN) 204 as shown in FIG. 2 .
  • a Wireless Device ID e.g. MDN
  • FIG. 4 depicts exemplary entries for one or more exemplary Email Data Logic Resources data 110 shown in FIG. 1 .
  • Exemplary Email Data Logic Resources (Email Data) 402 are used to provide information and data to Logic Resources 404 that indicate particular data parameters and factors for the data parameters used by the Email Data Logic Resources 110 shown in FIG. 1 .
  • a first entry includes Email Data 402 and the particular Logic Resource 404 associated with the calculation or generation of Identity Risk Values 216 shown in FIG. 2 .
  • the Email Data 402 is comprised of particular IP Addresses 406 and Weighting Factors 408 for those IP Addresses 406 associated with a particular Logic Resource 404 .
  • the IP Addresses 406 e.g.
  • the Weighting Factors 408 are used to provide a relative value of the importance of a particular IP Address 406 used for a particular Logic Resource 404 .
  • the values of these Weighting Factors 408 may be changed automatically based upon the distance and time variances among any of the derived IP address locations and time parameters used enabling the Email Data Logic Resources 110 in FIG. 1 to provide accurate identity risk values indicating a likelihood of identity theft or financial fraud for a particular financial transaction associated with an Account Number 202 in FIG. 2 associated with an Email Address 212 in FIG. 2 .
  • FIG. 5 depicts an exemplary and detailed information and system flow diagram 500 representing the operation of the Mobile Directory Number and Email Transaction Verification System 100 , in accordance with one embodiment of the present invention.
  • an individual may initially invoke manually or automatically some financial transaction associated with some purchase of goods or services, or other financial operation using a payment instrument associated with a financial account number resulting in financial transaction information being sent to a payment network 118 and being obtained by the Mobile Directory Number and Email Transaction Verification System 100 .
  • a financial transaction occurs and associated data is sent from the payment network 118 to the Transaction Verification and Processing Module 104 of the Mobile Directory Number and Email Transaction Verification System 100 .
  • An account number and optionally a Wireless Device ID may be sent autonomously or requested based on some other interaction between the Mobile Directory Number and Email Transaction Verification System 100 and the payment network 118 or other payment processing system.
  • the Transaction Verification and Processing Module 104 passes the account number and optionally the Wireless Device ID 204 received from the payment network 118 to the Identity Database 106 for storage and subsequent use by an appropriate Wireless Network Data Logic Resource 108 associated with a particular financial transaction requiring an Identity Risk Value.
  • the Transaction Verification and Processing Module 104 makes a request to the financial institution 116 to obtain account holder data from the account holder profile.
  • the requested data includes the MDN and optionally other telephone directory number data associated with the account holder corresponding to the provided account number in an example embodiment.
  • the financial institution 116 passes a Wireless Device ID (e.g. MDN) and optionally other telephone directory number data to the Transaction Verification and Processing Module 104 .
  • a Wireless Device ID e.g. MDN
  • optionally other telephone directory number data e.g. MDN
  • the Transaction Verification and Processing Module 104 passes the Wireless Device ID (e.g. MDN) received from the financial institution 116 and, if provided by the financial institution 116 , other telephone directory number data associated with the account holder to the Identity Database 106 for storage and subsequent use by the appropriate Wireless Network Data Logic Resource 108 associated with the particular financial transaction requiring an Identity Risk Value.
  • MDN Wireless Device ID
  • the Transaction Verification and Processing Module 104 passes the Wireless Device ID 204 (e.g. MDN) received from the financial institution 116 or received from the payment network 118 to the Wireless Device Location Module 112 so the Wireless Device Location Module 112 can request Location Data 206 from the wireless network 102 pertaining to the Wireless Device ID 204 (e.g. MDN).
  • the Wireless Device Location Module 112 may request Carrier Supplemental Data 210 (i.e. supplementary subscription data) associated with the provided Wireless Device ID 204 (e.g. MDN) from the wireless network 102 . If additional mobile telephone directory numbers (e.g.
  • the Wireless Device Location Module 112 may make additional requests to the wireless network 102 to provide Location Data 206 for those additional MDNs and optionally additional supplementary subscription data associated with those additional MDNs.
  • the wireless network 102 responds to the request for Location Data 206 pertaining to the Wireless Device ID 204 (e.g. MDN) previously provided.
  • the wireless network 102 sends Location Data 206 pertaining to the Wireless Device ID 204 (e.g. MDN) to the Wireless Device Location Module 112 .
  • the wireless network 102 may send the requested Carrier Supplemental Data 210 to the Wireless Device Location Module 112 .
  • the Wireless Device Location Module 112 passes the Location Data 206 and Carrier Supplemental Data 210 , if provided, for the corresponding requested Wireless Device ID 204 (e.g. MDN) either directly to the Identity Database 106 or indirectly via the Transaction Verification Processing Module 104 .
  • a step 58 if the Location Data 206 and Carrier Supplemental Data 210 associated with the Wireless Device ID (e.g. MDN) 204 is passed to the Transaction Verification Processing Module 104 , it is then passed to the Identity Database 106 for storage and subsequent use by the appropriate Wireless Network Data Logic Resource 108 associated with a particular financial transaction requiring an Identity Risk Value.
  • the Wireless Device ID e.g. MDN
  • the appropriate data and parameters stored within the Identity Database 106 and required by the Wireless Network Data Logic Resources 108 are passed either directly to the Wireless Network Data Logic Resources 108 or indirectly to the Wireless Network Data Logic Resources 108 via the Transaction Verification Processing Module 104 to be used in a calculation to generate an Identity Risk Value for the particular financial transaction requiring an Identity Risk Value.
  • an Identity Risk Value is generated based on the received and appropriate data and parameters.
  • the Identity Risk Value is passed either directly to the Identity Database 106 or indirectly to the Identity Database 106 via the Transaction Verification Processing Module 104 .
  • the Transaction Verification Processing Module 104 passes the Identity Risk Value to the Identity Database 106 for storage and to be used for additional financial transactions requiring that Identity Risk Value.
  • the Transaction Verification Processing Module 104 passes the Identity Risk Value to the payment network 118 or other payment processing system for the corresponding financial transaction for which an Identity Risk Value was originally requested.
  • FIG. 6 depicts an exemplary and detailed information and system flow diagram 600 representing the operation of the Mobile Directory Number and Email Transaction Verification System 100 , in accordance with one embodiment of the present invention.
  • an individual may initially invoke manually or automatically some financial transaction associated with some purchase of goods or services, or other financial operation using a payment instrument associated with a financial account number resulting in financial transaction information being sent to the payment network 118 and being obtained by the Mobile Directory Number and Email Transaction Verification System 100 .
  • a financial transaction occurs and associated data is sent from the payment network 118 to the Transaction Verification and Processing Module 104 of the Mobile Directory Number and Email Transaction Verification System 100 .
  • the account number and optionally an Email Address 212 and/or an IP Address 214 may be sent autonomously or requested based on some other interaction between the Mobile Directory Number and Email Transaction Verification System 100 and the payment network 118 or other payment processing system.
  • the Transaction Verification and Processing Module 104 passes the account number, Email Address 212 and/or the IP Address Data 214 associated with the financial transaction to the Identity Database 106 for storage and subsequent use by the appropriate Email Data Logic Resource 110 associated with the particular financial transaction requiring an Identity Risk Value.
  • the Transaction Verification and Processing Module 104 makes a request to the financial institution 116 to obtain account data from the account holder profile, and particularly the Email Address 212 associated with the account holder corresponding to the provided account number.
  • the financial institution 116 passes the Email Address 212 to the Transaction Verification and Processing Module 104 .
  • the Transaction Verification and Processing Module 104 passes the received Email Address 212 associated with the account holder to the Identity Database 106 for storage and subsequent use by the appropriate Email Data Logic Resource 110 associated with the particular financial transaction requiring an Identity Risk Value.
  • the Transaction Verification and Processing Module 104 passes the Email Address 212 to the email service provider 114 to request IP Address Data 214 from the email service provider 114 pertaining to the Email Address 212 .
  • the email service provider 114 responds to the request for IP Address Data 214 pertaining to the Email Address 212 previously provided.
  • the email service provider 114 sends IP Address Data 214 pertaining to the Email Address 212 to the Transaction Verification and Processing Module 104 .
  • the Transaction Verification Processing Module 104 passes the received IP Address Data 214 to the Identity Database 106 for storage and subsequent use by the appropriate Email Data Logic Resource 110 associated with the particular financial transaction requiring an Identity Risk Value.
  • the appropriate data and parameters stored within the Identity Database 106 that are required by the Email Data Logic Resources 110 are passed either directly to the Email Data Logic Resources 110 or indirectly to the Email Data Logic Resources 110 via the Transaction Verification Processing Module 104 to be used in a calculation to generate an Identity Risk Value for the particular financial transaction requiring an Identity Risk Value.
  • an Identity Risk Value is generated based on the received and appropriate data and parameters.
  • the Identity Risk Value is passed either directly to the Identity Database 106 or indirectly to the Identity Database 106 via the Transaction Verification Processing Module 104 .
  • the Transaction Verification Processing Module 104 passes the Identity Risk Value to the Identity Database 106 for storage and to be used for additional financial transactions requiring that Identity Risk Value.
  • the Transaction Verification Processing Module 104 passes the Identity Risk Value to the payment network 118 or other payment processing system for the corresponding financial transaction for which an Identity Risk Value was originally requested.
  • an identity risk value is developed.
  • the identity risk value is a non-dimensional numerical value corresponding to a probability that a financial transaction of interest is fraudulent.
  • the identity risk value falls within a predefined numerical range.
  • the identity risk value range may be from one to nine hundred ninety-nine (1-999) where a low identity risk value may indicate that the financial transaction of interest is likely not fraudulent, and a high identity risk value may indicate that the financial transaction of interest is likely to be fraudulent (or vice versa).
  • the identity risk value may be a binary value that may simply indicate that a financial transaction of interest is more likely fraudulent than not (or vice versa). Any suitable identity risk value range may be used to define the relative probability of a determined identity risk value.
  • the identity risk value is determined based upon a statistical correlation among one or more indicators of wireless device location, supplementary subscription data associated with a wireless device, IP address location and data that may be derived from other telephone directory numbers associated with a financial account holder as related to the financial transaction of interest. Exemplary indicators of wireless device location, supplementary subscription data associated with a wireless device, IP address location and data that may be derived from other telephone directory numbers associated with a financial account holder are described herein.
  • the identity risk value provides the result of indicating a statistical relevant probability that the financial transaction of interest is likely, or is not likely, to be fraudulent.
  • Embodiments of the Mobile Directory Number and Email Transaction Verification System 100 generate the identity risk value using statistical correlation processes and methods.
  • the wireless network and telecommunications data and information relative to the financial transaction of interest are statistically analyzed such that the identity risk value is generated, thereby indicating a value that is indicative of the probability that the financial transaction of interest is fraudulent or valid.
  • Any suitable statistical correlation process and/or method may be used to determine the identity risk value, and is not described herein in greater detail for brevity.
  • a method such as assigning values between 0 and 999 to each obtained or derived data variable, providing a weighting factor to each data variable and averaging the values based on the weighting may be used, for example.
  • FIGS. 7 and 8 depict flow charts of methods 700 and 800 , respectively, disclosing algorithms describing operation of an exemplary embodiment of the Mobile Directory Number and Email Verification System 100 .
  • the flow methods 700 and 800 show the architecture, functionality, and operation of a possible implementation of the software for implementing the Mobile Directory Number and Email Verification System 100 .
  • each block may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s).
  • the functions noted in the blocks may occur out of the order noted in FIG. 7 , may include additional functions, and/or may omit some functions.
  • two blocks shown in succession in FIG. 7 or in FIG. 8 may in fact be executed substantially concurrently, the blocks may sometimes be executed in the reverse order, or some of the blocks may not be executed in all instances, depending upon the functionality involved. All such modifications and variations are intended to be included herein within the scope of this disclosure.
  • a communication request is received from the payment network 118 that includes an account number used to identify an account related to a financial transaction and a unique identifier used to identify the account holder's wireless device 124 .
  • the unique identifier representing an entity's wireless device 124 may be an MDN or other identifier that uniquely identifies the wireless device 124 . Accordingly, the identity of the wireless device 124 of interest is therefore associated with a person of interest.
  • wireless network data is obtained from the home network of the account holder's wireless device 124 via the wireless network 102 .
  • the wireless network data represents information pertaining to the account holder's wireless device 124 and is determinable based upon the unique identifier of the account holder's wireless device 124 .
  • the request for information is made to the network using an appropriate communications protocol, communicated via the wireless network 102 .
  • the request is based upon the unique identifier of the account holder's wireless device 124 .
  • various wireless device location and/or wireless device supplementary subscription data is stored within the wireless network 102 serving the wireless device 124 .
  • information pertaining to the wireless device 124 is provided to the Mobile Directory Number and Email Transaction Verification System 100 .
  • a communication request is made to the financial institution 116 to request data associated with the financial account pertaining to an account holder identified by the account number provided in the request.
  • the request for data is made to the financial institution 116 using an appropriate communications protocol.
  • the request is based upon the account number associated with the account holder. For example, various account holder data is stored within the financial institution account holder profile 116 associated with the account number.
  • account holder data is obtained from (and/or in response to the communications request to) the account holder profile at the financial institution 116 associated with the provided account number.
  • the data represents information pertaining to the account holder's account, and in particular, MDN(s) and other telephone directory numbers associated with the account.
  • information pertaining to the account holder is provided to the Mobile Directory Number and Email Transaction Verification System 100 .
  • an identity risk value is generated based on the wireless network data and the financial institution account holder data.
  • the process of FIG. 7 ends at block 714 .
  • the process of FIG. 8 starts at a block 802 .
  • a communication request is received from the payment network 118 that includes an account number used to identify an account related to a financial transaction and an email address and/or IP address data associated with the financial transaction. Accordingly, the email address and/or IP address data of interest is therefore associated with a person of interest.
  • a communication request is made to the financial institution 116 to request data associated with the financial account pertaining to an account holder identified by an account number provided in the request.
  • the request for data is made to the financial institution 116 using an appropriate communications protocol.
  • the request is based upon the account number associated with the account holder. For example, various account holder data is stored within the account holder profile at the financial institution 116 associated with the account number.
  • account holder data is obtained from (and/or in response to the communications request to) the account holder profile at the financial institution 116 associated with the provided account number.
  • the data represents information pertaining to the account holder's account, and in particular, email address(es) associated with the account.
  • the received account holder data is not available from other sources.
  • information pertaining to the account holder is provided to the Mobile Directory Number and Email Transaction Verification System 100 .
  • a communication request is made to the email service provider 114 to request data associated with the email address pertaining to the account holder that was received from the financial institution 116 and/or the payment network 118 .
  • the request for data is made to the email service provider 114 using an appropriate communications protocol.
  • the request is based upon the email address associated with the email account. For example, various email account data is stored within the account holder profile at the email service provider 114 associated with the email address.
  • IP address data is obtained from (and/or in response to the communications request to) the email service provider account holder profile 114 associated with the provided email address.
  • the data represents information pertaining to the account holder's email account, and in particular, IP addresses associated with access to the email account.
  • the received IP address data is not available from other sources.
  • information pertaining to the email account is provided to the Mobile Directory Number and Email Transaction Verification System 100 .
  • an identity risk value is generated based on the email account data and the financial institution account holder data.
  • the process of FIG. 8 ends at a block 816 .
  • the generated identity risk value is indicative of whether or not a particular financial transaction of interest that is associated with a wireless device 124 and/or an email address is likely to be fraudulent or valid. Since the identity of the individual attempting to complete a financial transaction of interest can be associated with the wireless device 124 and/or a particular email address, then the identity risk value is indicative of the likelihood of fraud by the individual attempting to complete the financial transaction of interest.
  • an individual associated with the wireless device 124 and/or a particular email address may be attempting to conduct a financial transaction, such as a purchase using a credit card or debit card.
  • the generated identity risk value would give an indication of whether or not the financial transaction is likely to be valid when the obtained wireless device location data, supplementary subscription data associated with the wireless device, IP address location data and/or other data that may be derived from other telephone directory numbers associated with a financial account holder tend to indicate that the individual attempting to conduct the financial transaction of interest is the same individual that is associated with the wireless device 124 and/or an email address.
  • the multiplicity of location data obtained by the Mobile Directory Number and Email Transaction Verification System 100 pertaining to an MDN e.g. wireless device 124 location data
  • other telephone directory numbers e.g. CC and NDC location data
  • IP address data e.g. IP geographical location data
  • the Mobile Directory Number and Email Transaction Verification System 100 may be able to determine irregular or anomalous locations associated with an individual corresponding to a financial transaction of interest.
  • a particular email address associated with the financial transaction or both obtained location data may be associated with geographic areas around City A and City B. Furthermore, City A may be separated from City B by some large distance, for example, 1000 miles.
  • Obtained wireless device 124 location data may be near City A.
  • Historical wireless device 124 location data may be near City B.
  • Country code and national destination code information of a second obtained telephone directory number may be associated with City B, implying that an individual is associated with a telephone number at City B.
  • Obtained IP address location data pertaining to an obtained IP address may be associated with City A, implying that email account access has occurred near City A.
  • the Mobile Directory Number and Email Transaction Verification System 100 may determine that email account access relating to an individual associated with the financial transaction has occurred near City A within the past one hour of the financial transaction occurring. Further, the Mobile Directory Number and Email Transaction Verification System 100 may determine that the wireless device 124 identified with the individual associated with the financial transaction was near City B within the past one hour of the financial transaction occurring. Thus, in this example, the Mobile Directory Number and Email Transaction Verification System 100 uses a statistical correlation method and/or process to conclude that there is a reasonable probability that the individual is now near City B. Since it is statistically reasonable that it could take many hours to fly from City A to City B, the identity risk value would indicate a reasonable likelihood that the financial transaction of interest is invalid or fraudulent.
  • the status of an MDN representing the wireless device 124 or other telephone directory numbers may be used to determine the identity risk value. It is appreciated that in some situations, a fraudulent financial transaction may occur in the absence of the wireless device 124 (which is tantamount to the wireless device 124 being inactive, or “off”). If the state of the wireless device 124 is active (the wireless device 124 is “on”), the Mobile Directory Number and Email Transaction Verification System 100 may then statistically conclude that there is a reasonable probability that the financial transaction of interest is likely to be valid (since the wireless device 124 is in an active state).
  • the Mobile Directory Number and Email Transaction Verification System 100 may statistically conclude that there is a reasonable probability that the financial transaction of interest is likely to be fraudulent (if the state of the wireless device 124 is inactive).
  • the state of the wireless device 124 may be provided by the wireless network 102 in response to a request for information generated by the Mobile Directory Number and Email Transaction Verification System 100 .
  • a fraudulent financial transaction may occur when other telephone directory numbers associated with the financial transaction of interest are obtained by the Mobile Directory Number and Email Transaction Verification System 100 .
  • the Mobile Directory Number and Email Transaction Verification System 100 may determine that one or more of these numbers are not in use and associated with the individual corresponding to the financial transaction of interest.
  • the Mobile Directory Number and Email Transaction Verification System 100 may then statistically conclude that there is a reasonable probability that the financial transaction of interest is likely to be invalid.
  • the Mobile Directory Number and Email Transaction Verification System 100 may statistically conclude, using the data discussed above and optionally other data and parameters obtained and associated with the financial transaction of interest, that there is a reasonable probability that the financial transaction of interest is likely to be valid (if the state of all of the telephone directory numbers is “assigned” and/or the name associated with all of the telephone directory numbers is similar to the name when compared to the name associated with the MDN subscription or the name of the financial account holder).
  • the format of the email address may be used to determine the identity risk value. If the “local-part” portion of the obtained email address of an individual associated with the financial transaction has a string of characters that is similar to the name of the account holder on the financial account for a financial transaction of interest and/or the name on subscriptions associated with the MDN and other telephone directory numbers, the Mobile Directory Number and Email Transaction Verification System 100 may statistically conclude, using the data discussed above, and optionally other data and parameters obtained and associated with the financial transaction of interest, that there is a reasonable probability that the financial transaction of interest is likely to be valid.
  • the email address may have the value “jsmith@gmail.com” where the name on the financial account is “John Smith” and the names on the subscriptions for the MDN and other telephone directory numbers are “J. Smith,” “John Smith” or the like.
  • the email address may have the value “x@xyz.com” where the name on the financial account is “John Smith” and the names on the subscriptions for the MDN and other telephone directory numbers are “J. Smith,” “John Smith” or the like.
  • the Mobile Directory Number and Email Transaction Verification System 100 may statistically conclude, using the data discussed above, and optionally other data and parameters obtained and associated with the financial transaction of interest, that there is a reasonable probability that the financial transaction of interest is likely to be invalid as the email address appears to be of an anonymous value, which may an indication that the financial transaction of interest is fraudulent.
  • the Mobile Directory Number and Email Transaction Verification System 100 may statistically conclude, using the data discussed above, and optionally other data and parameters obtained and associated with the financial transaction of interest, that the financial transaction of interest is more likely to be invalid as these domain name values, that may be anonymous, are more associated with fraudulent financial transactions in general.
  • the Mobile Directory Number and Email Transaction Verification System 100 may statistically conclude, using the data discussed above, and optionally other data and parameters obtained and associated with the financial transaction of interest, that the financial transaction of interest is more likely to be valid as these domain name values are more associated with legitimate financial transactions in general.
  • the time of access to an email account associated with an email address related to a financial transaction of interest may be used to determine the identity risk value.
  • the Mobile Directory Number and Email Transaction Verification System 100 may use the obtained email address for the financial transaction of interest and analyze and process the email address along with additional obtained IP address data. Based on this analysis, a probabilistic determination of fraud can be made that the IP address data associated with the financial transaction is fraudulent or not.
  • An example of this processing might be that the email address provided was accessed from a computer in Bellevue, Wash., and one hour later a CNP transaction for the owner of the email account was made in Miami, Fla. This could indicate the possibility of a fraudulent financial transaction.
  • Another example might be that the IP address data associated with the transaction emanated from an IP address that was never accessed for the individual's email account. This could also be an indication that the transaction may be fraudulent.
  • the wireless network and type of wireless subscription may be used to determine the identity risk value.
  • Financial fraud and fraudulent activities tend to be associated with pre-paid wireless accounts more often than with post-paid wireless accounts. The reason for this is that pre-paid wireless subscribers tend to be more transient and are often times not required to provide any personal information to the wireless network to obtain a subscription.
  • Some wireless networks provide pre-paid wireless accounts only to subscribers, while some wireless networks provide both pre-paid and post-paid wireless accounts. If the MDN associated with a financial transaction of interest is associated with a pre-paid account, the Mobile Directory Number and Email Transaction Verification System 100 may statistically conclude and, using the data discussed above, and optionally other data and parameters obtained and associated with the financial transaction of interest, that the financial transaction of interest is more likely to be invalid.
  • embodiments of the Mobile Directory Number and Email Transaction Verification System 100 use the identity of the particular wireless network operator in determining the identity risk value.
  • the age of the MDN subscription or other obtained telephone directory number subscriptions associated with a financial account corresponding to a financial transaction of interest may be used to determine the identity risk value.
  • Mobile directory numbers (MDNs) and other telephone directory numbers that have been associated with a subscription for the same individual for a very short period of time, such as one month at the time the financial transaction of interest was performed, for example, may be associated with transience of the individual where this transient status may be more indicative of a higher risk of financial fraud.
  • the Mobile Directory Number and Email Transaction Verification System 100 may statistically conclude, using the data above and optionally other data and parameters obtained and associated with the financial transaction of interest, that the financial transaction of interest is more likely to be invalid. Conversely, if the MDN and/or other telephone directory numbers relating to the financial transaction of interest have been associated with a subscription for a long period of time, for example, one year or longer, the Mobile Directory Number and Email Transaction Verification System 100 may statistically conclude, using that information and optionally other data and parameters obtained and associated with the financial transaction of interest, that the financial transaction of interest is more likely to be valid.
  • Recent regulatory provisions allow an individual to retain their current mobile directory number if the individual changes their wireless network subscription service provider.
  • the service history of the entity's current mobile directory number, and potentially other obtained telephone directory numbers is obtained from the wireless network. It is appreciated that a criminal engaging in fraudulent activities may frequently change their subscription service provider in an effort to avoid detection by legal enforcement agencies. In contrast, an honest citizen is more likely to retain their service provider for a long period of time. Accordingly, it is appreciated that a service, or porting, history demonstrating frequent and reoccurring changes to different subscription service providers may be associated with criminal activity and that the financial transaction of interest is likely to be fraudulent.
  • embodiments of the Mobile Directory Number and Email Transaction Verification System 100 consider the service history of the wireless device 124 , and other telephone directory numbers, in determining the identity risk value.
  • the subscribed features such as call-forwarding, for example, associated with the MDN wireless network subscription or other obtained telephone directory number subscriptions, relating to a financial account corresponding to a financial transaction of interest may be used to determine the identity risk value. It is appreciated that a criminal engaging in fraudulent financial transactions is more likely to subscribe to a relatively inexpensive subscription service and that an honest citizen is more likely to subscribe to a premium subscription service. Accordingly, the Mobile Directory Number and Email Transaction Verification System 100 may statistically conclude that there is a reasonable probability that the financial transaction of interest is likely to be valid when the wireless device 124 is receiving a premium subscription service. On the other hand, the Mobile Directory Number and Email Transaction Verification System 100 may statistically conclude that there is a reasonable probability that the financial transaction of interest is likely to be fraudulent if the wireless device 124 has been receiving an inexpensive subscription service.
  • the above-described wireless device location indicia, wireless device supplementary subscription indicia, telephone directory number indicia, email address indicia and IP address indicia obtained by the Mobile Directory Number and Email Transaction Verification System 100 in response to a request for information from embodiments of the Mobile Directory Number and Email Transaction Verification System 100 are used to determine the identity risk value using a suitable statistical correlation process and/or method.
  • Embodiments may determine the identity risk value using one or more of the above-described indicia. Weighting may be used to adjust the relevance of particular indicia when the identity risk value is determined.
  • Embodiments may selectively pick available indicia for consideration when the identity risk value is determined.
  • a remote source may provide a credit history, billing history or the like that is considered when the identity risk value is determined.
  • FIG. 9 depicts an exemplary computer system 122 of an embodiment of the Mobile Directory Number and Email Transaction Verification System 100 .
  • the computer system 122 includes at least one processor 1222 , at least one memory component 1224 in signal communication with the processor 1222 , and at least one communications interface 1226 in signal communication with the processor 1222 .
  • the processor 1222 , the memory component 1224 , and the communications interface 1226 are communicatively coupled to a communication bus 1228 , thereby providing connectivity between the above-described components.
  • the above-described components may be communicatively coupled to each other in a different manner.
  • one or more of the above-described components may be directly coupled to the processor 1222 , or may be coupled to the processor 1222 via intermediary components (not shown). Further, additional components (not shown) may be included in alternative embodiments of the Mobile Directory Number and Email Transaction Verification System 100 .
  • the memory component 1224 may be any suitable memory device or system. Depending upon the embodiment, the memory component 1224 may be a dedicated memory system, may be part of another component or system, and/or may be a distributed memory system. The memory component 1224 may also include other logic, modules and/or databases not illustrated or described herein.
  • the memory component 1224 is a computer-readable medium that is an electronic, magnetic, optical, or other another physical device or means that contains or stores a computer and/or processor program.
  • the computer-readable medium can be, for example, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device, or propagation medium.
  • the computer-readable medium would include the following: an electrical connection having one or more wires, a portable computer diskette (magnetic, compact flash card, secure digital, or the like), a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM, EEPROM, or Flash memory), an optical fiber, and a portable compact disc read-only memory (CDROM).
  • a portable computer diskette magnetic, compact flash card, secure digital, or the like
  • RAM random access memory
  • ROM read-only memory
  • EPROM erasable programmable read-only memory
  • Flash memory erasable programmable read-only memory
  • CDROM portable compact disc read-only memory
  • the computer-readable medium could even be paper or another suitable medium upon which the program associated with logic is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted, or otherwise processed in a suitable manner, if necessary, and then stored in a device such as another memory component in signal communication with the processor 1222 .
  • the communications interface 1226 is illustrated and described herein as a single component that is configured to communicate with the wireless network 102 . Also, the communications interface 1226 is illustrated and described as being configured to communicate with the financial institution 116 . Further, the communications interface 1226 is illustrated and described as being configured to communicate with the email service provider 114 . Additionally, the communications interface 1226 is illustrated and described as being configured to communicate with the payment network 118 that provides a request for information pertaining to the likelihood that a financial transaction of interest is valid.
  • the communications interface 1226 may be comprised of a plurality of communication devices that act in cooperation so that embodiments of the Mobile Directory Number and Email Transaction Verification System 100 are able to access the various entities described herein.
  • the wireless network 102 may be a different system than a wireless network associated with network supplemental information system 126 . Accordingly, the various communication devices of the communications interface 1226 may be different from each other so as to support communications over a variety of different networks that may be using different communication formats.
  • Embodiments of the Mobile Directory Number and Email Transaction Verification System 100 are configured to concurrently process a plurality of requests to verify that a plurality of different financial transactions of interest are valid.
  • the plurality of requests may originate from the same payment network 118 . That is, it is likely that a large payment network 118 , such as a bank or credit card company, will be concurrently conducting many different financial transaction of interest with different customers.
  • embodiments of the Mobile Directory Number and Email Transaction Verification System 100 may be configured to concurrently process the plurality of communications requests and responses for information from many different systems. That is, embodiments are configured to concurrently request and respond from/to different systems, such as multiple payment networks 118 , multiple wireless networks 102 , multiple financial institutions 116 and multiple email service providers 114 .

Abstract

Systems and methods for verifying a financial transaction based on an account number, a mobile directory number associated with the financial transaction, a mobile directory number associated with the account number, an email address associated with the account number, internet protocol address data associated with the financial transaction, and internet protocol address data associated with accesses of the email address.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • This patent application claims the benefit of U.S. Provisional Patent Application Ser. No. 61/223,671 filed Jul. 7, 2009, and entitled, “Mobile Directory Number Verification of Financial Transactions” and U.S. Provisional Patent Application Ser. No. 61/223,677 filed Jul. 7, 2009, and entitled, “Email Verification of Financial Transactions,” both of which are hereby incorporated by reference in their entirety.
  • BACKGROUND OF THE INVENTION
  • Card-not-present (CNP) and card-present (CP) financial fraud is an increasing problem that plagues the financial industry. For CNP transactions, the customer's card is not physically available for a merchant to inspect. The merchant must rely on the cardholder (or someone purporting to be the cardholder) to present the information on the card by some indirect means, whether by mail, telephone or over the Internet when the cardholder is not present at the point of sale. Although more and more CNP fraud solutions continue to be introduced such as Address Verification Service (AVS), Visa® Advanced Authorization (VAA), and MasterCard SecureCode®, online fraud continues to grow at a rapid pace. For CP transactions, the customer's card is available for a merchant to inspect, but various means of counterfeiting cards have emerged. Multiple CP fraud solutions continue to be introduced, such as predictive analytics solutions, decisioning solutions and rules-based solutions. However, CP fraud also continues to grow.
  • Card-based financial fraud may occur, for example, when a payment instrument is stolen. Payment instruments include credit card account numbers, debit card account numbers and the like. Using stolen account numbers, purchases may be made or new fraudulent accounts may be established using additional personal data, whether that personal data is legitimate or not. Furthermore, fraudulent merchant accounts may be established based on collusion of fraudulent buyers and sellers using stolen payment instruments. Moreover, financial fraud using stolen payment instruments may occur for a variety of circumstances, including, but not limited to, first-time orders on a merchant website where a new account profile is registered, first-time orders on a merchant website where account profiles are not required to be registered and subsequent orders on a merchant website with an existing account profile where the existing account profile has been previously used.
  • Among the primary characteristics of financial fraud solutions is the means to both properly identify, and verify that means of identification, for a person engaging in a financial transaction. Among the unique identifiers for a person engaging in a financial transaction are the person's mobile directory number (MDN) and the person's email address. The use of mobile phones and email have proliferated over the past two decades. More and more people are associating these identifiers with their financial account profiles for a variety of reasons. Many people use mobile phones exclusively or as their primary means of communication with others and electronic commerce (e-commerce) has become a primary means for purchasing retail products over the Internet.
  • A telephone directory number is the actual dialable phone number used to call a person on a telephone. An MDN is the dialable phone number used to call a person on a mobile phone. Email addresses are typically required to be provided to an online merchant when making a retail purchase over the Internet. In many cases, these unique means of communicating with individuals are also associated with personal information associated with a financial account, such as a debit card or credit card account with a bank or financial institution. Many financial institutions require telephone numbers, email addresses or both to be associated with a person's account so they can be contacted by the institution for a variety of purposes, such as marketing of bank products, alerting for changes in account status, when financial fraud is suspected or other reasons.
  • Telephone directory numbers and MDNs can be up to 15 digits long and are unique numbers worldwide. These numbers are associated with both a unique individual as well as a telecommunications network carrier that services particular numbers. Similarly, email addresses are also associated with both a unique individual and an email service provider. Because of this uniqueness, telephone numbers (both mobile and wireline) as well as email addresses can be considered an extension of the unique identity of a person in many cases.
  • Furthermore, the 15-digit directory number format for all directory numbers worldwide (both mobile and wireline) is internationally standardized by the International Telecommunications Union (ITU) in ITU-T Recommendation E.164—The International Public Telecommunication Numbering Plan. The format of this standardized number is comprised of a 1- to 3-digit country code (CC) and a national significant number. The national significant number is comprised of a national destination code (NDC) and a subscriber number (SN). As the country code and the national destination code are geographically based, access to these numbers may provide geographic information that may be pertinent to the identity and whereabouts of a person associated with the numbers.
  • Moreover, the email address format for all email addresses worldwide is internationally standardized by the Internet Engineering Task Force in Request For Comment (RFC) 5321 Simple Mail Transfer Protocol and RFC 5322 Internet Message Format. The format of this standardized email address is “local-part@domain.” The value of the “local-part” portion of the address typically indicates the name of an individual that is the email user, but can take on a variety characters. The value of the “domain” portion of the address typically indicates the name of an organization associated with the email user, but can also take on a variety characters. As the “local-part” and “domain” are typically name-based, the character strings that make up the entire email address may provide information that is pertinent to the identity of a person associated with the address.
  • Card associations and payment networks, such as Visa®, MasterCard®, American Express®, Discover® and others, rely on a combination of fraud detection tools to combat financial fraud. For example, an analysis of Internet data and order parameters as well as address verification, customer behavior analysis, screening mechanisms, rules based algorithms, etc. may lead to the conclusion that a particular online order is suspect.
  • SUMMARY OF THE INVENTION
  • An object of an embodiment of the present invention is to provide a system, and its methods of use, to detect fraudulent transactions based on information derived from a payment network pertaining to payment transactions, information derived from a wireless network pertaining to particular wireless device IDs (e.g. mobile directory numbers) and information derived from a financial institution pertaining to cardholders associated with financial accounts. The invention relates generally to protecting the identity of a cardholder and detecting identity theft by using the wireless device ID of the cardholder's wireless device (e.g. mobile phone) and validating that wireless device ID using data obtained from a payment network and a financial institution pertaining to the cardholder. This data may be used to validate the wireless device ID obtained from the payment network where such validation may be used for a variety of applications, such as assisting in the detection and prevention of identity theft, fraudulent behavior or activity that may be engaged in by a purported cardholder.
  • Another object of an embodiment of the present invention is to provide a system, and its methods of use, to detect fraudulent transactions based on information derived from a payment network pertaining to payment transactions, information derived from a wireless network pertaining to particular wireless device IDs (e.g. MDNs) and information derived from a financial institution pertaining to cardholders associated with financial accounts. Data pertaining to the wireless device ID obtained from a wireless network 102 and data pertaining to the cardholder obtained from a financial institution can be used as the basis for a statistical analysis, resulting in an identity risk value. Data that may be obtained and derived include the wireless device ID (e.g. the MDN) itself, other telephone numbers (directory numbers) associated with the account, location data of the wireless device identified by the wireless device ID, supplementary subscription data associated with the wireless device, the format and characteristics of the wireless device ID and the format and characteristics of other directory numbers. All location data obtained or otherwise derived from telephone directory numbers provides utility for fraud detection as irregular or anomalous locations associated with an individual may be indicative of financial fraud. Furthermore, supplementary subscription data associated with the wireless device, such as the network serving the wireless device, age of the subscription, name on the subscription, porting history of the directory number, and subscribed supplementary features (e.g. call forwarding), may be indicative of financial fraud. This data may be used for a variety of applications, such as assisting in the detection and prevention of identity theft, fraudulent behavior or activity that may be engaged in by a purported cardholder.
  • Yet another object of an embodiment of the present invention is to provide a system, and its methods of use, to detect fraudulent transactions based on information derived from a payment network pertaining to payment transactions, information derived from a financial institution pertaining to cardholders associated with financial accounts and information derived from an email service provider pertaining to particular email addresses and Internet Protocol (IP) data pertaining to cardholders associated with email accounts. This data may be used to validate the email address data obtained from the payment network where such validation may be used for a variety of applications, such as assisting in the detection and prevention of identity theft, fraudulent behavior or activity that may be engaged in by a purported cardholder.
  • Yet another object of an embodiment of the present invention is to provide a system, and its methods of use, to detect fraudulent transactions based on information derived from a payment network pertaining to payment transactions, information derived from a financial institution pertaining to cardholders associated with financial accounts and information derived from an email service provider pertaining to particular email addresses and Internet Protocol (IP) data pertaining to cardholders associated with email accounts. Data pertaining to the email addresses obtained from a financial institution and data pertaining to the cardholder obtained from an email service provider can be used as the basis for a statistical analysis, resulting in an identity risk value. Data that may be obtained and derived include the email address, IP address data associated with the email address and the format and characteristics of the email address itself. All location data obtained or otherwise derived from IP address data provides utility for fraud detection as irregular or anomalous locations associated with an individual may be indicative of financial fraud as IP address data may be indicative of location data where an email account has been accessed by an individual. This data may be used for a variety of applications, such as assisting in the detection and prevention of identity theft, fraudulent behavior or activity that may be engaged in by a purported cardholder.
  • Yet another object of an embodiment of the present invention is to provide a system, and its method of use, for detecting identity theft based on analysis of a multiplicity of provided and stored parameters associated with derived locations, historical locations, supplementary subscription data about a wireless device ID (e.g. MDN) associated with a wireless device, historical use of a particular wireless device ID, derived data about an email address, historical use of an email address, IP address data and historical patterns of locations and use of MDNs and email addresses.
  • A further exemplary embodiment of the present invention applies to and has utility for detecting and preventing identity theft. Identity theft occurs, for example, when an individual's identity credentials are compromised, or otherwise stolen, by perpetrators of fraud. These perpetrators use the identity credentials of individual victims to obtain some financial or other benefit at a cost to the victim.
  • By recognizing patterns when analyzing at least one of the locations and/or data associated with cardholders' wireless devices, telephone directory numbers, email addresses, IP addresses where email accounts are used and supplementary subscription data associated with a wireless or mobile phone subscription, statistical models can be derived and used to determine a probability that a purported wireless device or email user is engaged in either some usual and regular behavior or potentially irregular or anomalous behavior. Irregular or anomalous behavior may be an indication that identity theft has occurred and probabilistic techniques and models to determine incidents of identity theft may be created to detect, with some degree of accuracy, that identity theft has in fact occurred.
  • These and other examples of the invention will be described in further detail below.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Preferred and alternative examples of the present invention are described in detail below with reference to the following drawings:
  • FIG. 1 depicts the functional entities and modules of an exemplary Mobile Directory Number and Email Transaction Verification System formed in accordance with an embodiment of the present invention. Included in the example is a Transaction Verification Processing Module, a Wireless Device Location Module, an Identity Database, one or more Wireless Network Data Logic Resources and one or more Email Data Logic Resources in accordance with the principles of the present invention.
  • FIG. 2 depicts an exemplary Identity Database used to associate unique financial account (card) numbers, wireless device IDs (e.g. MDNs) and email addresses with wireless network derived location data, wireless network derived supplemental data (e.g. subscription data), email service provider data and identity risk values.
  • FIG. 3 depicts exemplary Wireless Network Data Logic Resources including wireless device location data, wireless network supplemental data (e.g. subscription data) and one or more logic resources.
  • FIG. 4 depicts exemplary Email Data Logic Resources including IP address data and one or more logic resources.
  • FIG. 5 depicts an exemplary flow diagram of the Mobile Directory Number and Email Transaction Verification System using Wireless Network Data Logic Resources.
  • FIG. 6 depicts an exemplary flow diagram of the Mobile Directory Number and Email Transaction Verification System using Email Data Logic Resources.
  • FIG. 7 depicts an exemplary information flow chart disclosing operation of the embodiments of the Mobile Directory Number and Email Transaction Verification System using Wireless Network Data Logic Resources.
  • FIG. 8 depicts an exemplary information flow chart disclosing operation of the embodiments of the Mobile Directory Number and Email Transaction Verification System using Email Data Logic Resources.
  • FIG. 9 depicts computer system components of an exemplary Mobile Directory Number and Email Transaction Verification System including a computer processor, communications interface and memory components where the exemplary functional entities and modules of the Mobile Directory Number and Email Transaction Verification System reside in an example embodiment.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
  • FIG. 1 depicts the functional entities and modules of an exemplary Mobile Directory Number and Email Transaction Verification System 100. FIG. 1 shows a block diagram of a system for Mobile Directory Number and Email Transaction Verification. (The System 100 may also be referred to as a Mobile Directory Number and Email Transaction Verification System.) Embodiments of the Mobile Directory Number and Email Transaction Verification System 100, based upon information received from a payment network 118, a wireless network 102, an account holder profile at a financial institution 116 and an account holder profile at an email service provider 114, and optionally other information, assess the likelihood that a financial transaction is fraudulent.
  • Examples of financial transactions that may cause information to be received from a payment network 118 include the purchase of a product or service using a credit card or the like, where the product or service is purchased by an account holder at a particular location (point of purchase) or at a remote location (such as a “mail order” purchase, “telephone order” purchase or purchase from an Internet website). Point of purchase transactions may include, for example, use of a debit card or credit card to obtain cash from an automatic teller machine (ATM) or use of a debit card or credit card to purchase products or services at a point of sale employing an electronic point of sale terminal. It is appreciated that embodiments of the Mobile Directory Number and Email Transaction Verification System 100 may be configured to provide an assessment of the likelihood of fraud for any type of financial transaction.
  • Included in the example is an exemplary Mobile Directory Number and Email Transaction Verification System 100 used to verify financial transactions based on a mobile directory number (MDN) received from one of a payment network 118, an account holder profile from a financial institution 116 or both. Similarly, the Mobile Directory Number and Email Transaction Verification System 100 may be used to verify financial transactions based on an email address, IP address data or both received from one of a payment network 118, an account holder profile from a financial institution 116 or both. The example depicts a Transaction Verification Processing Module 104, a Wireless Device Location Module 112, an Identity Database 106, one or more Wireless Network Data Logic Resources 108 and one or more Email Data Logic Resources 110 in accordance with the principles of the present invention.
  • The Wireless Device Location Module 112 supports communications used to receive, or request and receive, location data and supplementary wireless network data, such as wireless device subscription data associated with a particular wireless device, from the wireless network 102.
  • The Transaction Verification Processing Module 104 obtains financial transaction data from a payment network 118 that may be associated with a financial transaction made by an account holder. The Transaction Verification Processing Module 104 also obtains account number data and optionally one or more of mobile directory number (MDN) data, email address data and IP address data associated with the account holder making the financial transaction. The account number data, MDN data, email address data and IP address data may have been previously provided to the payment network 118 in a variety of ways. The account number data, MDN data and email address data may be provided directly by an account holder, for example, into an Internet website form displayed on a computing device 120 while making a purchase for a product or service. This same data may also be provided indirectly by an online merchant during the purchase process that may, for example, be stored by the online merchant as part of the account holder's registered account profile. Additionally, IP address data may be provided, for example, directly by an online merchant which may be obtained from a computer such as the computing device 120 associated with an online Internet session with the online merchant.
  • The Transaction Verification Processing Module 104 receives the account number data, optional MDN data, optional email address data and optional IP address data pertaining to a financial transaction and passes this data to the Identity Database 106. This data pertaining to the account holder making the financial transaction may or may not have been previously stored in the Identity database 106. The Identity Database 106 stores the received data for use in the financial transaction verification process. The Transaction Verification Processing Module 104 sends the received account number data pertaining to a financial transaction to the financial institution 116, along with a request for additional account profile data associated with the account holder. The financial institution 116 maintains an account profile for the account number associated with the account holder making the financial transaction. The additional account profile data requested from the financial institution 116 may include one or more of the previously stored account holder's MDN, other phone numbers associated with the account (such as additional mobile, home or business phone numbers) and one or more email addresses. The financial institution 116 responds to this request for data by sending one or more of the previously stored account holder's MDN, other phone numbers associated with the account and one or more email addresses. When the Transaction Verification Processing Module 104 receives this additional account profile data, it passes the data to the Identity Database 106 for storage and use for the financial transaction verification process.
  • A first embodiment of the Mobile Directory Number and Email Transaction Verification System 100 may be based upon a query-response communication mechanism between the Mobile Directory Number and Email Transaction Verification System 100 and the payment network 118 that requests validation of the MDN supplied and associated with a financial transaction. If an MDN associated with a financial transaction is obtained via the payment network 118 and an MDN associated with the financial account corresponding to the financial transaction is obtained via the account holder profile from the financial institution 116, the obtained MDNs may be analyzed and compared. This analysis and comparison may be performed by the Transaction Verification Processing Module 104 itself or another module within the Mobile Directory Number and Email Verification System 100 without deviating from the principles of the present invention. The financial transaction may be verified if the result of the analysis and comparison reveals that the received MDNs are identical. If the obtained MDNs are not identical, an indication that the financial transaction was performed by an individual other than the actual account holder may be deduced. At this point, an indication that the financial transaction is either verified or not verified may be passed to the payment network 118, which may or may not result in the financial transaction being either authorized or declined.
  • Furthermore, the Mobile Directory Number and Email Transaction Verification System 100 may be based upon a query-response communication mechanism between the Mobile Directory Number and Email Transaction Verification System 100 and the payment network 118 that requests validation of the email address supplied and associated with a financial transaction. If an email address associated with the financial transaction is obtained via the payment network 118 and an email address associated with the financial account corresponding to the financial transaction is obtained via the account holder profile from the financial institution 116, the obtained email addresses may be analyzed and compared. This analysis and comparison may be performed by the Transaction Verification Processing Module 104 itself or another module within the Mobile Directory Number and Email Verification System 100 without deviating from the principles of the present invention. The financial transaction may be verified if the result of the analysis and comparison reveals that received email addresses are identical. If the obtained email addresses are not identical, an indication that the financial transaction was performed by an individual other than the actual account holder may be deduced. At this point, an indication that the financial transaction is either verified or not verified may be passed to the payment network 118, which may or may not result in the financial transaction being either authorized or declined.
  • The first embodiment generally does not require location data, or other wireless network supplementary subscription data for the provided MDN. Furthermore, the first embodiment generally does not require IP address-based location data for the provided email address. This embodiment functions without the need for wireless network connectivity for location queries or supplementary wireless network subscription data queries associated with the MDN and without the need for email service provider connectivity for historical IP address data. If the MDN, email address or both is deemed valid and a match with the respective MDN, email address or both associated with the financial transaction, then no further action may need to be taken.
  • An alternate embodiment includes the addition of wireless network location data and/or wireless network supplementary subscription data obtained from a wireless network 102, other telephone directory number data associated with the MDN of the account holder obtained from the financial institution 116 and IP address data obtained from the email service provider 114 as part of the Mobile Directory Number and Email Transaction Verification System 100. This alternate embodiment includes connectivity to the wireless network 102 serving the wireless device 124 associated with the MDN and/or connectivity to the email service provider 114 associated with the email address. This alternate embodiment has the benefit of adding value to the Mobile Directory Number and Email Transaction Verification System 100 for the verification and analysis of an MDN and/or email address associated with a financial transaction provided in the first embodiment.
  • In an alternate embodiment, once data has been received by the payment network 118 pertaining to a particular financial transaction and also received by the financial institution account holder profile as described in the first embodiment of the Mobile Directory Number and Email Transaction Verification System 100, a request may be made to the wireless network 102 for location data and supplementary subscription data for the provided MDN. This request may be made, for example, by the Transaction Verification Processing Module 104 via the Wireless Device Location Module 112 using the MDN obtained, for example, from the payment network 118 or the account holder profile from the financial institution 116. The Transaction Verification Processing Module 104 passes the wireless device ID (e.g. the MDN) associated with the financial transaction to the Wireless Device Location Module 112 that is used to obtain the location of a wireless device such as the wireless device 124, for example, and optionally supplementary data associated with a wireless network subscription, from the wireless network 102. The Wireless Device Location Module 112 requests wireless device location data and/or wireless network supplementary subscription data from the wireless network 102. The wireless network 102 may obtain this data, for example, from a network supplemental information system 126. The wireless network 102 responds to the request from the Wireless Device Location Module 112 for wireless device location data and/or wireless network supplementary subscription data. Wireless device location data provided from the wireless network 102 may include current or last known location data pertaining to the wireless device 124.
  • Moreover, once data has been received by the payment network 118 pertaining to a particular financial transaction and also received by the financial institution account holder profile as described in the first embodiment of the Mobile Directory Number and Email Transaction Verification System 100, a request may be made to the email service provider 114 for historical IP address data for the provided email address. This request may be made, for example, by the Transaction Verification Processing Module 104 using the email address obtained, for example, from the payment network 118 or the account holder profile at the financial institution 116. The Transaction Verification Processing Module 104 passes the email address associated with the financial transaction to the email service provider 114 to request historical IP address data from the email service provider 114. The email service provider 114 may obtain this data, for example, from the account holder profile associated with the email address. The email service provider 114 responds to the request from the Transaction Verification Processing Module 104 with IP address data associated with the provided email address. IP address data provided from the email service provider may include previous IP addresses from which the email account associated with the provided email address was accessed and the date and time associated with the IP address from which the email account was accessed.
  • Non-limiting examples of wireless device location data that may be available and obtained from the wireless network 102 pertaining to the MDN obtained from the payment network 118 or obtained from the account holder profile at the financial institution 116 include:
      • Location area. A location area is the area associated with a mobile switching center (MSC) serving cell sites subtending the MSC which service wireless devices identified, for example, by an MDN. A location area may be represented by a location area code (LAC) and an MSC may be represented by an MSCID.
      • Cell identity (e.g. CID, in longitude and latitude or other location context) of the cell site serving wireless devices identified, for example, by an MDN.
      • Global Positioning System (GPS) coordinates (e.g. in longitude and latitude or other location context) for wireless devices identified, for example, by an MDN.
      • Wireless network base station identifier associated with a wireless network access point (e.g. in longitude and latitude or other location context) serving wireless devices. A wireless network access point may be, for example, a WiFi access point, WiMAX access point or any other access point that may provide service to a wireless device.
      • Date and time the provided wireless device location data was recorded by the wireless network 102.
  • Those of ordinary skill in the art will understand and appreciate these example types of wireless device location data that may be obtained from a wireless network 102 and the formats for which this data is provided.
  • Non-limiting examples of one or more of the following wireless network supplementary subscription data may be available and obtained from the wireless network 102 or from other telecommunications networks. The supplementary subscription data may pertain to other obtained directory numbers associated with the account holder that were obtained via the account holder profile at the financial institution 116, to the MDN obtained from the payment network 118, or to the MDN obtained from the account holder profile at the financial institution 116. These non-limiting examples include:
      • Directory number assigned and in use. For any obtained mobile or wireline directory number, it may be determined whether that directory number is assigned to, and being used by, a subscriber.
      • Directory number a mobile number or a wireline number. For any obtained directory number, it may be determined whether that directory number is assigned to a wireless network subscriber or a wireline network subscriber.
      • Network serving the directory number. For any obtained directory number, it may be determined which network provides service to that number.
      • If the directory number is an MDN, current status of the wireless device 124. For MDNs, it may be determined whether the wireless device is currently turned on and being served by a wireless network or not.
      • If the directory number is an MDN, it may be determined whether the wireless device 124 is in the home service area or roaming into another service area or a visited network.
      • If the directory number is an MDN and the wireless device is roaming, it may be determined which visited network is serving the wireless device 124.
      • If the directory number is an MDN and the wireless device is roaming, it may be determined which country the visited network serving the wireless device 124 is in.
      • Name on the directory number associated with the network subscription. For any obtained directory number, the subscriber's name associated with the subscription may be determined.
      • Age of the directory number subscription. For any obtained directory number, the length of time the current subscriber has been associated with the subscription may be determined.
      • Porting history of the directory number. For any obtained directory number, the porting history of the number may be obtained. The porting history may provide the networks that have served the directory number in the past and whether these networks were wireless networks or wireline networks.
      • Pre-paid payment status of the subscription. For any obtained directory number, the pre-paid payment status of the number may be obtained.
      • Post-paid payment status of the subscription. For any obtained directory number, the post-paid payment status of the number may be obtained.
      • Supplementary subscription features associated with the directory number associated with the wireless device 124. For any obtained directory number, subscribed features associated with the network subscription may be obtained, such as call forwarding.
  • Those of ordinary skill in the art will understand and appreciate these example types of wireless supplementary subscription data that may be obtained from a wireless network 102 or other telecommunications networks, and the methods and formats for which this data is provided.
  • Non-limiting examples of one or more of the following geographic location data that may be derived from the format of the obtained MDN, or other obtained directory numbers associated with the account holder and obtained via the account holder profile at the financial institution 116, are:
      • Country code (CC) of the directory number. For any obtained directory number, the CC representing the country where the directory number is assigned may be determined.
      • National destination code (NDC). For any obtained directory number, the NDC representing a geographical area within a country where the directory number is assigned may be determined.
  • The derivation of geographic location data from the CC and/or NDC of one or more obtained directory numbers may occur, for example, at the Transaction Verification Processing Module 104 itself or another module within the Mobile Directory Number and Email Verification System 100 without deviating from the principles of the present invention. Those of ordinary skill in the art will understand and appreciate these example types of data that may be derived about the format of a directory number and the methods for which this data is derived.
  • Non-limiting examples of one or more of the following IP address data may be available and obtained from an email service provider pertaining to the email address obtained from the payment network 118 or obtained from the account holder profile at the financial institution 116 are:
      • IP address. IP addresses are typically geographically based and of the form XX.XX.XX.XX.
      • Date and time that access to the email account associated with the provided IP address was recorded by the email service provider 114.
  • The derivation of geographic location data from the IP address may occur, for example, at the Transaction Verification Processing Module 104 itself or another module within the Mobile Directory Number and Email Verification System 100 without deviating from the principles of the present invention. Those of ordinary skill in the art will understand and appreciate these example types of data that may be derived about the format of an IP address and the methods for which this data is derived.
  • Non-limiting examples of one or more of the following identity information data that may be derived from the format of an obtained email address associated with an account holder and pertaining to the email address obtained from the payment network 118 or obtained from an account holder profile at the financial institution 116 are:
      • Local-part of the email address. For any obtained email address, the local-part representing the user name of the email account may be determined.
      • Domain of the email address. For any obtained email address, the domain representing the organization name of the email account may be determined.
  • The derivation of identity data from the local-part and/or domain of one or more obtained email addresses may occur, for example, at the Transaction Verification Processing Module 104 itself or another module within the Mobile Directory Number and Email Verification System 100 without deviating from the principles of the present invention. Those of ordinary skill in the art will understand and appreciate these example types of data that may be derived about the format of an email address and the methods for which this data is derived.
  • When the wireless device location data, wireless network supplementary subscription data and other directory numbers associated with the account holder are obtained, the Wireless Device Location Module 112 passes the wireless device location data and wireless network supplementary subscription data associated with the MDN to the Identity Database 106 directly or indirectly via the Transaction Verification Processing Module 104 for storage and use for the financial transaction verification process. The geographic location data derived from the format of the obtained directory numbers (e.g. CC and NDC), are also passed to the Identity Database 106 for storage and use for the financial transaction verification process.
  • Similarly, when the appropriate IP address data are received from the email service provider 114 pertaining to the email address associated with a financial transaction and the account holder, the Transaction Verification Processing Module 104 passes the obtained IP address data and email address data associated with the email address to the Identity Database 106, directly or indirectly, for storage and use for the financial transaction verification process.
  • The Transaction Verification Processing Module 104 and the Identity Database 106 provide the appropriate data and parameters associated with the MDN to the Wireless Network Data Logic Resources 108 to determine an Identity Risk Value 216 associated with a financial transaction and an individual associated with the financial transaction and represented by the MDN. Similarly, the Transaction Verification Processing Module 104 and the Identity Database 106 provide the appropriate data and parameters associated with the email address to the Email Data Logic Resources 110 to determine an Identity Risk Value 216 associated with a financial transaction and an individual associated with the financial transaction and represented by the email address. The Identity Risk Value 216 may be determined using data and parameters in a manner as described with respect to FIGS. 3 and 4, for example.
  • The data may be provided directly to one or more Wireless Network Data Logic Resources 108 and/or one or more Email Data Logic Resources 110 by the appropriate modules or databases, or via the Transaction Verification Processing Module 104. One or more Wireless Network Data Logic Resources 108 and/or one or more Email Data Logic Resources 110 are used to calculate, generate or otherwise determine an Identity Risk Value 216 pertaining to the financial transaction. If both Wireless Network Data Logic Resources 108 and Email Data Logic Resources are used independently to calculate, generate or otherwise determine an Identity Risk Value 216 pertaining to the financial transaction, the resulting multiple identity risk values may be, for example, statistically merged, averaged or otherwise combined into a single identity risk value. Alternatively, if both Wireless Network Data Logic Resources 108 and Email Data Logic Resources are used independently to calculate, generate or otherwise determine an Identity Risk Value 216 pertaining to the financial transaction, the resulting multiple identity risk values may be preserved as independent results. The calculations may include statistical and probabilistic algorithms to generate or otherwise determine identity risk values, thereby indicating the level of risk of a financial transaction and whether it is likely or not that the financial transaction may be fraudulent. Once the identity risk values are calculated, generated or otherwise determined, they are passed to the Identity Database 106 directly or indirectly via the Transaction Verification Processing Module 104 for storage and use for the financial transaction verification process. The Transaction Verification Processing Module 104 may then pass the identity risk values associated with a particular financial transaction to the payment network 118 as part of the query-response communication between the Mobile Directory Number and Email Transaction Verification System 100 and the payment network 118. The identity risk values pertaining to the financial transaction that are passed to the payment network 118 may or may not result in the financial transaction being either authorized or declined.
  • The stored identity risk values associated with a wireless device ID (e.g. MDN) and/or an email address may subsequently be accessed and used in additional statistical and probabilistic algorithms or calculations for utility, for example, in determining irregular or fraudulent behavior associated with other transactions.
  • The alternate embodiment of the present invention may be used in conjunction with the first embodiment of the present invention as a further analysis to attempt to verify the financial transaction, or the alternate embodiment of the present invention may be used regardless of whether the first embodiment of the present invention is employed.
  • It should be understood that the Mobile Directory Number and Email Transaction Verification System 100 shown in FIG. 1 can be implemented using a computer system 122 having at least one processor, at least one memory component in signal communication with the processor, and at least one communications interface in signal communication with the processor. The Identity Database 106, the Wireless Network Data Logic Resources 108 and the Email Data Logic Resources 110 can be stored in the memory, for example. Programming instructions can also be stored in memory that when run by the processor cause the processor to be configured to implement the functions of the Transaction Verification Processing Module 104 and the Wireless Device Location Module 112. In some embodiments, the Transaction Verification Processing Module 104 and the Wireless Device Location Module 112 can be implemented with different processors. The communications interface can allow the processor to communicate with the wireless network 102 when running the processes of the Wireless Device Location Module 112. The communications interface can also allow the processor to receive data from the payment network 118, the financial institution 116 and the email service provider 114 as well as to send identity risk value results to other systems. The results can be sent to systems that triggered a financial transaction or to other systems. In some embodiments, more than one communications interface can be used. It should also be understood that the Mobile Directory Number and Email Transaction Verification System 100 can be implemented in a distributed manner using a plurality of computer systems such as the computer system 122 shown in FIG. 9, for example.
  • Generally, the Mobile Directory Number and Email Transaction Verification System 100 is used in a process of verifying an electronic financial transaction where one or more locations of the wireless device 124 and supplementary wireless network subscription data that are obtained or derived from a wireless network 102, one or more locations derived from other telephone directory numbers that are obtained from an account holder profile at the financial institution 116 and IP address data that are obtained from an account holder profile at the email service provider 114 are incorporated into the Wireless Network Data Logic Resources 108 and Email Data Logic Resources 110 to generate an identity risk value, to assist in creating a statistical model that can determine a likelihood that a financial transaction is fraudulent. The Mobile Directory Number and Email Transaction Verification System 100 can be used with any type of electronic financial transaction. Two non-limiting example types of financial transactions of interest are card-not-present (CNP) and card present (CP) financial transactions.
  • The financial transaction can be triggered by various types of financial applications. For example, a consumer desiring to make a purchase, withdraw money, transfer money between accounts, etc. can initiate an electronic financial transaction by using a computer network such as the Internet. For CNP financial transactions, the consumer can enter payment information such as a credit card or debit card account number, the consumer's MDN, the consumer's email address, the consumer's name and the consumer's address using an input device in signal communication with a computer used by the consumer. The payment information can then be transmitted to a computerized payment network 118 associated with a bank. For CP financial transactions, the consumer can use a payment instrument, such as a credit card or debit card, containing an account number at an electronic point-of-sale terminal associated with a retail merchant. The payment information can then be transmitted to a computerized payment network 118 associated with a bank. The payment network 118 can generate a financial transaction by sending financial transaction data that includes the consumer's MDN to the Mobile Directory Number and Email Transaction Verification System 100. The Mobile Directory Number and Email Transaction Verification System 100 receives the financial transaction data through the communications interface. A processor configured to implement the functions of the Transaction Verification Processing Module 104 and the Wireless Device Location Module 112 requests information pertaining to a device associated with the consumer's MDN from the wireless network 102. This information may include a location of the device, for example. The processor generates identity risk values based on at least one of the Wireless Network Data Logic Resources 108, Email Data Logic Resources 110 and Identity Database 106. The processor then sends a response based on the identity risk value back to the payment network 118. Based upon the received information provided by the Mobile Directory Number and Email Transaction Verification System 100, the payment network 118, a payment processing system associated with the payment network 118 or the retail merchant generates an acceptance decision based on the response and, in some cases, other predetermined criteria. If the acceptance decision is positive, the payment network 118, a payment processing system associated with the payment network 118 or the retail merchant allows the transaction to proceed and the consumer is notified that the financial transaction was successful, such as by displaying a confirmation number on a display device in signal communication with the computer used by the consumer. If the acceptance decision is negative, the payment network 118, a payment processing system associated with the payment network 118 or the retail merchant may not allow the financial transaction to proceed and notifies the consumer in a similar manner.
  • Embodiments of the Mobile Directory Number and Email Transaction Verification System 100 may be used to assess the likelihood of fraud of a financial transaction before the financial transaction is in progress, while the financial transaction is in progress and/or make an assessment after the financial transaction has concluded. For example, pre-authorization may be used to verify the identity of the purchaser prior to delivery of a goods or service to the purchaser. If the financial transaction pertains to a point of purchase transaction, a prior transaction approval process could be completed before the purchaser leaves the premises. As another non-limiting example, if the financial transaction pertains to an Internet purchase transaction, the transaction approval process could be completed before the purchased goods are mailed to the purchaser.
  • In the various embodiments of the Mobile Directory Number and Email Transaction Verification System 100, the likelihood of fraud of a particular financial transaction is assessed in response to receiving a request from a transaction entity that is conducting, or is associated with, the financial transaction. Non-limiting examples of transaction entities include payment networks, banks, credit card companies, Internet service providers and sellers of goods and/or services.
  • FIG. 2 depicts exemplary entries in the exemplary Identity Database 106 (FIG. 1). In particular a first entry includes an association among an Account Number 202, a Wireless Device ID 204 (e.g. in this case an MDN), wireless network derived Location Data 206, wireless network derived Historical Location Data 208 including a historical location and the date and time the historical location was derived, wireless network derived Carrier Supplemental Data 210 (e.g. in this case supplementary subscription data), an Email Address 212, email address Historical IP Address Data 214 including a historical IP address and the date and time the historical IP address was used to access an email account associated with the email address 212 and an Identity Risk Value 216. The Account Number 202 is received from the payment network 118 shown in FIG. 1 when a request is made to the Mobile Directory Number and Email Transaction Verification System 100 to verify a transaction. The Wireless Device ID 204 is used by the Wireless Device Location Module 106 in FIG. 1 to either request the Location Data 206 from the wireless network 102 or autonomously receive the Location Data 206 from the wireless network 102. The obtained Location Data 206 is then associated with some location context or geographic place, additional obtained Carrier Supplemental Data 210 as well as the Historical Location Date and Time 208 in the database. The entries for Carrier Supplemental Data 210 may be pre-populated or otherwise derived or obtained from the wireless network 102 or supporting communications data networks. The Email Address 212 is used by the Transaction Verification Processing Module 104 shown in FIG. 1 to either request the IP Address Data 214 from the email service provider 114 or autonomously receive the IP Address Data 214 from the email service provider 114. The obtained IP Address Data 214 is then associated with some location context or geographic place as well as the IP Address Date and Time 214 in the database.
  • The Historical Location Date and Time 208 contains entries representing the date and time of a particular obtained wireless device location to assist in determining, for example, an Identity Risk Value 216. The IP Address Data Date and Time 214 contains entries representing the date and time the email account associated with the email address 212 was accessed to assist in determining, for example, the Identity Risk Value 216.
  • The Identity Risk Value 216 for the associated Account Number 202 is generated due to some previous financial transaction or process and may take on a null or default value if a value has not previously been calculated. The Identity Risk Value 216 may be used in one or more Wireless Network Data Logic Resources 108 (FIG. 1), one or more Email Data Logic Resources 110 (FIG. 1) or both to generate subsequent Identity Risk Values that may be stored in the exemplary Identity Database 106.
  • FIG. 3 depicts exemplary entries for one or more exemplary Wireless Network Data Logic Resources 108 shown in FIG. 1. The entries include Wireless Network Data Logic Resources Location Data 302 and Wireless Network Data Logic Resources Supplemental Data 304. The location data 302 and/or the supplemental data 304 are used to provide information and data to Logic Resources 306 that indicate particular data parameters and factors for the data parameters used by the Wireless Network Data Logic Resources 108 shown in FIG. 1. In particular, as depicted in FIG. 3, a first entry includes Location Data 302, Supplemental Data 304 and the particular Logic Resource 306 associated with the calculation or generation of Identity Risk Values 216 in FIG. 2. The Location Data 302 is comprised of particular Locations 308 and Weighting Factors 310 for those Locations 308 associated with a particular Logic Resource 306. The Locations 308 (e.g. MSCID, CID, CC, NDC, LAC, GPS or some other derived location type) are locations associated with a Wireless Device ID (e.g. MDN) 204 as shown in FIG. 2 corresponding to a financial transaction and obtained via the payment network 118 or other telephone directory numbers associated with a financial institution account holder profile 116 in FIG. 1, associated with some financial transaction requiring an Identity Risk Value 216 in FIG. 2 for utility, such as for detecting identity theft and financial fraud. The Weighting Factors 310 are used to provide a relative value of the importance of a particular Location 308 used for a particular Logic Resource 306. The values of these Weighting Factors 310 may be changed automatically based upon the distance and time variances among any of the location and time parameters used. This enables the Wireless Network Data Logic Resources 108 shown in FIG. 1 to provide identity risk values indicating a likelihood of identity theft or financial fraud for a particular financial transaction associated with an Account Number 202 associated with a Wireless Device ID (e.g. MDN) 204 as shown in FIG. 2. The Supplemental Data 304 is comprised of particular Data Types 312 and Weighting Factors 314 for those Data Types 312 associated with a particular Logic Resource 306. The Data Types 312 (e.g. subscription age, subscription pre-paid, subscription post-paid, porting history, subscriber name, status or some other data type) are supplementary subscription data associated with a Wireless Device ID (e.g. MDN) 204 in or other telephone directory numbers associated with a financial institution account holder profile 116, associated with some financial transaction requiring an Identity Risk Value 216 for utility, such as for detecting identity theft and financial fraud. The Weighting Factors 314 are used to provide a relative value of the importance of a particular Data Type 312 used for a particular Logic Resource 306. The values of these Weighting Factors 312 may be changed automatically based upon variances among any of the Carrier Supplemental Data 210 used. This enables the Wireless Network Data Logic Resources 108 shown in FIG. 1 to provide identity risk values indicating a likelihood of identity theft or financial fraud for a particular financial transaction associated with an Account Number 202 associated with a Wireless Device ID (e.g. MDN) 204 as shown in FIG. 2.
  • FIG. 4 depicts exemplary entries for one or more exemplary Email Data Logic Resources data 110 shown in FIG. 1. Exemplary Email Data Logic Resources (Email Data) 402 are used to provide information and data to Logic Resources 404 that indicate particular data parameters and factors for the data parameters used by the Email Data Logic Resources 110 shown in FIG. 1. In particular, as depicted in FIG. 4, a first entry includes Email Data 402 and the particular Logic Resource 404 associated with the calculation or generation of Identity Risk Values 216 shown in FIG. 2. The Email Data 402 is comprised of particular IP Addresses 406 and Weighting Factors 408 for those IP Addresses 406 associated with a particular Logic Resource 404. The IP Addresses 406 (e.g. of the standard format XX.XX.XX.XX) are IP addresses associated with an Email Address 212 associated with a financial transaction and obtained via the payment network 118 or account holder profile at the financial institution 116, associated with some financial transaction requiring an Identity Risk Value 216 in FIG. 2 for utility, such as for detecting identity theft and financial fraud. The Weighting Factors 408 are used to provide a relative value of the importance of a particular IP Address 406 used for a particular Logic Resource 404. The values of these Weighting Factors 408 may be changed automatically based upon the distance and time variances among any of the derived IP address locations and time parameters used enabling the Email Data Logic Resources 110 in FIG. 1 to provide accurate identity risk values indicating a likelihood of identity theft or financial fraud for a particular financial transaction associated with an Account Number 202 in FIG. 2 associated with an Email Address 212 in FIG. 2.
  • FIG. 5 depicts an exemplary and detailed information and system flow diagram 500 representing the operation of the Mobile Directory Number and Email Transaction Verification System 100, in accordance with one embodiment of the present invention. In this exemplary information and system flow, an individual may initially invoke manually or automatically some financial transaction associated with some purchase of goods or services, or other financial operation using a payment instrument associated with a financial account number resulting in financial transaction information being sent to a payment network 118 and being obtained by the Mobile Directory Number and Email Transaction Verification System 100.
  • At a step 51, a financial transaction occurs and associated data is sent from the payment network 118 to the Transaction Verification and Processing Module 104 of the Mobile Directory Number and Email Transaction Verification System 100. An account number and optionally a Wireless Device ID (e.g. MDN) may be sent autonomously or requested based on some other interaction between the Mobile Directory Number and Email Transaction Verification System 100 and the payment network 118 or other payment processing system.
  • At a step 52, the Transaction Verification and Processing Module 104 passes the account number and optionally the Wireless Device ID 204 received from the payment network 118 to the Identity Database 106 for storage and subsequent use by an appropriate Wireless Network Data Logic Resource 108 associated with a particular financial transaction requiring an Identity Risk Value.
  • At a step 53, the Transaction Verification and Processing Module 104 makes a request to the financial institution 116 to obtain account holder data from the account holder profile. The requested data includes the MDN and optionally other telephone directory number data associated with the account holder corresponding to the provided account number in an example embodiment.
  • At a step 54, the financial institution 116 passes a Wireless Device ID (e.g. MDN) and optionally other telephone directory number data to the Transaction Verification and Processing Module 104.
  • At a step 55, the Transaction Verification and Processing Module 104 passes the Wireless Device ID (e.g. MDN) received from the financial institution 116 and, if provided by the financial institution 116, other telephone directory number data associated with the account holder to the Identity Database 106 for storage and subsequent use by the appropriate Wireless Network Data Logic Resource 108 associated with the particular financial transaction requiring an Identity Risk Value.
  • At a step 56, the Transaction Verification and Processing Module 104 passes the Wireless Device ID 204 (e.g. MDN) received from the financial institution 116 or received from the payment network 118 to the Wireless Device Location Module 112 so the Wireless Device Location Module 112 can request Location Data 206 from the wireless network 102 pertaining to the Wireless Device ID 204 (e.g. MDN). Optionally and additionally, the Wireless Device Location Module 112 may request Carrier Supplemental Data 210 (i.e. supplementary subscription data) associated with the provided Wireless Device ID 204 (e.g. MDN) from the wireless network 102. If additional mobile telephone directory numbers (e.g. MDNs) were previously received from the financial institution account holder profile 116 in step 54, the Wireless Device Location Module 112 may make additional requests to the wireless network 102 to provide Location Data 206 for those additional MDNs and optionally additional supplementary subscription data associated with those additional MDNs.
  • At a step 57, the wireless network 102 responds to the request for Location Data 206 pertaining to the Wireless Device ID 204 (e.g. MDN) previously provided. The wireless network 102 sends Location Data 206 pertaining to the Wireless Device ID 204 (e.g. MDN) to the Wireless Device Location Module 112. If the optional Carrier Supplemental Data 210 was previously requested by the Wireless Device Location Module 112, the wireless network 102 may send the requested Carrier Supplemental Data 210 to the Wireless Device Location Module 112. The Wireless Device Location Module 112 passes the Location Data 206 and Carrier Supplemental Data 210, if provided, for the corresponding requested Wireless Device ID 204 (e.g. MDN) either directly to the Identity Database 106 or indirectly via the Transaction Verification Processing Module 104.
  • At a step 58, if the Location Data 206 and Carrier Supplemental Data 210 associated with the Wireless Device ID (e.g. MDN) 204 is passed to the Transaction Verification Processing Module 104, it is then passed to the Identity Database 106 for storage and subsequent use by the appropriate Wireless Network Data Logic Resource 108 associated with a particular financial transaction requiring an Identity Risk Value.
  • At a step 59, the appropriate data and parameters stored within the Identity Database 106 and required by the Wireless Network Data Logic Resources 108 are passed either directly to the Wireless Network Data Logic Resources 108 or indirectly to the Wireless Network Data Logic Resources 108 via the Transaction Verification Processing Module 104 to be used in a calculation to generate an Identity Risk Value for the particular financial transaction requiring an Identity Risk Value.
  • At a step 60, an Identity Risk Value is generated based on the received and appropriate data and parameters.
  • At a step 61, the Identity Risk Value is passed either directly to the Identity Database 106 or indirectly to the Identity Database 106 via the Transaction Verification Processing Module 104.
  • At a step 62, if the Identity Risk Value is passed directly to the Transaction Verification Processing Module 104, the Transaction Verification Processing Module 104 passes the Identity Risk Value to the Identity Database 106 for storage and to be used for additional financial transactions requiring that Identity Risk Value.
  • At a step 63, the Transaction Verification Processing Module 104 passes the Identity Risk Value to the payment network 118 or other payment processing system for the corresponding financial transaction for which an Identity Risk Value was originally requested.
  • FIG. 6 depicts an exemplary and detailed information and system flow diagram 600 representing the operation of the Mobile Directory Number and Email Transaction Verification System 100, in accordance with one embodiment of the present invention. In this exemplary information and system flow, an individual may initially invoke manually or automatically some financial transaction associated with some purchase of goods or services, or other financial operation using a payment instrument associated with a financial account number resulting in financial transaction information being sent to the payment network 118 and being obtained by the Mobile Directory Number and Email Transaction Verification System 100.
  • At a step 71, a financial transaction occurs and associated data is sent from the payment network 118 to the Transaction Verification and Processing Module 104 of the Mobile Directory Number and Email Transaction Verification System 100. The account number and optionally an Email Address 212 and/or an IP Address 214 may be sent autonomously or requested based on some other interaction between the Mobile Directory Number and Email Transaction Verification System 100 and the payment network 118 or other payment processing system.
  • At a step 72, the Transaction Verification and Processing Module 104 passes the account number, Email Address 212 and/or the IP Address Data 214 associated with the financial transaction to the Identity Database 106 for storage and subsequent use by the appropriate Email Data Logic Resource 110 associated with the particular financial transaction requiring an Identity Risk Value.
  • At a step 73, the Transaction Verification and Processing Module 104 makes a request to the financial institution 116 to obtain account data from the account holder profile, and particularly the Email Address 212 associated with the account holder corresponding to the provided account number.
  • At a step 74, the financial institution 116 passes the Email Address 212 to the Transaction Verification and Processing Module 104.
  • At a step 75, the Transaction Verification and Processing Module 104 passes the received Email Address 212 associated with the account holder to the Identity Database 106 for storage and subsequent use by the appropriate Email Data Logic Resource 110 associated with the particular financial transaction requiring an Identity Risk Value.
  • At a step 76, the Transaction Verification and Processing Module 104 passes the Email Address 212 to the email service provider 114 to request IP Address Data 214 from the email service provider 114 pertaining to the Email Address 212.
  • At a step 77, the email service provider 114 responds to the request for IP Address Data 214 pertaining to the Email Address 212 previously provided. The email service provider 114 sends IP Address Data 214 pertaining to the Email Address 212 to the Transaction Verification and Processing Module 104.
  • At a step 78, the Transaction Verification Processing Module 104 passes the received IP Address Data 214 to the Identity Database 106 for storage and subsequent use by the appropriate Email Data Logic Resource 110 associated with the particular financial transaction requiring an Identity Risk Value.
  • At a step 79, the appropriate data and parameters stored within the Identity Database 106 that are required by the Email Data Logic Resources 110 are passed either directly to the Email Data Logic Resources 110 or indirectly to the Email Data Logic Resources 110 via the Transaction Verification Processing Module 104 to be used in a calculation to generate an Identity Risk Value for the particular financial transaction requiring an Identity Risk Value.
  • At a step 80, an Identity Risk Value is generated based on the received and appropriate data and parameters.
  • At a step 81, the Identity Risk Value is passed either directly to the Identity Database 106 or indirectly to the Identity Database 106 via the Transaction Verification Processing Module 104.
  • At a step 82, if the Identity Risk Value is passed directly to the Transaction Verification Processing Module 104, the Transaction Verification Processing Module 104 passes the Identity Risk Value to the Identity Database 106 for storage and to be used for additional financial transactions requiring that Identity Risk Value.
  • At a step 83, the Transaction Verification Processing Module 104 passes the Identity Risk Value to the payment network 118 or other payment processing system for the corresponding financial transaction for which an Identity Risk Value was originally requested.
  • In the various embodiments, an identity risk value is developed. The identity risk value is a non-dimensional numerical value corresponding to a probability that a financial transaction of interest is fraudulent. The identity risk value falls within a predefined numerical range. For example, the identity risk value range may be from one to nine hundred ninety-nine (1-999) where a low identity risk value may indicate that the financial transaction of interest is likely not fraudulent, and a high identity risk value may indicate that the financial transaction of interest is likely to be fraudulent (or vice versa). Furthermore, the identity risk value may be a binary value that may simply indicate that a financial transaction of interest is more likely fraudulent than not (or vice versa). Any suitable identity risk value range may be used to define the relative probability of a determined identity risk value.
  • In some embodiments, the identity risk value is determined based upon a statistical correlation among one or more indicators of wireless device location, supplementary subscription data associated with a wireless device, IP address location and data that may be derived from other telephone directory numbers associated with a financial account holder as related to the financial transaction of interest. Exemplary indicators of wireless device location, supplementary subscription data associated with a wireless device, IP address location and data that may be derived from other telephone directory numbers associated with a financial account holder are described herein. Thus, the identity risk value provides the result of indicating a statistical relevant probability that the financial transaction of interest is likely, or is not likely, to be fraudulent.
  • Embodiments of the Mobile Directory Number and Email Transaction Verification System 100 generate the identity risk value using statistical correlation processes and methods. The wireless network and telecommunications data and information relative to the financial transaction of interest, are statistically analyzed such that the identity risk value is generated, thereby indicating a value that is indicative of the probability that the financial transaction of interest is fraudulent or valid. Any suitable statistical correlation process and/or method may be used to determine the identity risk value, and is not described herein in greater detail for brevity. However, a method such as assigning values between 0 and 999 to each obtained or derived data variable, providing a weighting factor to each data variable and averaging the values based on the weighting may be used, for example.
  • FIGS. 7 and 8 depict flow charts of methods 700 and 800, respectively, disclosing algorithms describing operation of an exemplary embodiment of the Mobile Directory Number and Email Verification System 100. The flow methods 700 and 800 show the architecture, functionality, and operation of a possible implementation of the software for implementing the Mobile Directory Number and Email Verification System 100. In this regard, each block may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that in some alternative implementations, the functions noted in the blocks may occur out of the order noted in FIG. 7, may include additional functions, and/or may omit some functions. For example, two blocks shown in succession in FIG. 7 or in FIG. 8 may in fact be executed substantially concurrently, the blocks may sometimes be executed in the reverse order, or some of the blocks may not be executed in all instances, depending upon the functionality involved. All such modifications and variations are intended to be included herein within the scope of this disclosure.
  • The process of FIG. 7 starts at a block 702. At a block 704, a communication request is received from the payment network 118 that includes an account number used to identify an account related to a financial transaction and a unique identifier used to identify the account holder's wireless device 124. In various embodiments, the unique identifier representing an entity's wireless device 124 may be an MDN or other identifier that uniquely identifies the wireless device 124. Accordingly, the identity of the wireless device 124 of interest is therefore associated with a person of interest.
  • At a block 706, wireless network data is obtained from the home network of the account holder's wireless device 124 via the wireless network 102. The wireless network data represents information pertaining to the account holder's wireless device 124 and is determinable based upon the unique identifier of the account holder's wireless device 124. The request for information is made to the network using an appropriate communications protocol, communicated via the wireless network 102. The request is based upon the unique identifier of the account holder's wireless device 124. For example, various wireless device location and/or wireless device supplementary subscription data is stored within the wireless network 102 serving the wireless device 124. In response to the request for data, information pertaining to the wireless device 124 is provided to the Mobile Directory Number and Email Transaction Verification System 100.
  • At a block 708, a communication request is made to the financial institution 116 to request data associated with the financial account pertaining to an account holder identified by the account number provided in the request. The request for data is made to the financial institution 116 using an appropriate communications protocol. The request is based upon the account number associated with the account holder. For example, various account holder data is stored within the financial institution account holder profile 116 associated with the account number.
  • At a block 710, account holder data is obtained from (and/or in response to the communications request to) the account holder profile at the financial institution 116 associated with the provided account number. The data represents information pertaining to the account holder's account, and in particular, MDN(s) and other telephone directory numbers associated with the account. In response to the request for data, information pertaining to the account holder is provided to the Mobile Directory Number and Email Transaction Verification System 100.
  • At a block 712, an identity risk value is generated based on the wireless network data and the financial institution account holder data. The process of FIG. 7 ends at block 714.
  • The process of FIG. 8 starts at a block 802. At block 804, a communication request is received from the payment network 118 that includes an account number used to identify an account related to a financial transaction and an email address and/or IP address data associated with the financial transaction. Accordingly, the email address and/or IP address data of interest is therefore associated with a person of interest.
  • At a block 806, a communication request is made to the financial institution 116 to request data associated with the financial account pertaining to an account holder identified by an account number provided in the request. The request for data is made to the financial institution 116 using an appropriate communications protocol. The request is based upon the account number associated with the account holder. For example, various account holder data is stored within the account holder profile at the financial institution 116 associated with the account number.
  • At a block 808, account holder data is obtained from (and/or in response to the communications request to) the account holder profile at the financial institution 116 associated with the provided account number. The data represents information pertaining to the account holder's account, and in particular, email address(es) associated with the account. Preferably, the received account holder data is not available from other sources. In response to the request for data, information pertaining to the account holder is provided to the Mobile Directory Number and Email Transaction Verification System 100.
  • At a block 810, a communication request is made to the email service provider 114 to request data associated with the email address pertaining to the account holder that was received from the financial institution 116 and/or the payment network 118. The request for data is made to the email service provider 114 using an appropriate communications protocol. The request is based upon the email address associated with the email account. For example, various email account data is stored within the account holder profile at the email service provider 114 associated with the email address.
  • At a block 812, IP address data is obtained from (and/or in response to the communications request to) the email service provider account holder profile 114 associated with the provided email address. The data represents information pertaining to the account holder's email account, and in particular, IP addresses associated with access to the email account. Preferably, the received IP address data is not available from other sources. In response to the request for IP address data, information pertaining to the email account is provided to the Mobile Directory Number and Email Transaction Verification System 100.
  • At a block 814, an identity risk value is generated based on the email account data and the financial institution account holder data. The process of FIG. 8 ends at a block 816.
  • The generated identity risk value is indicative of whether or not a particular financial transaction of interest that is associated with a wireless device 124 and/or an email address is likely to be fraudulent or valid. Since the identity of the individual attempting to complete a financial transaction of interest can be associated with the wireless device 124 and/or a particular email address, then the identity risk value is indicative of the likelihood of fraud by the individual attempting to complete the financial transaction of interest.
  • For example, an individual associated with the wireless device 124 and/or a particular email address may be attempting to conduct a financial transaction, such as a purchase using a credit card or debit card. The generated identity risk value would give an indication of whether or not the financial transaction is likely to be valid when the obtained wireless device location data, supplementary subscription data associated with the wireless device, IP address location data and/or other data that may be derived from other telephone directory numbers associated with a financial account holder tend to indicate that the individual attempting to conduct the financial transaction of interest is the same individual that is associated with the wireless device 124 and/or an email address.
  • In an exemplary embodiment, the multiplicity of location data obtained by the Mobile Directory Number and Email Transaction Verification System 100 pertaining to an MDN (e.g. wireless device 124 location data), other telephone directory numbers (e.g. CC and NDC location data) and IP address data (e.g. IP geographical location data) of a financial transaction of interest may be used, along with historical location data to determine location patterns pertaining to an individual. By analyzing these location patterns, and potentially performing a statistical correlation among these location data, the Mobile Directory Number and Email Transaction Verification System 100 may be able to determine irregular or anomalous locations associated with an individual corresponding to a financial transaction of interest.
  • As a non-limiting example, for a particular MDN associated with a financial transaction, a particular email address associated with the financial transaction or both, obtained location data may be associated with geographic areas around City A and City B. Furthermore, City A may be separated from City B by some large distance, for example, 1000 miles. Obtained wireless device 124 location data may be near City A. Historical wireless device 124 location data may be near City B. Country code and national destination code information of a second obtained telephone directory number may be associated with City B, implying that an individual is associated with a telephone number at City B. Obtained IP address location data pertaining to an obtained IP address may be associated with City A, implying that email account access has occurred near City A. When a financial transaction of interest occurs and is sent form the payment network 118 to the Mobile Directory Number and Email Transaction Verification System 100, the Mobile Directory Number and Email Transaction Verification System 100 may determine that email account access relating to an individual associated with the financial transaction has occurred near City A within the past one hour of the financial transaction occurring. Further, the Mobile Directory Number and Email Transaction Verification System 100 may determine that the wireless device 124 identified with the individual associated with the financial transaction was near City B within the past one hour of the financial transaction occurring. Thus, in this example, the Mobile Directory Number and Email Transaction Verification System 100 uses a statistical correlation method and/or process to conclude that there is a reasonable probability that the individual is now near City B. Since it is statistically reasonable that it could take many hours to fly from City A to City B, the identity risk value would indicate a reasonable likelihood that the financial transaction of interest is invalid or fraudulent.
  • In some embodiments, the status of an MDN representing the wireless device 124 or other telephone directory numbers may be used to determine the identity risk value. It is appreciated that in some situations, a fraudulent financial transaction may occur in the absence of the wireless device 124 (which is tantamount to the wireless device 124 being inactive, or “off”). If the state of the wireless device 124 is active (the wireless device 124 is “on”), the Mobile Directory Number and Email Transaction Verification System 100 may then statistically conclude that there is a reasonable probability that the financial transaction of interest is likely to be valid (since the wireless device 124 is in an active state). On the other hand, the Mobile Directory Number and Email Transaction Verification System 100 may statistically conclude that there is a reasonable probability that the financial transaction of interest is likely to be fraudulent (if the state of the wireless device 124 is inactive). The state of the wireless device 124 may be provided by the wireless network 102 in response to a request for information generated by the Mobile Directory Number and Email Transaction Verification System 100. Furthermore, it is appreciated that in some situations, a fraudulent financial transaction may occur when other telephone directory numbers associated with the financial transaction of interest are obtained by the Mobile Directory Number and Email Transaction Verification System 100. The Mobile Directory Number and Email Transaction Verification System 100 may determine that one or more of these numbers are not in use and associated with the individual corresponding to the financial transaction of interest. If one or more of the telephone directory numbers are in use, there may be a name associated with the subscription that may or may not be similar to the name associated with the account holder. If any of the obtained telephone directory numbers are not in use, or the name associated with any of the obtained telephone directory numbers that are in use for the subscription of the these numbers, is not similar to the name when compared to the name associated with the MDN subscription, the names on other telephone directory numbers or the name on the actual financial account associated with the financial transaction of interest, the Mobile Directory Number and Email Transaction Verification System 100 may then statistically conclude that there is a reasonable probability that the financial transaction of interest is likely to be invalid. On the other hand, the Mobile Directory Number and Email Transaction Verification System 100 may statistically conclude, using the data discussed above and optionally other data and parameters obtained and associated with the financial transaction of interest, that there is a reasonable probability that the financial transaction of interest is likely to be valid (if the state of all of the telephone directory numbers is “assigned” and/or the name associated with all of the telephone directory numbers is similar to the name when compared to the name associated with the MDN subscription or the name of the financial account holder).
  • In some embodiments, the format of the email address may be used to determine the identity risk value. If the “local-part” portion of the obtained email address of an individual associated with the financial transaction has a string of characters that is similar to the name of the account holder on the financial account for a financial transaction of interest and/or the name on subscriptions associated with the MDN and other telephone directory numbers, the Mobile Directory Number and Email Transaction Verification System 100 may statistically conclude, using the data discussed above, and optionally other data and parameters obtained and associated with the financial transaction of interest, that there is a reasonable probability that the financial transaction of interest is likely to be valid. For example, the email address may have the value “jsmith@gmail.com” where the name on the financial account is “John Smith” and the names on the subscriptions for the MDN and other telephone directory numbers are “J. Smith,” “John Smith” or the like. Conversely, for example, the email address may have the value “x@xyz.com” where the name on the financial account is “John Smith” and the names on the subscriptions for the MDN and other telephone directory numbers are “J. Smith,” “John Smith” or the like. In this case, the Mobile Directory Number and Email Transaction Verification System 100 may statistically conclude, using the data discussed above, and optionally other data and parameters obtained and associated with the financial transaction of interest, that there is a reasonable probability that the financial transaction of interest is likely to be invalid as the email address appears to be of an anonymous value, which may an indication that the financial transaction of interest is fraudulent.
  • Similarly, if the “domain” portion of the obtained email address of an individual associated with a financial transaction has a public and potentially anonymous value, such as “gmail,” “aol,” “yahoo,” or the like, the Mobile Directory Number and Email Transaction Verification System 100 may statistically conclude, using the data discussed above, and optionally other data and parameters obtained and associated with the financial transaction of interest, that the financial transaction of interest is more likely to be invalid as these domain name values, that may be anonymous, are more associated with fraudulent financial transactions in general. Conversely, if the “domain” portion of the obtained email address of an individual associated with the financial transaction has a well-known corporate name associated with more private email addresses, such as “ibm,” “boeing,” “apple,” or the like, the Mobile Directory Number and Email Transaction Verification System 100 may statistically conclude, using the data discussed above, and optionally other data and parameters obtained and associated with the financial transaction of interest, that the financial transaction of interest is more likely to be valid as these domain name values are more associated with legitimate financial transactions in general.
  • In some embodiments, the time of access to an email account associated with an email address related to a financial transaction of interest may be used to determine the identity risk value. The Mobile Directory Number and Email Transaction Verification System 100 may use the obtained email address for the financial transaction of interest and analyze and process the email address along with additional obtained IP address data. Based on this analysis, a probabilistic determination of fraud can be made that the IP address data associated with the financial transaction is fraudulent or not. An example of this processing might be that the email address provided was accessed from a computer in Bellevue, Wash., and one hour later a CNP transaction for the owner of the email account was made in Miami, Fla. This could indicate the possibility of a fraudulent financial transaction. Another example might be that the IP address data associated with the transaction emanated from an IP address that was never accessed for the individual's email account. This could also be an indication that the transaction may be fraudulent.
  • In some embodiments, the wireless network and type of wireless subscription may be used to determine the identity risk value. Financial fraud and fraudulent activities tend to be associated with pre-paid wireless accounts more often than with post-paid wireless accounts. The reason for this is that pre-paid wireless subscribers tend to be more transient and are often times not required to provide any personal information to the wireless network to obtain a subscription. Some wireless networks provide pre-paid wireless accounts only to subscribers, while some wireless networks provide both pre-paid and post-paid wireless accounts. If the MDN associated with a financial transaction of interest is associated with a pre-paid account, the Mobile Directory Number and Email Transaction Verification System 100 may statistically conclude and, using the data discussed above, and optionally other data and parameters obtained and associated with the financial transaction of interest, that the financial transaction of interest is more likely to be invalid. It is appreciated that service provided from a well known subscription service provider may tend to indicate that the financial transaction of interest is valid. On the other hand, if the subscription service provider is a small organization, and/or if the subscription service provider is based in a country with little to no regulatory oversight or legal enforcement, it is appreciated that such a subscription service provider may tend to indicate that the financial transaction of interest is likely to be fraudulent. Accordingly, embodiments of the Mobile Directory Number and Email Transaction Verification System 100 use the identity of the particular wireless network operator in determining the identity risk value.
  • In some embodiments, the age of the MDN subscription or other obtained telephone directory number subscriptions associated with a financial account corresponding to a financial transaction of interest may be used to determine the identity risk value. Mobile directory numbers (MDNs) and other telephone directory numbers that have been associated with a subscription for the same individual for a very short period of time, such as one month at the time the financial transaction of interest was performed, for example, may be associated with transience of the individual where this transient status may be more indicative of a higher risk of financial fraud. If the MDN and/or other telephone directory numbers relating to a financial transaction of interest have been associated with a subscription for a short period of time, the Mobile Directory Number and Email Transaction Verification System 100 may statistically conclude, using the data above and optionally other data and parameters obtained and associated with the financial transaction of interest, that the financial transaction of interest is more likely to be invalid. Conversely, if the MDN and/or other telephone directory numbers relating to the financial transaction of interest have been associated with a subscription for a long period of time, for example, one year or longer, the Mobile Directory Number and Email Transaction Verification System 100 may statistically conclude, using that information and optionally other data and parameters obtained and associated with the financial transaction of interest, that the financial transaction of interest is more likely to be valid.
  • Recent regulatory provisions allow an individual to retain their current mobile directory number if the individual changes their wireless network subscription service provider. In some embodiments, the service history of the entity's current mobile directory number, and potentially other obtained telephone directory numbers, is obtained from the wireless network. It is appreciated that a criminal engaging in fraudulent activities may frequently change their subscription service provider in an effort to avoid detection by legal enforcement agencies. In contrast, an honest citizen is more likely to retain their service provider for a long period of time. Accordingly, it is appreciated that a service, or porting, history demonstrating frequent and reoccurring changes to different subscription service providers may be associated with criminal activity and that the financial transaction of interest is likely to be fraudulent. On the other hand, it is appreciated that a history demonstrating a long duration of service from a single subscription service provider may tend to indicate that the financial transaction of interest is valid. Accordingly, embodiments of the Mobile Directory Number and Email Transaction Verification System 100 consider the service history of the wireless device 124, and other telephone directory numbers, in determining the identity risk value.
  • In some embodiments, the subscribed features such as call-forwarding, for example, associated with the MDN wireless network subscription or other obtained telephone directory number subscriptions, relating to a financial account corresponding to a financial transaction of interest may be used to determine the identity risk value. It is appreciated that a criminal engaging in fraudulent financial transactions is more likely to subscribe to a relatively inexpensive subscription service and that an honest citizen is more likely to subscribe to a premium subscription service. Accordingly, the Mobile Directory Number and Email Transaction Verification System 100 may statistically conclude that there is a reasonable probability that the financial transaction of interest is likely to be valid when the wireless device 124 is receiving a premium subscription service. On the other hand, the Mobile Directory Number and Email Transaction Verification System 100 may statistically conclude that there is a reasonable probability that the financial transaction of interest is likely to be fraudulent if the wireless device 124 has been receiving an inexpensive subscription service.
  • In an example embodiment, the above-described wireless device location indicia, wireless device supplementary subscription indicia, telephone directory number indicia, email address indicia and IP address indicia obtained by the Mobile Directory Number and Email Transaction Verification System 100 in response to a request for information from embodiments of the Mobile Directory Number and Email Transaction Verification System 100 are used to determine the identity risk value using a suitable statistical correlation process and/or method. Embodiments may determine the identity risk value using one or more of the above-described indicia. Weighting may be used to adjust the relevance of particular indicia when the identity risk value is determined. Embodiments may selectively pick available indicia for consideration when the identity risk value is determined.
  • Further, other available supplementary information may also be considered when the identity risk value is determined. For example, a remote source may provide a credit history, billing history or the like that is considered when the identity risk value is determined.
  • FIG. 9 depicts an exemplary computer system 122 of an embodiment of the Mobile Directory Number and Email Transaction Verification System 100. The computer system 122 includes at least one processor 1222, at least one memory component 1224 in signal communication with the processor 1222, and at least one communications interface 1226 in signal communication with the processor 1222. The processor 1222, the memory component 1224, and the communications interface 1226 are communicatively coupled to a communication bus 1228, thereby providing connectivity between the above-described components. In alternative embodiments of the Mobile Directory Number and Email Transaction Verification System 100, the above-described components may be communicatively coupled to each other in a different manner. For example, one or more of the above-described components may be directly coupled to the processor 1222, or may be coupled to the processor 1222 via intermediary components (not shown). Further, additional components (not shown) may be included in alternative embodiments of the Mobile Directory Number and Email Transaction Verification System 100.
  • The memory component 1224 may be any suitable memory device or system. Depending upon the embodiment, the memory component 1224 may be a dedicated memory system, may be part of another component or system, and/or may be a distributed memory system. The memory component 1224 may also include other logic, modules and/or databases not illustrated or described herein.
  • In the context of this disclosure, the memory component 1224 is a computer-readable medium that is an electronic, magnetic, optical, or other another physical device or means that contains or stores a computer and/or processor program. The computer-readable medium can be, for example, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device, or propagation medium. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection having one or more wires, a portable computer diskette (magnetic, compact flash card, secure digital, or the like), a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM, EEPROM, or Flash memory), an optical fiber, and a portable compact disc read-only memory (CDROM). Note that the computer-readable medium, could even be paper or another suitable medium upon which the program associated with logic is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted, or otherwise processed in a suitable manner, if necessary, and then stored in a device such as another memory component in signal communication with the processor 1222.
  • The communications interface 1226 is illustrated and described herein as a single component that is configured to communicate with the wireless network 102. Also, the communications interface 1226 is illustrated and described as being configured to communicate with the financial institution 116. Further, the communications interface 1226 is illustrated and described as being configured to communicate with the email service provider 114. Additionally, the communications interface 1226 is illustrated and described as being configured to communicate with the payment network 118 that provides a request for information pertaining to the likelihood that a financial transaction of interest is valid.
  • It is appreciated that the communications interface 1226 may be comprised of a plurality of communication devices that act in cooperation so that embodiments of the Mobile Directory Number and Email Transaction Verification System 100 are able to access the various entities described herein. Further, the wireless network 102 may be a different system than a wireless network associated with network supplemental information system 126. Accordingly, the various communication devices of the communications interface 1226 may be different from each other so as to support communications over a variety of different networks that may be using different communication formats.
  • Embodiments of the Mobile Directory Number and Email Transaction Verification System 100 are configured to concurrently process a plurality of requests to verify that a plurality of different financial transactions of interest are valid. The plurality of requests may originate from the same payment network 118. That is, it is likely that a large payment network 118, such as a bank or credit card company, will be concurrently conducting many different financial transaction of interest with different customers. Further, embodiments of the Mobile Directory Number and Email Transaction Verification System 100 may be configured to concurrently process the plurality of communications requests and responses for information from many different systems. That is, embodiments are configured to concurrently request and respond from/to different systems, such as multiple payment networks 118, multiple wireless networks 102, multiple financial institutions 116 and multiple email service providers 114.
  • While the preferred embodiment of the invention has been illustrated and described, as noted above, many changes can be made without departing from the spirit and scope of the invention. Accordingly, the scope of the invention is not limited by the disclosure of the preferred embodiment. Instead, the invention should be determined entirely by reference to the claims that follow.

Claims (13)

1. A method of verifying a financial transaction comprising:
receiving an account number from a computerized payment network at a computerized verification system;
sending a query including the account number from the computerized verification system to a financial institution associated with the account number;
receiving a wireless device ID at the computerized verification system from the financial institution in response to the query;
determining a fraud indicator based on the wireless device ID received from the financial institution using the computerized verification system; and
sending the fraud indicator from the computerized verification system to the computerized payment network.
2. The method of verifying a financial transaction according to claim 1, further comprising:
receiving a wireless device ID from the payment network at the computerized verification system,
wherein determining the fraud indicator is also based on the wireless device ID received from the payment network.
3. The method of verifying a financial transaction according to claim 2, wherein determining the fraud indicator is based on whether the wireless device ID received from the financial institution matches the wireless device ID received from the payment network.
4. The method of verifying a financial transaction according to claim 1, further comprising:
receiving location data associated with the wireless device ID from a wireless network at the computerized verification system,
wherein determining the fraud indicator is also based on the wireless device ID location data.
5. The method of verifying a financial transaction according to claim 1, further comprising:
receiving at least one additional telephone directory number associated with the account number from the financial institution at the computerized verification system,
wherein determining the fraud indicator is also based on the received telephone directory numbers.
6. The method of verifying a financial transaction according to claim 1, further comprising:
receiving supplementary subscription data associated with the wireless device ID from a wireless network at the computerized verification system,
wherein determining the fraud indicator is also based on the supplementary subscription data.
7. The method of verifying a financial transaction according to claim 1, further comprising determining whether the transaction should be authorized based on the fraud indicator at the computerized payment network.
8. The method of verifying a financial transaction according to claim 7, further comprising presenting an authorization indicator on a computerized device based on whether the computerized payment network determined the transaction should be authorized.
9. A method of verifying a financial transaction comprising:
receiving an account number from a payment network at a computerized verification system;
sending a first query including the account number from the computerized verification system to a financial institution associated with the account number;
receiving an email address associated with the account number at the computerized verification system from the financial institution in response to the first query;
sending a second query including the received email address from the computerized verification system to an email service provider associated with the email address;
receiving email address data, including IP address data associated with accesses of the email address at the computerized verification system from the email service provider in response to the second query;
determining a fraud indicator based on the email address data using the computerized verification system; and
sending the fraud indicator from the computerized verification system to the computerized payment network.
10. The method of verifying a financial transaction according to claim 9, further comprising:
receiving an email address from the payment network,
wherein determining the fraud indicator is also based on the email address received from the payment network
11. The method of verifying a financial transaction according to claim 8, further comprising:
receiving IP address data from the payment network,
wherein determining the fraud indicator is also based on the IP address data received from the payment network.
12. The method of verifying a financial transaction according to claim 9, further comprising determining whether the transaction should be authorized based on the fraud indicator at the computerized payment network.
13. The method of verifying a financial transaction according to claim 9, further comprising presenting an authorization indicator on a computerized device based on whether the computerized payment network determined the transaction should be authorized.
US13/382,900 2009-07-07 2010-07-07 Mobile directory number and email verification of financial transactions Abandoned US20120130898A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/382,900 US20120130898A1 (en) 2009-07-07 2010-07-07 Mobile directory number and email verification of financial transactions

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US22367709P 2009-07-07 2009-07-07
US22367109P 2009-07-07 2009-07-07
US61223677 2009-07-07
US61223671 2009-07-07
PCT/US2010/041264 WO2011005900A1 (en) 2009-07-07 2010-07-07 Mobile directory number and email verification of financial transactions
US13/382,900 US20120130898A1 (en) 2009-07-07 2010-07-07 Mobile directory number and email verification of financial transactions

Related Parent Applications (5)

Application Number Title Priority Date Filing Date
PCT/US2010/041264 A-371-Of-International WO2011005900A1 (en) 2007-03-16 2010-07-07 Mobile directory number and email verification of financial transactions
USPCT/US2010/401264 A-371-Of-International 2010-07-07
US13/387,991 Continuation-In-Part US9818121B2 (en) 2009-07-31 2010-07-30 Mobile communications message verification of financial transactions
PCT/US2010/044019 Continuation-In-Part WO2011014837A1 (en) 2007-03-16 2010-07-30 Mobile communications message verification of financial transactions
US13/303,809 Continuation-In-Part US8588748B2 (en) 2007-03-16 2011-11-23 System and method for mobile identity protection of a user of multiple computer applications, networks or devices

Related Child Applications (10)

Application Number Title Priority Date Filing Date
US13/387,991 Continuation-In-Part US9818121B2 (en) 2009-07-31 2010-07-30 Mobile communications message verification of financial transactions
PCT/US2010/044019 Continuation-In-Part WO2011014837A1 (en) 2007-03-16 2010-07-30 Mobile communications message verification of financial transactions
US13/030,794 Continuation-In-Part US20110208601A1 (en) 2007-03-16 2011-02-18 System and method for financial transaction authentication using travel information
US13/737,901 Continuation-In-Part US9420448B2 (en) 2007-03-16 2013-01-09 System and method for automated analysis comparing a wireless device location with another geographic location
US14/446,626 Continuation-In-Part US9603023B2 (en) 2007-03-16 2014-07-30 System and method for identity protection using mobile device signaling network derived location pattern recognition
US14/457,740 Continuation-In-Part US9154952B2 (en) 2007-03-16 2014-08-12 Systems and methods for authenticating a user of a computer application, network, or device using a wireless device
US14/867,382 Continuation-In-Part US9456348B2 (en) 2007-03-16 2015-09-28 Systems and methods for authenticating a user of a computer application, network, or device using a wireless device
US14/867,382 Continuation US9456348B2 (en) 2007-03-16 2015-09-28 Systems and methods for authenticating a user of a computer application, network, or device using a wireless device
US14/922,727 Continuation-In-Part US9838872B2 (en) 2007-03-16 2015-10-26 System and method for mobile identity protection for online user authentication
US15/713,148 Continuation US11301855B2 (en) 2009-07-07 2017-09-22 Data verification in transactions in distributed network

Publications (1)

Publication Number Publication Date
US20120130898A1 true US20120130898A1 (en) 2012-05-24

Family

ID=43429530

Family Applications (2)

Application Number Title Priority Date Filing Date
US13/382,900 Abandoned US20120130898A1 (en) 2009-07-07 2010-07-07 Mobile directory number and email verification of financial transactions
US15/713,148 Active 2033-01-11 US11301855B2 (en) 2009-07-07 2017-09-22 Data verification in transactions in distributed network

Family Applications After (1)

Application Number Title Priority Date Filing Date
US15/713,148 Active 2033-01-11 US11301855B2 (en) 2009-07-07 2017-09-22 Data verification in transactions in distributed network

Country Status (4)

Country Link
US (2) US20120130898A1 (en)
EP (1) EP2452303A4 (en)
CA (1) CA2804455C (en)
WO (1) WO2011005900A1 (en)

Cited By (109)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120209768A1 (en) * 2011-02-14 2012-08-16 Ebay, Inc. Payment system with location restrictions
US20120317019A1 (en) * 2011-05-26 2012-12-13 First Data Corporation Card-Present On-Line Transactions
US20130047241A1 (en) * 2011-08-15 2013-02-21 Bank Of America Corporation Method and Apparatus for Token-Based Combining of Risk Ratings
US20130061050A1 (en) * 2011-09-07 2013-03-07 Elwha LLC, a limited liability corporation of the State of Delaware Computational systems and methods for linking users of devices
WO2013181151A2 (en) * 2012-05-26 2013-12-05 Finsphere Corporation System and method for automated analysis comparing a wireless device location with another geographic location
US20130332358A1 (en) * 2012-06-12 2013-12-12 Ebay, Inc. Fraud detection system
US8726361B2 (en) 2011-08-15 2014-05-13 Bank Of America Corporation Method and apparatus for token-based attribute abstraction
US20140258122A1 (en) * 2013-03-11 2014-09-11 Brad Wardman Fraud detection based on age of contact information
US20150006384A1 (en) * 2013-06-28 2015-01-01 Zahid Nasiruddin Shaikh Device fingerprinting
US9141977B2 (en) 2011-09-07 2015-09-22 Elwha Llc Computational systems and methods for disambiguating search terms corresponding to network members
US9159055B2 (en) 2011-09-07 2015-10-13 Elwha Llc Computational systems and methods for identifying a communications partner
US9167099B2 (en) 2011-09-07 2015-10-20 Elwha Llc Computational systems and methods for identifying a communications partner
US9195848B2 (en) 2011-09-07 2015-11-24 Elwha, Llc Computational systems and methods for anonymized storage of double-encrypted data
US20150339656A1 (en) * 2014-05-21 2015-11-26 Square, Inc. Verified purchasing by push notification
US20150381820A1 (en) * 2014-06-25 2015-12-31 Enflick Inc. Mobile electronic communications using internet protocol
US9253197B2 (en) 2011-08-15 2016-02-02 Bank Of America Corporation Method and apparatus for token-based real-time risk updating
US9319535B2 (en) 2013-06-25 2016-04-19 Syniverse Technologies, Llc Method and apparatus to collect, analyze, and utilize network data
US9420448B2 (en) 2007-03-16 2016-08-16 Visa International Service Association System and method for automated analysis comparing a wireless device location with another geographic location
US9432845B2 (en) 2007-03-16 2016-08-30 Visa International Service Association System and method for automated analysis comparing a wireless device location with another geographic location
US9432190B2 (en) 2011-09-07 2016-08-30 Elwha Llc Computational systems and methods for double-encrypting data for subsequent anonymous storage
US20160283927A1 (en) * 2015-03-24 2016-09-29 Mastercard International Incorporated Authentication for mobile transactions
US9483765B2 (en) 2013-12-09 2016-11-01 Mastercard International Incorporated Systems and methods for monitoring payment transactions for fraud using social media
US9491146B2 (en) 2011-09-07 2016-11-08 Elwha Llc Computational systems and methods for encrypting data for anonymous storage
US9680942B2 (en) 2014-05-01 2017-06-13 Visa International Service Association Data verification using access device
US9690853B2 (en) 2011-09-07 2017-06-27 Elwha Llc Computational systems and methods for regulating information flow during interactions
US20170255937A1 (en) * 2016-03-02 2017-09-07 American Express Travel Related Services Company, Inc. Systems and methods for transaction account tokenization
US20170324762A1 (en) * 2016-05-05 2017-11-09 Paypal, Inc. Authentication and risk assessment through header injections
US9818121B2 (en) 2009-07-31 2017-11-14 Visa International Space Association Mobile communications message verification of financial transactions
US9922323B2 (en) 2007-03-16 2018-03-20 Visa International Service Association System and method for automated analysis comparing a wireless device location with another geographic location
US9922324B2 (en) 2014-05-21 2018-03-20 Square, Inc. Verified purchasing by email
US9928485B2 (en) 2011-09-07 2018-03-27 Elwha Llc Computational systems and methods for regulating information flow during interactions
US10115079B1 (en) 2011-06-16 2018-10-30 Consumerinfo.Com, Inc. Authentication alerts
US20180341950A1 (en) * 2017-05-24 2018-11-29 Mastercard International Incorporated Transaction control
US10185814B2 (en) 2011-09-07 2019-01-22 Elwha Llc Computational systems and methods for verifying personal information during transactions
US10198729B2 (en) 2011-09-07 2019-02-05 Elwha Llc Computational systems and methods for regulating information flow during interactions
US10263936B2 (en) 2011-09-07 2019-04-16 Elwha Llc Computational systems and methods for identifying a communications partner
US10373240B1 (en) 2014-04-25 2019-08-06 Csidentity Corporation Systems, methods and computer-program products for eligibility verification
US10453159B2 (en) 2013-05-23 2019-10-22 Consumerinfo.Com, Inc. Digital identity
US20190333066A1 (en) * 2014-04-24 2019-10-31 Swoop Ip Holdings Llc Sms and social media dual authorization, management oversight, and non-password security in email based e-commerce
US10467615B1 (en) 2015-09-30 2019-11-05 Square, Inc. Friction-less purchasing technology
US10546306B2 (en) 2011-09-07 2020-01-28 Elwha Llc Computational systems and methods for regulating information flow during interactions
US10586229B2 (en) 2010-01-12 2020-03-10 Visa International Service Association Anytime validation tokens
US10637853B2 (en) 2016-08-05 2020-04-28 Nok Nok Labs, Inc. Authentication techniques including speech and/or lip movement analysis
US10664936B2 (en) 2013-03-15 2020-05-26 Csidentity Corporation Authentication systems and methods for on-demand products
US10706132B2 (en) * 2013-03-22 2020-07-07 Nok Nok Labs, Inc. System and method for adaptive user authentication
US10743177B2 (en) 2013-05-21 2020-08-11 Syniverse Technologies, Llc Method and apparatus to provide mobile intelligence
US10740762B2 (en) 2013-03-15 2020-08-11 Consumerinfo.Com, Inc. Adjustment of knowledge-based authentication
US10750028B2 (en) 2017-06-29 2020-08-18 Textnow, Inc. Mobile communications with quality of service
US10748127B2 (en) 2015-03-23 2020-08-18 Early Warning Services, Llc Payment real-time funds availability
US10762477B2 (en) 2015-07-21 2020-09-01 Early Warning Services, Llc Secure real-time processing of payment transactions
US10769606B2 (en) 2015-03-23 2020-09-08 Early Warning Services, Llc Payment real-time funds availability
US10769635B2 (en) 2016-08-05 2020-09-08 Nok Nok Labs, Inc. Authentication techniques including speech and/or lip movement analysis
US10776791B2 (en) 2007-03-16 2020-09-15 Visa International Service Association System and method for identity protection using mobile device signaling network derived location pattern recognition
US10776809B1 (en) 2014-09-11 2020-09-15 Square, Inc. Use of payment card rewards points for an electronic cash transfer
US10798087B2 (en) 2013-10-29 2020-10-06 Nok Nok Labs, Inc. Apparatus and method for implementing composite authenticators
US10832246B2 (en) 2015-03-23 2020-11-10 Early Warning Services, Llc Payment real-time funds availability
US10839359B2 (en) 2015-03-23 2020-11-17 Early Warning Services, Llc Payment real-time funds availability
US10846662B2 (en) 2015-03-23 2020-11-24 Early Warning Services, Llc Real-time determination of funds availability for checks and ACH items
US10911234B2 (en) 2018-06-22 2021-02-02 Experian Information Solutions, Inc. System and method for a token gateway environment
US10936733B2 (en) * 2016-01-07 2021-03-02 Emmanuel Gonzalez Reducing inappropriate online behavior using analysis of email account usage data to select a level of network service
US10956888B2 (en) 2015-07-21 2021-03-23 Early Warning Services, Llc Secure real-time transactions
US10963856B2 (en) 2015-07-21 2021-03-30 Early Warning Services, Llc Secure real-time transactions
US10970688B2 (en) 2012-03-07 2021-04-06 Early Warning Services, Llc System and method for transferring funds
US10970695B2 (en) 2015-07-21 2021-04-06 Early Warning Services, Llc Secure real-time transactions
US11037122B2 (en) 2015-07-21 2021-06-15 Early Warning Services, Llc Secure real-time transactions
US11037121B2 (en) 2015-07-21 2021-06-15 Early Warning Services, Llc Secure real-time transactions
US11042863B1 (en) 2015-03-20 2021-06-22 Square, Inc. Grouping payments and payment requests
US11049207B1 (en) * 2014-12-23 2021-06-29 United Services Automobile Association (Usaa) Early fraud detection system
US11062290B2 (en) 2015-07-21 2021-07-13 Early Warning Services, Llc Secure real-time transactions
US11089482B2 (en) 2016-03-31 2021-08-10 Visa International Service Association System and method for correlating diverse location data for data security
US20210256506A1 (en) * 2010-08-12 2021-08-19 Visa International Service Association Securing external systems with account token substitution
US11100507B2 (en) 2014-04-08 2021-08-24 Visa International Service Association Data passed in an interaction
US20210266750A1 (en) * 2017-10-18 2021-08-26 Telesign Corporation User authentication based on ss7 call forwarding detection
US11144928B2 (en) 2016-09-19 2021-10-12 Early Warning Services, Llc Authentication and fraud prevention in provisioning a mobile wallet
US11151522B2 (en) 2015-07-21 2021-10-19 Early Warning Services, Llc Secure transactions with offline device
US11151523B2 (en) 2015-07-21 2021-10-19 Early Warning Services, Llc Secure transactions with offline device
US11157884B2 (en) 2015-07-21 2021-10-26 Early Warning Services, Llc Secure transactions with offline device
US11157872B2 (en) 2008-06-26 2021-10-26 Experian Marketing Solutions, Llc Systems and methods for providing an integrated identifier
US11276045B2 (en) * 2013-03-15 2022-03-15 Swoop Ip Holdings Llc Vendor token generator
US11282074B2 (en) * 2013-03-15 2022-03-22 Swoop Ip Holdings Llc Automated application programming interface (API) system and method
US11288713B2 (en) 2012-07-27 2022-03-29 Swoop Ip Holdings Llc Sending funds via an email payment gateway
US11301855B2 (en) 2009-07-07 2022-04-12 Visa International Service Association Data verification in transactions in distributed network
US11321682B2 (en) 2012-03-07 2022-05-03 Early Warning Services, Llc System and method for transferring funds
US11361290B2 (en) 2012-03-07 2022-06-14 Early Warning Services, Llc System and method for securely registering a recipient to a computer-implemented funds transfer payment network
US11373156B2 (en) 2013-12-23 2022-06-28 Swoop Ip Holdings Llc Method, system, and computer readable storage medium for alternative email-based website checkouts
US11373182B2 (en) 2012-03-07 2022-06-28 Early Warning Services, Llc System and method for transferring funds
US11386410B2 (en) 2015-07-21 2022-07-12 Early Warning Services, Llc Secure transactions with offline device
US11397950B2 (en) * 2019-06-20 2022-07-26 Microsoft Technology Licensing, Llc Systems and methods for authenticating an electronic transaction
US11405781B2 (en) 2007-03-16 2022-08-02 Visa International Service Association System and method for mobile identity protection for online user authentication
US11410143B2 (en) 2012-07-18 2022-08-09 Swoop Ip Holdings Llc Email-based e-commerce
US11416829B2 (en) 2015-07-13 2022-08-16 Swoop Ip Holdings Llc Myriad of payment methods with alternate payment controls
US11416891B2 (en) 2011-03-29 2022-08-16 Swoop Ip Holdings Llc Email-based transactions for e-commerce
US11468448B2 (en) * 2017-08-09 2022-10-11 Microsoft Technology Licensing, Llc Systems and methods of providing security in an electronic network
US11502981B2 (en) 2014-01-08 2022-11-15 Swoop Ip Holdings Llc Email based e-commerce using embedded forms
US11551198B2 (en) 2015-01-28 2023-01-10 Swoop Ip Holdings Llc Email-based e-commerce with near field communication
US11553252B2 (en) 2015-09-02 2023-01-10 Swoop Ip Holdings Llc System and method for interactive television with messaging based payments
US11562350B2 (en) 2014-02-20 2023-01-24 Swoop Ip Holdings Llc System and method for dual email and web based checkout in an unsegmented list
US11593800B2 (en) 2012-03-07 2023-02-28 Early Warning Services, Llc System and method for transferring funds
US11699148B2 (en) 2014-12-23 2023-07-11 Swoop Ip Holdings Llc Email address token integration
US11769138B2 (en) * 2012-03-19 2023-09-26 Swoop Ip Holdings Llc Method for processing multimodal mobile donations via text message and email communication
US11775948B2 (en) 2013-06-07 2023-10-03 Swoop Ip Holdings Llc System and method for two-click validation
US11792024B2 (en) 2019-03-29 2023-10-17 Nok Nok Labs, Inc. System and method for efficient challenge-response authentication
US11797997B2 (en) 2009-07-07 2023-10-24 Visa International Service Association Data verification in transactions in distributed network
US11823191B1 (en) 2022-08-29 2023-11-21 Block, Inc. Integration for performing actions without additional authorization requests
US11831409B2 (en) 2018-01-12 2023-11-28 Nok Nok Labs, Inc. System and method for binding verifiable claims
US11868995B2 (en) 2017-11-27 2024-01-09 Nok Nok Labs, Inc. Extending a secure key storage for transaction confirmation and cryptocurrency
US11929997B2 (en) 2013-03-22 2024-03-12 Nok Nok Labs, Inc. Advanced authentication techniques and applications
US11941065B1 (en) 2019-09-13 2024-03-26 Experian Information Solutions, Inc. Single identifier platform for storing entity data
US11961127B2 (en) 2022-03-28 2024-04-16 Swoop Ip Holdings Llc Sending funds via an email payment gateway

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9514466B2 (en) * 2009-11-16 2016-12-06 Yahoo! Inc. Collecting and presenting data including links from communications sent to or from a user
US20140279494A1 (en) * 2013-03-12 2014-09-18 Mastercard International Incorporated Method and system of detecting and using geofencing for fraud detection and modeling
CN109345245B (en) * 2018-09-25 2020-11-03 全链通有限公司 Short message verification method, device, network and storage medium based on block chain
US10817879B2 (en) 2019-01-07 2020-10-27 Capital One Services, Llc Fraud detection based on an analysis of messages in a messaging account
US11205156B2 (en) * 2019-10-19 2021-12-21 Paypal, Inc. Security data points from an electronic message
US11386902B2 (en) 2020-04-28 2022-07-12 Bank Of America Corporation System for generation and maintenance of verified data records
US11283771B2 (en) 2020-04-28 2022-03-22 Bank Of America Corporation Secure data transfer system with integrated proxy gateway

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010046862A1 (en) * 2000-02-09 2001-11-29 Netfrontier, Inc. Communication systems, components, and methods operative with programmable wireless devices
US20020194119A1 (en) * 2001-05-30 2002-12-19 William Wright Method and apparatus for evaluating fraud risk in an electronic commerce transaction
US20030097561A1 (en) * 2000-08-04 2003-05-22 First Data Corporation Gauging Risk in Electronic Communications Regarding Accounts in ABDS System
US20030135463A1 (en) * 2002-01-16 2003-07-17 International Business Machines Corporation Credit authorization system and method
US6658568B1 (en) * 1995-02-13 2003-12-02 Intertrust Technologies Corporation Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management
US20050097320A1 (en) * 2003-09-12 2005-05-05 Lior Golan System and method for risk based authentication
US20060180660A1 (en) * 2004-04-12 2006-08-17 Gray R O Electronic identification system
US20070178883A1 (en) * 2006-02-02 2007-08-02 Lucent Technologies Inc. Authentication and verification services for third party vendors using mobile devices
US20080164308A1 (en) * 2007-01-10 2008-07-10 Aaron Jeffrey A Credit card transaction servers, methods and computer program products employing wireless teminal location and registered purchasing locations
US20080208760A1 (en) * 2007-02-26 2008-08-28 14 Commerce Inc. Method and system for verifying an electronic transaction
US20090210308A1 (en) * 2008-02-15 2009-08-20 First Data Corporation Secure authorization of contactless transaction
US20090260064A1 (en) * 2008-04-15 2009-10-15 Problem Resolution Enterprise, Llc Method and process for registering a device to verify transactions
US20090307778A1 (en) * 2008-06-06 2009-12-10 Ebay Inc. Mobile User Identify And Risk/Fraud Model Service
US20100293090A1 (en) * 2009-05-14 2010-11-18 Domenikos Steven D Systems, methods, and apparatus for determining fraud probability scores and identity health scores
US20100325035A1 (en) * 2009-06-18 2010-12-23 Nancy Hilgers Fraud/risk bureau
US20130041821A1 (en) * 2011-08-10 2013-02-14 Bank Of America Corporation Fraud messaging service

Family Cites Families (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5892900A (en) * 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US6868391B1 (en) 1997-04-15 2005-03-15 Telefonaktiebolaget Lm Ericsson (Publ) Tele/datacommunications payment method and apparatus
US7403922B1 (en) * 1997-07-28 2008-07-22 Cybersource Corporation Method and apparatus for evaluating fraud risk in an electronic commerce transaction
US7610216B1 (en) * 2000-07-13 2009-10-27 Ebay Inc. Method and system for detecting fraud
JP2002117377A (en) 2000-10-04 2002-04-19 Nec Corp Personal authentication system using position information, authentication system by card and door lock system by password number
JP2002269350A (en) 2001-03-14 2002-09-20 Hitachi Ltd Transaction settlement method, transaction settlement system and portable communication terminal used therefor and settlement terminal for member store
US7376431B2 (en) 2002-02-05 2008-05-20 Niedermeyer Brian J Location based fraud reduction system and method
US8595495B2 (en) * 2003-01-12 2013-11-26 Yaron Mayer System and method for secure communications
US7373669B2 (en) * 2003-08-13 2008-05-13 The 41St Parameter, Inc. Method and system for determining presence of probable error or fraud in a data set by linking common data values or elements
US7743981B2 (en) 2003-12-23 2010-06-29 First Data Corporation GPS database to manage risk for financial transactions
US6948656B2 (en) 2003-12-23 2005-09-27 First Data Corporation System with GPS to manage risk of financial transactions
US8224753B2 (en) * 2004-12-07 2012-07-17 Farsheed Atef System and method for identity verification and management
US20060131390A1 (en) * 2004-12-16 2006-06-22 Kim Mike I Method and system for providing transaction notification and mobile reply authorization
US7503489B2 (en) 2005-04-26 2009-03-17 Bpriv, Llc Method and system for monitoring electronic purchases and cash-withdrawals
US8285639B2 (en) 2005-07-05 2012-10-09 mConfirm, Ltd. Location based authentication system
US7697942B2 (en) 2005-09-02 2010-04-13 Stevens Gilman R Location based rules architecture systems and methods
US8166068B2 (en) 2005-09-02 2012-04-24 Qwest Location based authorization of financial card transactions systems and methods
US20080040275A1 (en) * 2006-04-25 2008-02-14 Uc Group Limited Systems and methods for identifying potentially fraudulent financial transactions and compulsive spending behavior
US20070250441A1 (en) * 2006-04-25 2007-10-25 Uc Group Limited Systems and methods for determining regulations governing financial transactions conducted over a network
WO2008052310A1 (en) * 2006-10-04 2008-05-08 Pgmx Inc Method and system of securing accounts
US20080249951A1 (en) * 2006-10-10 2008-10-09 Gilder Clark S Security systems and methods for digital payments
US7669759B1 (en) 2006-10-31 2010-03-02 United Services Automobile Association (Usaa) GPS validation for transactions
US8788419B2 (en) * 2006-12-30 2014-07-22 First Data Corporation Method and system for mitigating risk of fraud in internet banking
US7539644B2 (en) * 2007-03-08 2009-05-26 Softroute Corporation Method of processing online payments with fraud analysis and management system
WO2011005900A1 (en) 2009-07-07 2011-01-13 Finsphere Corporation Mobile directory number and email verification of financial transactions
US8280348B2 (en) 2007-03-16 2012-10-02 Finsphere Corporation System and method for identity protection using mobile device signaling network derived location pattern recognition
US8116731B2 (en) 2007-11-01 2012-02-14 Finsphere, Inc. System and method for mobile identity protection of a user of multiple computer applications, networks or devices
US8374634B2 (en) * 2007-03-16 2013-02-12 Finsphere Corporation System and method for automated analysis comparing a wireless device location with another geographic location
US20090132423A1 (en) * 2007-11-15 2009-05-21 Ebay Inc. Send money plug in for web mails
US8401906B2 (en) 2007-12-12 2013-03-19 At&T Intellectual Property I, L.P. Financial transaction authentication servers, methods, and computer program products for facilitating financial transactions between buyers and sellers
US10115111B2 (en) * 2008-06-12 2018-10-30 Guardian Analytics, Inc. Modeling users for fraud detection and analysis
US8632002B2 (en) 2008-07-08 2014-01-21 International Business Machines Corporation Real-time security verification for banking cards
US8615465B2 (en) 2008-07-08 2013-12-24 International Business Machines Corporation Real-time security verification for banking cards
US7747535B2 (en) 2008-10-17 2010-06-29 At&T Mobility Ii Llc User terminal and wireless item-based credit card authorization servers, systems, methods and computer program products
AU2010215100A1 (en) * 2009-02-20 2011-10-06 Moqom Limited Merchant alert system and method for fraud prevention
US9471920B2 (en) * 2009-05-15 2016-10-18 Idm Global, Inc. Transaction assessment and/or authentication
US9681359B2 (en) 2010-03-23 2017-06-13 Amazon Technologies, Inc. Transaction completion based on geolocation arrival

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6658568B1 (en) * 1995-02-13 2003-12-02 Intertrust Technologies Corporation Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management
US20010046862A1 (en) * 2000-02-09 2001-11-29 Netfrontier, Inc. Communication systems, components, and methods operative with programmable wireless devices
US20030097561A1 (en) * 2000-08-04 2003-05-22 First Data Corporation Gauging Risk in Electronic Communications Regarding Accounts in ABDS System
US20020194119A1 (en) * 2001-05-30 2002-12-19 William Wright Method and apparatus for evaluating fraud risk in an electronic commerce transaction
US20030135463A1 (en) * 2002-01-16 2003-07-17 International Business Machines Corporation Credit authorization system and method
US20050097320A1 (en) * 2003-09-12 2005-05-05 Lior Golan System and method for risk based authentication
US20060180660A1 (en) * 2004-04-12 2006-08-17 Gray R O Electronic identification system
US20070178883A1 (en) * 2006-02-02 2007-08-02 Lucent Technologies Inc. Authentication and verification services for third party vendors using mobile devices
US20080164308A1 (en) * 2007-01-10 2008-07-10 Aaron Jeffrey A Credit card transaction servers, methods and computer program products employing wireless teminal location and registered purchasing locations
US20080208760A1 (en) * 2007-02-26 2008-08-28 14 Commerce Inc. Method and system for verifying an electronic transaction
US20090210308A1 (en) * 2008-02-15 2009-08-20 First Data Corporation Secure authorization of contactless transaction
US20090260064A1 (en) * 2008-04-15 2009-10-15 Problem Resolution Enterprise, Llc Method and process for registering a device to verify transactions
US20090307778A1 (en) * 2008-06-06 2009-12-10 Ebay Inc. Mobile User Identify And Risk/Fraud Model Service
US20100293090A1 (en) * 2009-05-14 2010-11-18 Domenikos Steven D Systems, methods, and apparatus for determining fraud probability scores and identity health scores
US20100325035A1 (en) * 2009-06-18 2010-12-23 Nancy Hilgers Fraud/risk bureau
US20130041821A1 (en) * 2011-08-10 2013-02-14 Bank Of America Corporation Fraud messaging service

Cited By (170)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11405781B2 (en) 2007-03-16 2022-08-02 Visa International Service Association System and method for mobile identity protection for online user authentication
US10669130B2 (en) 2007-03-16 2020-06-02 Visa International Service Association System and method for automated analysis comparing a wireless device location with another geographic location
US9922323B2 (en) 2007-03-16 2018-03-20 Visa International Service Association System and method for automated analysis comparing a wireless device location with another geographic location
US9848298B2 (en) 2007-03-16 2017-12-19 Visa International Service Association System and method for automated analysis comparing a wireless device location with another geographic location
US10776784B2 (en) 2007-03-16 2020-09-15 Visa International Service Association System and method for automated analysis comparing a wireless device location with another geographic location
US10776791B2 (en) 2007-03-16 2020-09-15 Visa International Service Association System and method for identity protection using mobile device signaling network derived location pattern recognition
US9432845B2 (en) 2007-03-16 2016-08-30 Visa International Service Association System and method for automated analysis comparing a wireless device location with another geographic location
US9420448B2 (en) 2007-03-16 2016-08-16 Visa International Service Association System and method for automated analysis comparing a wireless device location with another geographic location
US11157872B2 (en) 2008-06-26 2021-10-26 Experian Marketing Solutions, Llc Systems and methods for providing an integrated identifier
US11769112B2 (en) 2008-06-26 2023-09-26 Experian Marketing Solutions, Llc Systems and methods for providing an integrated identifier
US11301855B2 (en) 2009-07-07 2022-04-12 Visa International Service Association Data verification in transactions in distributed network
US11797997B2 (en) 2009-07-07 2023-10-24 Visa International Service Association Data verification in transactions in distributed network
US9818121B2 (en) 2009-07-31 2017-11-14 Visa International Space Association Mobile communications message verification of financial transactions
US10580009B2 (en) 2009-07-31 2020-03-03 Visa International Service Association Mobile communications message verification of financial transactions
US10586229B2 (en) 2010-01-12 2020-03-10 Visa International Service Association Anytime validation tokens
US20210256506A1 (en) * 2010-08-12 2021-08-19 Visa International Service Association Securing external systems with account token substitution
US11803846B2 (en) * 2010-08-12 2023-10-31 Visa International Service Association Securing external systems with account token substitution
US11847645B2 (en) 2010-08-12 2023-12-19 Visa International Service Association Securing external systems with account token substitution
US9916619B2 (en) * 2011-02-14 2018-03-13 Paypal, Inc. Payment system with location restrictions
US20120209768A1 (en) * 2011-02-14 2012-08-16 Ebay, Inc. Payment system with location restrictions
US11416891B2 (en) 2011-03-29 2022-08-16 Swoop Ip Holdings Llc Email-based transactions for e-commerce
US20120317019A1 (en) * 2011-05-26 2012-12-13 First Data Corporation Card-Present On-Line Transactions
US9154477B2 (en) 2011-05-26 2015-10-06 First Data Corporation Systems and methods for encrypting mobile device communications
US9059980B2 (en) 2011-05-26 2015-06-16 First Data Corporation Systems and methods for authenticating mobile devices
US9331996B2 (en) 2011-05-26 2016-05-03 First Data Corporation Systems and methods for identifying devices by a trusted service manager
US8775305B2 (en) * 2011-05-26 2014-07-08 First Data Corporation Card-present on-line transactions
US9106632B2 (en) 2011-05-26 2015-08-11 First Data Corporation Provisioning by delivered items
US9106633B2 (en) 2011-05-26 2015-08-11 First Data Corporation Systems and methods for authenticating mobile device communications
US10685336B1 (en) 2011-06-16 2020-06-16 Consumerinfo.Com, Inc. Authentication alerts
US10115079B1 (en) 2011-06-16 2018-10-30 Consumerinfo.Com, Inc. Authentication alerts
US10719873B1 (en) 2011-06-16 2020-07-21 Consumerinfo.Com, Inc. Providing credit inquiry alerts
US11954655B1 (en) 2011-06-16 2024-04-09 Consumerinfo.Com, Inc. Authentication alerts
US11232413B1 (en) 2011-06-16 2022-01-25 Consumerinfo.Com, Inc. Authentication alerts
US9253197B2 (en) 2011-08-15 2016-02-02 Bank Of America Corporation Method and apparatus for token-based real-time risk updating
US8726361B2 (en) 2011-08-15 2014-05-13 Bank Of America Corporation Method and apparatus for token-based attribute abstraction
US20130047241A1 (en) * 2011-08-15 2013-02-21 Bank Of America Corporation Method and Apparatus for Token-Based Combining of Risk Ratings
US9055053B2 (en) * 2011-08-15 2015-06-09 Bank Of America Corporation Method and apparatus for token-based combining of risk ratings
US9928485B2 (en) 2011-09-07 2018-03-27 Elwha Llc Computational systems and methods for regulating information flow during interactions
US10079811B2 (en) 2011-09-07 2018-09-18 Elwha Llc Computational systems and methods for encrypting data for anonymous storage
US20130060848A1 (en) * 2011-09-07 2013-03-07 Elwha LLC, a limited liability company of the State of Delaware Computational systems and methods for linking users of devices
US9690853B2 (en) 2011-09-07 2017-06-27 Elwha Llc Computational systems and methods for regulating information flow during interactions
US10546295B2 (en) 2011-09-07 2020-01-28 Elwha Llc Computational systems and methods for regulating information flow during interactions
US20130061050A1 (en) * 2011-09-07 2013-03-07 Elwha LLC, a limited liability corporation of the State of Delaware Computational systems and methods for linking users of devices
US9432190B2 (en) 2011-09-07 2016-08-30 Elwha Llc Computational systems and methods for double-encrypting data for subsequent anonymous storage
US9473647B2 (en) 2011-09-07 2016-10-18 Elwha Llc Computational systems and methods for identifying a communications partner
US9195848B2 (en) 2011-09-07 2015-11-24 Elwha, Llc Computational systems and methods for anonymized storage of double-encrypted data
US9491146B2 (en) 2011-09-07 2016-11-08 Elwha Llc Computational systems and methods for encrypting data for anonymous storage
US10074113B2 (en) 2011-09-07 2018-09-11 Elwha Llc Computational systems and methods for disambiguating search terms corresponding to network members
US9747561B2 (en) * 2011-09-07 2017-08-29 Elwha Llc Computational systems and methods for linking users of devices
US9183520B2 (en) * 2011-09-07 2015-11-10 Elwha Llc Computational systems and methods for linking users of devices
US9167099B2 (en) 2011-09-07 2015-10-20 Elwha Llc Computational systems and methods for identifying a communications partner
US10185814B2 (en) 2011-09-07 2019-01-22 Elwha Llc Computational systems and methods for verifying personal information during transactions
US10198729B2 (en) 2011-09-07 2019-02-05 Elwha Llc Computational systems and methods for regulating information flow during interactions
US10263936B2 (en) 2011-09-07 2019-04-16 Elwha Llc Computational systems and methods for identifying a communications partner
US10606989B2 (en) 2011-09-07 2020-03-31 Elwha Llc Computational systems and methods for verifying personal information during transactions
US9159055B2 (en) 2011-09-07 2015-10-13 Elwha Llc Computational systems and methods for identifying a communications partner
US9141977B2 (en) 2011-09-07 2015-09-22 Elwha Llc Computational systems and methods for disambiguating search terms corresponding to network members
US10546306B2 (en) 2011-09-07 2020-01-28 Elwha Llc Computational systems and methods for regulating information flow during interactions
US10523618B2 (en) 2011-09-07 2019-12-31 Elwha Llc Computational systems and methods for identifying a communications partner
US11373182B2 (en) 2012-03-07 2022-06-28 Early Warning Services, Llc System and method for transferring funds
US11593800B2 (en) 2012-03-07 2023-02-28 Early Warning Services, Llc System and method for transferring funds
US11361290B2 (en) 2012-03-07 2022-06-14 Early Warning Services, Llc System and method for securely registering a recipient to a computer-implemented funds transfer payment network
US11321682B2 (en) 2012-03-07 2022-05-03 Early Warning Services, Llc System and method for transferring funds
US10970688B2 (en) 2012-03-07 2021-04-06 Early Warning Services, Llc System and method for transferring funds
US11715075B2 (en) 2012-03-07 2023-08-01 Early Warning Services, Llc System and method for transferring funds
US11605077B2 (en) 2012-03-07 2023-03-14 Early Warning Services, Llc System and method for transferring funds
US11948148B2 (en) 2012-03-07 2024-04-02 Early Warning Services, Llc System and method for facilitating transferring funds
US11769138B2 (en) * 2012-03-19 2023-09-26 Swoop Ip Holdings Llc Method for processing multimodal mobile donations via text message and email communication
WO2013181151A2 (en) * 2012-05-26 2013-12-05 Finsphere Corporation System and method for automated analysis comparing a wireless device location with another geographic location
WO2013181151A3 (en) * 2012-05-26 2014-03-20 Finsphere Corporation System and method for automated analysis comparing a wireless device location with another geographic location
US20130332358A1 (en) * 2012-06-12 2013-12-12 Ebay, Inc. Fraud detection system
US11410143B2 (en) 2012-07-18 2022-08-09 Swoop Ip Holdings Llc Email-based e-commerce
US11288713B2 (en) 2012-07-27 2022-03-29 Swoop Ip Holdings Llc Sending funds via an email payment gateway
US20140258122A1 (en) * 2013-03-11 2014-09-11 Brad Wardman Fraud detection based on age of contact information
US11797981B2 (en) 2013-03-15 2023-10-24 Swoop Ip Holdings Llc Automated application programming interface (API) system and method
US11790473B2 (en) 2013-03-15 2023-10-17 Csidentity Corporation Systems and methods of delayed authentication and billing for on-demand products
US11775979B1 (en) 2013-03-15 2023-10-03 Consumerinfo.Com, Inc. Adjustment of knowledge-based authentication
US10664936B2 (en) 2013-03-15 2020-05-26 Csidentity Corporation Authentication systems and methods for on-demand products
US11164271B2 (en) 2013-03-15 2021-11-02 Csidentity Corporation Systems and methods of delayed authentication and billing for on-demand products
US11282074B2 (en) * 2013-03-15 2022-03-22 Swoop Ip Holdings Llc Automated application programming interface (API) system and method
US10740762B2 (en) 2013-03-15 2020-08-11 Consumerinfo.Com, Inc. Adjustment of knowledge-based authentication
US11276045B2 (en) * 2013-03-15 2022-03-15 Swoop Ip Holdings Llc Vendor token generator
US11288677B1 (en) 2013-03-15 2022-03-29 Consumerlnfo.com, Inc. Adjustment of knowledge-based authentication
US10706132B2 (en) * 2013-03-22 2020-07-07 Nok Nok Labs, Inc. System and method for adaptive user authentication
US11929997B2 (en) 2013-03-22 2024-03-12 Nok Nok Labs, Inc. Advanced authentication techniques and applications
US10776464B2 (en) 2013-03-22 2020-09-15 Nok Nok Labs, Inc. System and method for adaptive application of authentication policies
US10762181B2 (en) 2013-03-22 2020-09-01 Nok Nok Labs, Inc. System and method for user confirmation of online transactions
US10743177B2 (en) 2013-05-21 2020-08-11 Syniverse Technologies, Llc Method and apparatus to provide mobile intelligence
US11803929B1 (en) 2013-05-23 2023-10-31 Consumerinfo.Com, Inc. Digital identity
US11120519B2 (en) 2013-05-23 2021-09-14 Consumerinfo.Com, Inc. Digital identity
US10453159B2 (en) 2013-05-23 2019-10-22 Consumerinfo.Com, Inc. Digital identity
US11775948B2 (en) 2013-06-07 2023-10-03 Swoop Ip Holdings Llc System and method for two-click validation
US9319535B2 (en) 2013-06-25 2016-04-19 Syniverse Technologies, Llc Method and apparatus to collect, analyze, and utilize network data
US20150006384A1 (en) * 2013-06-28 2015-01-01 Zahid Nasiruddin Shaikh Device fingerprinting
US20170161749A1 (en) * 2013-06-28 2017-06-08 Paypal, Inc. Using unique session data to correlate device fingerprinting information and assess risk
US10798087B2 (en) 2013-10-29 2020-10-06 Nok Nok Labs, Inc. Apparatus and method for implementing composite authenticators
US10600054B2 (en) 2013-12-09 2020-03-24 Mastercard International Incorporated Systems and methods for monitoring payment transactions for fraud using social media
US9483765B2 (en) 2013-12-09 2016-11-01 Mastercard International Incorporated Systems and methods for monitoring payment transactions for fraud using social media
US11373156B2 (en) 2013-12-23 2022-06-28 Swoop Ip Holdings Llc Method, system, and computer readable storage medium for alternative email-based website checkouts
US11502981B2 (en) 2014-01-08 2022-11-15 Swoop Ip Holdings Llc Email based e-commerce using embedded forms
US11562350B2 (en) 2014-02-20 2023-01-24 Swoop Ip Holdings Llc System and method for dual email and web based checkout in an unsegmented list
US11100507B2 (en) 2014-04-08 2021-08-24 Visa International Service Association Data passed in an interaction
US20190333066A1 (en) * 2014-04-24 2019-10-31 Swoop Ip Holdings Llc Sms and social media dual authorization, management oversight, and non-password security in email based e-commerce
US11727410B2 (en) * 2014-04-24 2023-08-15 Swoop Ip Holdings Llc Method and apparatus for improving security of a computer network utilizing simple mail transfer protocol (SMTP)
US10373240B1 (en) 2014-04-25 2019-08-06 Csidentity Corporation Systems, methods and computer-program products for eligibility verification
US11074641B1 (en) 2014-04-25 2021-07-27 Csidentity Corporation Systems, methods and computer-program products for eligibility verification
US11587150B1 (en) 2014-04-25 2023-02-21 Csidentity Corporation Systems and methods for eligibility verification
US9680942B2 (en) 2014-05-01 2017-06-13 Visa International Service Association Data verification using access device
US11470164B2 (en) 2014-05-01 2022-10-11 Visa International Service Association Data verification using access device
US9922324B2 (en) 2014-05-21 2018-03-20 Square, Inc. Verified purchasing by email
US20150339656A1 (en) * 2014-05-21 2015-11-26 Square, Inc. Verified purchasing by push notification
US11399099B2 (en) 2014-06-25 2022-07-26 Textnow, Inc. Mobile electronic communications using internet protocol
US10855847B2 (en) 2014-06-25 2020-12-01 Textnow, Inc. Mobile electronic communications using internet protocol
US20150381820A1 (en) * 2014-06-25 2015-12-31 Enflick Inc. Mobile electronic communications using internet protocol
US9621735B2 (en) * 2014-06-25 2017-04-11 Textnow, Inc. Mobile electronic communications combining voice-over-IP and mobile network services
US10776809B1 (en) 2014-09-11 2020-09-15 Square, Inc. Use of payment card rewards points for an electronic cash transfer
US11699148B2 (en) 2014-12-23 2023-07-11 Swoop Ip Holdings Llc Email address token integration
US11049207B1 (en) * 2014-12-23 2021-06-29 United Services Automobile Association (Usaa) Early fraud detection system
US11551198B2 (en) 2015-01-28 2023-01-10 Swoop Ip Holdings Llc Email-based e-commerce with near field communication
US11797977B2 (en) 2015-01-28 2023-10-24 Swoop Ip Holdings Llc Email-based e-commerce with near field communication
US11042863B1 (en) 2015-03-20 2021-06-22 Square, Inc. Grouping payments and payment requests
US10769606B2 (en) 2015-03-23 2020-09-08 Early Warning Services, Llc Payment real-time funds availability
US10748127B2 (en) 2015-03-23 2020-08-18 Early Warning Services, Llc Payment real-time funds availability
US10878387B2 (en) 2015-03-23 2020-12-29 Early Warning Services, Llc Real-time determination of funds availability for checks and ACH items
US10832246B2 (en) 2015-03-23 2020-11-10 Early Warning Services, Llc Payment real-time funds availability
US10839359B2 (en) 2015-03-23 2020-11-17 Early Warning Services, Llc Payment real-time funds availability
US10846662B2 (en) 2015-03-23 2020-11-24 Early Warning Services, Llc Real-time determination of funds availability for checks and ACH items
US20160283927A1 (en) * 2015-03-24 2016-09-29 Mastercard International Incorporated Authentication for mobile transactions
US11416829B2 (en) 2015-07-13 2022-08-16 Swoop Ip Holdings Llc Myriad of payment methods with alternate payment controls
US11157884B2 (en) 2015-07-21 2021-10-26 Early Warning Services, Llc Secure transactions with offline device
US10762477B2 (en) 2015-07-21 2020-09-01 Early Warning Services, Llc Secure real-time processing of payment transactions
US11386410B2 (en) 2015-07-21 2022-07-12 Early Warning Services, Llc Secure transactions with offline device
US11037122B2 (en) 2015-07-21 2021-06-15 Early Warning Services, Llc Secure real-time transactions
US11037121B2 (en) 2015-07-21 2021-06-15 Early Warning Services, Llc Secure real-time transactions
US11062290B2 (en) 2015-07-21 2021-07-13 Early Warning Services, Llc Secure real-time transactions
US11151523B2 (en) 2015-07-21 2021-10-19 Early Warning Services, Llc Secure transactions with offline device
US11922387B2 (en) 2015-07-21 2024-03-05 Early Warning Services, Llc Secure real-time transactions
US10956888B2 (en) 2015-07-21 2021-03-23 Early Warning Services, Llc Secure real-time transactions
US11151522B2 (en) 2015-07-21 2021-10-19 Early Warning Services, Llc Secure transactions with offline device
US10963856B2 (en) 2015-07-21 2021-03-30 Early Warning Services, Llc Secure real-time transactions
US10970695B2 (en) 2015-07-21 2021-04-06 Early Warning Services, Llc Secure real-time transactions
US11553252B2 (en) 2015-09-02 2023-01-10 Swoop Ip Holdings Llc System and method for interactive television with messaging based payments
US10810592B1 (en) 2015-09-30 2020-10-20 Square, Inc. Friction-less purchasing technology
US10467615B1 (en) 2015-09-30 2019-11-05 Square, Inc. Friction-less purchasing technology
US10936733B2 (en) * 2016-01-07 2021-03-02 Emmanuel Gonzalez Reducing inappropriate online behavior using analysis of email account usage data to select a level of network service
US20170255937A1 (en) * 2016-03-02 2017-09-07 American Express Travel Related Services Company, Inc. Systems and methods for transaction account tokenization
US11182793B2 (en) * 2016-03-02 2021-11-23 American Express Travel Related Services Company, Inc. Systems and methods for transaction account tokenization
US11089482B2 (en) 2016-03-31 2021-08-10 Visa International Service Association System and method for correlating diverse location data for data security
US20170324762A1 (en) * 2016-05-05 2017-11-09 Paypal, Inc. Authentication and risk assessment through header injections
US10917412B2 (en) * 2016-05-05 2021-02-09 Paypal, Inc. Authentication and risk assessment through header injections
US10637853B2 (en) 2016-08-05 2020-04-28 Nok Nok Labs, Inc. Authentication techniques including speech and/or lip movement analysis
US10769635B2 (en) 2016-08-05 2020-09-08 Nok Nok Labs, Inc. Authentication techniques including speech and/or lip movement analysis
US11144928B2 (en) 2016-09-19 2021-10-12 Early Warning Services, Llc Authentication and fraud prevention in provisioning a mobile wallet
US11151567B2 (en) * 2016-09-19 2021-10-19 Early Warning Services, Llc Authentication and fraud prevention in provisioning a mobile wallet
US11151566B2 (en) 2016-09-19 2021-10-19 Early Warning Services, Llc Authentication and fraud prevention in provisioning a mobile wallet
US20180341950A1 (en) * 2017-05-24 2018-11-29 Mastercard International Incorporated Transaction control
US11558511B2 (en) 2017-06-29 2023-01-17 Textnow, Inc. Mobile communications with quality of service
US10992815B2 (en) 2017-06-29 2021-04-27 Textnow, Inc. Mobile communications with quality of service
US10750028B2 (en) 2017-06-29 2020-08-18 Textnow, Inc. Mobile communications with quality of service
US11468448B2 (en) * 2017-08-09 2022-10-11 Microsoft Technology Licensing, Llc Systems and methods of providing security in an electronic network
US20210266750A1 (en) * 2017-10-18 2021-08-26 Telesign Corporation User authentication based on ss7 call forwarding detection
US11868995B2 (en) 2017-11-27 2024-01-09 Nok Nok Labs, Inc. Extending a secure key storage for transaction confirmation and cryptocurrency
US11831409B2 (en) 2018-01-12 2023-11-28 Nok Nok Labs, Inc. System and method for binding verifiable claims
US11588639B2 (en) 2018-06-22 2023-02-21 Experian Information Solutions, Inc. System and method for a token gateway environment
US10911234B2 (en) 2018-06-22 2021-02-02 Experian Information Solutions, Inc. System and method for a token gateway environment
US11792024B2 (en) 2019-03-29 2023-10-17 Nok Nok Labs, Inc. System and method for efficient challenge-response authentication
US11397950B2 (en) * 2019-06-20 2022-07-26 Microsoft Technology Licensing, Llc Systems and methods for authenticating an electronic transaction
US11941065B1 (en) 2019-09-13 2024-03-26 Experian Information Solutions, Inc. Single identifier platform for storing entity data
US11961127B2 (en) 2022-03-28 2024-04-16 Swoop Ip Holdings Llc Sending funds via an email payment gateway
US11823191B1 (en) 2022-08-29 2023-11-21 Block, Inc. Integration for performing actions without additional authorization requests

Also Published As

Publication number Publication date
CA2804455C (en) 2018-05-29
EP2452303A1 (en) 2012-05-16
WO2011005900A1 (en) 2011-01-13
US11301855B2 (en) 2022-04-12
CA2804455A1 (en) 2011-01-13
EP2452303A4 (en) 2016-07-06
US20180075437A1 (en) 2018-03-15

Similar Documents

Publication Publication Date Title
US11301855B2 (en) Data verification in transactions in distributed network
US10776791B2 (en) System and method for identity protection using mobile device signaling network derived location pattern recognition
US11030622B2 (en) Card systems and methods
US8116731B2 (en) System and method for mobile identity protection of a user of multiple computer applications, networks or devices
US8239325B2 (en) Method and system to verify the identity of a user
US9922323B2 (en) System and method for automated analysis comparing a wireless device location with another geographic location
US20150178715A1 (en) Authenticating entities engaging in automated or electronic transactions or activities
US20150227934A1 (en) Method and system for determining and assessing geolocation proximity
US20200286168A1 (en) Two device authentication for a credit application
US20150142623A1 (en) System and method for identity protection using mobile device signaling network derived location pattern recognition
US20210117969A1 (en) Mobile device verification for an electronic application before providing a digital pass to an approved customer
AU2016267398A1 (en) Secure payment
US11468508B2 (en) Capturable code for automatically formatting and addressing a text message to apply for an offer
US20140279331A1 (en) System and method for pro-actively responding to mass compromise situations
US20220398585A1 (en) Providing a customer with a number of payment scenarios
US20210019742A1 (en) Customer acquisition without initially receiving personally identifiable information (pii)
US11797997B2 (en) Data verification in transactions in distributed network
JP2014081951A (en) Real credit determination device for credit card and method therefor
US10664840B1 (en) Method and system for user address validation

Legal Events

Date Code Title Description
AS Assignment

Owner name: FINSPHERE, INC., WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SNYDER, RANDALL A;GINTER, THOMAS S;BUHRMANN, MICHAEL F;SIGNING DATES FROM 20120109 TO 20120110;REEL/FRAME:027695/0112

AS Assignment

Owner name: VISA INTERNATIONAL SERVICE ASSOCIATION, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FINSPHERE CORPORATION;REEL/FRAME:037973/0191

Effective date: 20160201

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION