scispace - formally typeset
Patent

System and method for thwarting identity theft and other identity misrepresentations

TLDR
In this paper, the identity verifier is used to prevent identity theft by using one list for all of a person's transactions, and applications for new credit by identity thieves are also prevented.
Abstract
Registered users including businesses attach a one-time-use identity verifier to as many financial and other transactions as they choose to protect themselves from identity thieves. They may also attach a security message to any identity verifier to ensure that a thief cannot steal a registered user's check from a mailbox and use the unused identity verifier. By using one list for all of a person's transactions, applications for new credit by identity thieves are also prevented. All of this is made possible by allowing the identity verifiers to be approved nonsequentially.

read more

Citations
More filters
Patent

User Authentication for Social Networks

Paul Headley
TL;DR: In this paper, a system and methods are provided for social networks that can verify that enrolled users are not misrepresenting facts about themselves such as age and gender, by reference to biometric templates stored during the user enrollment process.
Patent

Multi-channel multi-factor authentication

TL;DR: In this paper, the authentication methods employ a combination of security features and communication channels, such as a unique knowledge of the person being authenticated, a unique thing that the person has, unique personal features and attributes of the persons, the ability of a person to respond, and to do so in a fashion that a machine cannot, and so forth.
Patent

Single-channel multi-factor authentication

TL;DR: In this article, the authentication methods employ a combination of security features, such as unique knowledge of the person being authenticated, unique personal features and attributes, the ability of a person to respond and to do so in a fashion that a machine cannot, and so forth.
Patent

Systems and methods of determining compromised identity information

TL;DR: In this article, a compromised data exchange system may include an interface configured to couple to a network, a processor, and a memory accessible to the processor, which can be configured to store instructions that, when executed, cause the processor to extract data from one or more websites using a crawler, detect portions within the data that resemble personally identifying information (PII) data based on PII data patterns using a risk assessment module, and to compare a detected portion to data within a database of disassociated compromised PII datasets to determine a match using the risk assessment modules.
Patent

System and method for authenticating a person's identity using a trusted entity

TL;DR: In this article, a system and method for authenticating a person's identity to a business using a trusted entity with a secure repository to store and protect the identity information is presented.
References
More filters
Patent

Credit card system and method

TL;DR: In this article, a credit card system is presented which has the added feature of providing additional limited use credit card numbers and/or cards, which can be used for a single or limited use transaction, thereby reducing the potential for fraudulent reuse of these numbers and or cards.
Patent

Electronic online commerce card with transactionproxy number for online transactions

TL;DR: In this paper, an online commerce system facilitates online commerce over a public network using an onlinecommerce card, where the card does not exist in physical form, but instead exists in digital form, and the issuing institution generates a temporary transaction number and associates it with the permanent account number in a data record.
Patent

System and method for pre-authorization of individual account remote transactions

TL;DR: An account processing method and system for providing specific preauthorization parameters for transactions that require specific pre-authorization by a network user specifying conformity parameters within which any requested transaction parameters must comply in order to enable the requested transaction to be approved as mentioned in this paper.
Patent

Method and apparatus for billing for transactions conducted over the internet

TL;DR: In this article, a method and apparatus for authenticating transactions accomplished over a data network utilizes a "cookie" containing both static information (user-identifying information) and dynamic information (transaction-based information).
Patent

Tokenless biometric atm access system

TL;DR: In this paper, the authors proposed a tokenless biometric access to financial accounts at an institution using an automated teller machine, which comprises a user registration step, wherein a user registers with an electronic identicator one or more registration biometric samples and one or multiple user financial accounts.