Topic
Identity theft
About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.
Papers published on a yearly basis
Papers
More filters
•
17 Feb 2012
TL;DR: In this paper, a non-repudiation process for consumer credit requests based on an affirmative authentication of a one-time-pin ("OTP") generated from a consumer biometric smartcard is proposed.
Abstract: Embodiments are directed towards employing a non-repudiation process for consumer credit requests based on an affirmative authentication of a one-time-pin ("OTP") generated from a consumer biometric smartcard. The biometric smartcard may authenticate biometric information (e.g. fingerprint, facial image, iris image, or the like) of the consumer based on biometric templates stored on the biometric smartcard. In at least some of the various embodiments, the OTP may be authenticated by an identity authority, such that an associated credit request to a provider may be authenticated. In some embodiments, the provider may request and utilize a credit report for an authentic credit request to determine whether or not the consumer has an acceptable credit rating. If the consumer has an acceptable credit rating, then the provider may provide credit to the consumer.
6 citations
••
TL;DR: Counterfeit fraud has always been one of the most prevalent and costly types because international organised crime groups use it on a large scale, generating funds for other serious crimes.
6 citations
••
TL;DR: In this article, the authors provide detailed advice on how to recognize, manage, and control those risks so that a firm doesn't become another victim of identity theft, but few realize the huge liability of not controlling information risks.
Abstract: Identity theft is the fastest-growing crime in the United States. Many articles discuss steps individuals can take to minimize the risk of identity theft, but few realize the devastating effects this crime can have on businesses. Many firms may not even recognize the huge liability of not controlling information risks. The authors provide detailed advice on how to recognize, manage, and control those risks—so your firm doesn't become another victim. © 2004 Wiley Periodicals, Inc.
6 citations
•
6 citations
•
26 May 2016
TL;DR: In this paper, a goods, services and payment authorization system and method are provided to prevent services from being rendered, goods from being provided and/or reimbursements from being made in the case of fraudulent healthcare transactions resulting from identity theft, phantom billing, lack of insurance coverage and medical fraud, in general.
Abstract: A goods, services and payment authorization system and method are provided to prevent services from being rendered, goods from being provided and/or reimbursements from being made in the case of fraudulent healthcare transactions resulting from identity theft, phantom billing, lack of insurance coverage and/or medical fraud, in general. In conjunction with a healthcare transaction, patient identity information is collected and insurance coverage is confirmed using a programmatic calculation of a confidence determination based on the collected identity information.
6 citations