scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Patent
17 Feb 2012
TL;DR: In this paper, a non-repudiation process for consumer credit requests based on an affirmative authentication of a one-time-pin ("OTP") generated from a consumer biometric smartcard is proposed.
Abstract: Embodiments are directed towards employing a non-repudiation process for consumer credit requests based on an affirmative authentication of a one-time-pin ("OTP") generated from a consumer biometric smartcard. The biometric smartcard may authenticate biometric information (e.g. fingerprint, facial image, iris image, or the like) of the consumer based on biometric templates stored on the biometric smartcard. In at least some of the various embodiments, the OTP may be authenticated by an identity authority, such that an associated credit request to a provider may be authenticated. In some embodiments, the provider may request and utilize a credit report for an authentic credit request to determine whether or not the consumer has an acceptable credit rating. If the consumer has an acceptable credit rating, then the provider may provide credit to the consumer.

6 citations

Journal ArticleDOI
TL;DR: Counterfeit fraud has always been one of the most prevalent and costly types because international organised crime groups use it on a large scale, generating funds for other serious crimes.

6 citations

Journal ArticleDOI
TL;DR: In this article, the authors provide detailed advice on how to recognize, manage, and control those risks so that a firm doesn't become another victim of identity theft, but few realize the huge liability of not controlling information risks.
Abstract: Identity theft is the fastest-growing crime in the United States. Many articles discuss steps individuals can take to minimize the risk of identity theft, but few realize the devastating effects this crime can have on businesses. Many firms may not even recognize the huge liability of not controlling information risks. The authors provide detailed advice on how to recognize, manage, and control those risks—so your firm doesn't become another victim. © 2004 Wiley Periodicals, Inc.

6 citations

Patent
26 May 2016
TL;DR: In this paper, a goods, services and payment authorization system and method are provided to prevent services from being rendered, goods from being provided and/or reimbursements from being made in the case of fraudulent healthcare transactions resulting from identity theft, phantom billing, lack of insurance coverage and medical fraud, in general.
Abstract: A goods, services and payment authorization system and method are provided to prevent services from being rendered, goods from being provided and/or reimbursements from being made in the case of fraudulent healthcare transactions resulting from identity theft, phantom billing, lack of insurance coverage and/or medical fraud, in general. In conjunction with a healthcare transaction, patient identity information is collected and insurance coverage is confirmed using a programmatic calculation of a confidence determination based on the collected identity information.

6 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112