scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Patent
06 Feb 2003
TL;DR: In this article, the point of enrollment into biometric authentication databases is controlled by limiting enrollments to only those identity/biometric data pairings that have been certified by this invention (process) to some level of identity-integrity.
Abstract: Without control over the point of enrollment into biometric authentication databases, fraudulent enrollment is an expected consequence. Such enrollment fraud would minimize the potential benefits derived from the superior authentication capabilities offered, in varying degrees, by different biometric technologies. In a world where identity theft and fraud is rising along with the consequences of said behavior, a better enrollment system is needed. This present invention is intended to control the point of enrollment into biometric authentication databases, limiting said enrollments to only those identity/biometric data pairings that have been certified by this invention (process) to some level of identity-integrity. This present invention is further intended to allow a greater level of confidence in the identity-integrity of transactions authenticated with a higher level of certified trust than is available through other authentication methods, or even through biometric authentication provided by this invention at lower certified levels of trust.

135 citations

Patent
08 Jun 2007
TL;DR: In this paper, the problem of identity theft associated with the use of payment cards such as credit and debit cards, as well as identity fraud associated with using identity cards, such as driver's licenses and social security cards, is addressed.
Abstract: The system, method, and apparatus of the present invention, address the problem of identity theft associated with the use of payment cards such as credit and debit cards, as well as identity theft associated with the use of identity cards such as driver's licenses and social security cards. An apparatus including a biometric input component that authenticates a system user is disclosed herein. Upon authentication, a proxy account number and a time varying security code are generated and displayed on the apparatus. The dynamically generated number and security code are then used to validate the user's identity within the system. Furthermore, the system, method, and apparatus of the present invention can be used to consolidate into one instrument, several payment and identity instruments.

127 citations

Journal ArticleDOI
TL;DR: This work introduces a novel method that continuously verifies users according to characteristics of their interaction with the mouse based on their physiological and behavioral characteristics and proposes a hierarchy of mouse actions from which the features are extracted.

125 citations

Patent
26 May 2005
TL;DR: In this article, the authors present a new account identity theft detection system configured to determine a first score for a new application submitted by the consumer, the first score indicating likelihood that the new account application is fraudulent.
Abstract: Systems and methods of monitoring financial information of a consumer for fraudulent activity. One system can include an identity verification system configured to verify an identity of a consumer. The system can include a new account identity theft detection system configured to determine a first score for a new account application submitted by the consumer, the first score indicating likelihood that the new account application is fraudulent, and an address analyzer configured to determine a second score for an address modification submitted by the consumer, the second score indicating likelihood that the address modification is fraudulent.

124 citations

01 Jan 2003
TL;DR: In the 1990s, computers have been involved in most types of crime, including fraud, theft, larceny, embezzlement, bribery, burglary, sabotage, espionage, conspiracy, extortion, attempted murder, manslaughter, distribution of pornography, trespassing, violation of privacy, and kidnapping as discussed by the authors.
Abstract: Business, economic, and white-collar crimes have changed rapidly as computers proliferate into the activities and environments in which these crimes occur. Computers have engendered a different form of crime. The Internet (q.v.), in particular, provides many new avenues for crime, such as identity theft and spreading new kinds of computer viruses. Computers have been involved in most types of crime, including fraud, theft, larceny, embezzlement, bribery, burglary, sabotage, espionage, conspiracy, extortion, attempted murder, manslaughter, distribution of pornography, trespassing, violation of privacy, and kidnapping.

120 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112