US20120290482A1 - System and method for identity verification and management - Google Patents

System and method for identity verification and management Download PDF

Info

Publication number
US20120290482A1
US20120290482A1 US13/524,312 US201213524312A US2012290482A1 US 20120290482 A1 US20120290482 A1 US 20120290482A1 US 201213524312 A US201213524312 A US 201213524312A US 2012290482 A1 US2012290482 A1 US 2012290482A1
Authority
US
United States
Prior art keywords
user
identity
identification
transaction
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/524,312
Inventor
Farsheed Atef
Amir Dabirian
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US13/524,312 priority Critical patent/US20120290482A1/en
Publication of US20120290482A1 publication Critical patent/US20120290482A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/40User authentication by quorum, i.e. whereby two or more security principals are required
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4015Transaction verification using location information
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification
    • G10L17/06Decision making techniques; Pattern matching strategies
    • G10L17/10Multimodal systems, i.e. based on the integration of multiple recognition engines or fusion of expert systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2113Multi-level security, e.g. mandatory access control
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2115Third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2119Authenticating web pages, e.g. with suspicious links
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/23Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a password

Definitions

  • the present invention relates to identity theft protection systems. More particularly, the present invention relates to a system and method for identity verification and management.
  • Identity theft is considered one of the fastest growing crimes in the United States. For example, between 2002 and 2003, the number of reported cases of identity theft grew 80 percent. In 2002 alone, nearly ten million cases of identify theft were reported. Nearly one in 8 United States adults have fallen victim to identity theft in the last five years. On average, identify theft will cost a victim approximately $1,000 in expenses to rectify the damage caused to their financial accounts and reputations. The yearly costs of identity theft are enormous, costing business approximately $48 billion and individuals approximately $5 billion.
  • Identity thieves can operate in a number of ways. With the spread of the Internet and the increases in computer processing technology, access to personal and financial information of individuals (through both legal and illegal means) has become far easier and more prevalent. Other more conventional techniques include stealing credit card numbers and using those numbers to create new credit cards under false names. Job applications, personnel records and employment data that should be confidential can instead be stolen by thieves who use the information to steal workers' identities. A person's social security number can be stolen and used by the criminal to apply for credit. Once the identification is stolen and credit is issued, the identity thief can use the credit in an unrestricted manner. Typically, the victim of the identity theft may not learn of the theft until many weeks or months after the crime has occurred, for example, not until the next credit card statement is received.
  • Much of identity theft occurs because an individual cannot control how and who uses their identity and, consequently, their credit.
  • the problem of identity theft also applies to companies and other like entities whose identities are also at risk, such as financial institutions, retail stores and the like.
  • a criminal company can pretend to represent a reputable company and use the reputable company's stolen identity for financial gain.
  • a fraudulent mortgage company could pretend to represent a reputable and established Bank to steal money from unsuspecting individuals, to the financial and reputational detriment of both the individuals and the Bank.
  • a system for verifying an identity of a user includes an identification score assignment module.
  • the identification score assignment module is configured to receive at least one source of identification of the user.
  • the identification score assignment module is configured to assign an identification score to each of the at least one source of identification.
  • the system includes a total identification score generation module in communication with the identification score assignment module.
  • the total identification score generation module is configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function.
  • the total identification score of the user is associated with a level of verification of the identity of the user.
  • the total identification score of the user is compared to a minimum identification score associated with a transaction.
  • the transaction is performed when the total identification score of the user is one of greater than and equal to the minimum identification score. Additional sources of identification of the user are received before performing the transaction when the total identification score is less than the minimum identification score.
  • the at least one source of identification can comprise a driver's license of the user.
  • the at least one source of identification can comprise a birth certificate of the user.
  • the identification score assigned to each of the at least one source of identification can be based upon a reliability of the at least one source of identification.
  • the predetermined function can comprise, for example, a summing function, a weighted summing function or the like.
  • the system can include a data storage device. Personal information and/or financial information of the user can be stored in the data storage device. The total identification score can be associated with the personal information and/or financial information of the user.
  • the system can include an access code generation module.
  • the access code generation module can be configured to generate a unique identity access authorization code associated with the user for use by a third party to access information associated with the user.
  • the system can include a data transmission module.
  • the data transmission module can be configured to transmit at least the total identification score of the user to the third party upon verification of the identity access authorization code.
  • the data transmission module can be configured to transmit at least the total identification score of the user to the third party upon further verification of a user identification code of the user.
  • the user identification code can comprise a social security number of the user.
  • the system can include a log module.
  • the log module can be configured to record accesses associated with the total identification score of the user by the third party.
  • the system can include a report generation module.
  • the report generation module can be configured to generate reports for displaying the record of accesses associated with the total identification score of the user.
  • Personal information and/or financial information associated with the user can be transmitted to the third party upon verification of the identity access authorization code.
  • the personal information and/or financial information associated with the user can be transmitted to the third party upon further verification of a user identification code of the user.
  • the user identification code can comprise a social security number of the user.
  • the system can include an identity card.
  • the identity card can be configured to securely contain identification information associated with the user.
  • the identity card can comprise, for example, a smart card.
  • the identification information associated with the user can be encrypted on the identity card. Uses of the identification information securely contained on the identity card can be restricted by the user. Locations of where the identification information is used can be restricted by the user. Times of when the identification information is used can be restricted by the user. Types of transactions for which the identification information is used can be restricted by the user. Use of the identification information for the transaction can be prohibited when the identification information is restricted by the user for the transaction. The identification information for the transaction can be used when the identification information is not prohibited by the user for the transaction.
  • the system can include a transaction order generation module.
  • the transaction order generation module can be configured to generate a transaction order using the total identification score of the user.
  • the transaction order can be submitted by the user to perform the transaction.
  • Personal information and/or financial information of the user can be accessed, using the transaction order, to complete the transaction.
  • the system can include an address identification code generation module.
  • the address identification code generation module can be configured to generate an address identification code associated with an address of the user.
  • the address identification code and an address of a communication reception center can be supplied to a third party. Communications for the user from the third party can be received at the communication reception center.
  • the communications can include the address identification code.
  • the system can include a communication display module.
  • the communication display module can be configured to display the communications to the user associated with the address identification code.
  • the system can include an identity risk factor generation module.
  • the identity risk factor generation module can be configured to generate an identity risk factor associated with the user.
  • the identity risk factor can be associated with a level of risk of theft of the identity of the user by identity thieves.
  • the transaction can comprise, for example, an application for credit, a purchase transaction or the like.
  • the system can include a graphical user interface.
  • the graphical user interface can be configured to provide access to and management of identification information associated with the user.
  • a system for verifying an identity of a user includes a receiver module configured to receive at least one source of identification of the user.
  • the system includes an identification score assignment module configured to assign an identification score to each of the at least one source of identification.
  • the system includes an identification score generation module configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user.
  • the system includes a comparator module configured to compare the total identification score of the user to a minimum identification score associated with a transaction.
  • the system also includes a transaction approval module.
  • the transaction approval module is configured to generate an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score.
  • the transaction approval module is configured to generate a request for additional sources of identification of the user before generating the approval of the transaction when the total identification score is less than the minimum identification score.
  • a system for verifying an identity of a user includes an identification score assignment module configured to receive at least one source of identification of the user, and configured to assign an identification score to each of the at least one source of identification.
  • the system includes a total identification score generation module configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user.
  • the system also includes an approval receiver module.
  • the approval receiver module is configured to receive an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score.
  • the approval receiver module is configured to receive a request for additional sources of identification of the user before receiving the approval of the transaction when the total identification score is less than the minimum identification score.
  • a system for verifying an identity of a user includes a receiver module configured to receive a total identification score of the user.
  • the total identification score is generated from identification scores assigned to each of at least one source of identification of the user and a predetermined function.
  • the total identification score of the user is associated with a level of verification of the identity of the user.
  • the system includes a comparator module configured to compare the total identification score of the user to a minimum identification score associated with a transaction.
  • the system includes a transaction approval module.
  • the transaction approval module is configured to generate an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score.
  • the transaction approval module is configured to generate a request for additional sources of identification of the user before generating the approval of the transaction when the total identification score is less than the minimum identification score.
  • a method of verifying an identity of a user includes the steps of: a.) receiving at least one source of identification of the user; b.) assigning an identification score to each of the at least one source of identification; and c.) generating a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function.
  • the total identification score of the user is associated with a level of verification of the identity of the user.
  • the total identification score of the user is compared to a minimum identification score associated with a transaction. The transaction is performed when the total identification score of the user is one of greater than and equal to the minimum identification score. Additional sources of identification of the user are received before performing the transaction when the total identification score is less than the minimum identification score.
  • the at least one source of identification can comprise a driver's license of the user.
  • the at least one source of identification can comprise a birth certificate of the user.
  • the identification score assigned to each of the at least one source of identification can be based upon a reliability of the at least one source of identification.
  • the predetermined function can comprise, for example, a summing function, a weighted summing function or the like.
  • the method can include the steps of: d.) supplying at least one of personal information and financial information of the user, wherein the total identification score can be associated with the at least one of personal information and financial information of the user; e.) generating a unique identity access authorization code associated with the user for use by a third party in the transaction; and f.) transmitting, to the third party, at least the total identification score of the user upon verification of the identity access authorization code. At least the total identification score of the user can be transmitted to the third party upon further verification of a user identification code of the user.
  • the user identification code can comprise, for example, a social security number of the user.
  • the method can include the steps of: g.) recording accesses associated with the total identification score of the user by the third party; h.) reviewing the record of accesses associated with the total identification score of the user; and i.) transmitting, to the third party, personal information and/or financial information associated with the user upon verification of the identity access authorization code of the user.
  • the personal information and/or financial information associated with the user can be transmitted to the third party upon further verification of a user identification code of the user.
  • the user identification code can comprise, for example, a social security number of the user.
  • the method can include the step of: j.) issuing an identity card securely containing identification information associated with the user.
  • the identity card can comprise, for example, a smart card.
  • the identification information associated with the user can be encrypted on the identity card.
  • the method can include the step of: k.) restricting uses of the identification information securely contained on the identity card.
  • step (k) can comprise the steps of: l.) restricting locations of where the identification information is used; m.) restricting times of when the identification information is used; and n.) restricting types of transactions for which the identification information is used.
  • the method can include the steps of: o.) prohibiting use of the identification information for the transaction when the identification information is restricted by the user for the transaction; p.) using the identification information for the transaction when the identification information is not prohibited by the user for the transaction; q.) generating a transaction order using the total identification score of the user; r.) submitting the transaction order to perform the transaction; s.) transmitting at least one of personal information and financial information of the user, upon verification of the transaction order, to complete the transaction; t.) associating an address identification code with an address of the user; u.) supplying the address identification code and an address of a communication reception center to a third party; v.) receiving communications for the user from the third party at the communication reception center, wherein the communications include the address identification code; w.) supplying the communications to the user associated with the address identification code; and x.) supplying an identity risk factor associated with the user, wherein the identity risk factor can be associated with a level of risk of theft of the identity of the user by
  • a method of verifying an identity of a user includes the steps of: a.) receiving at least one source of identification of the user; b.) assigning an identification score to each of the at least one source of identification; c.) generating a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function, wherein the total identification score of the user is associated with a level of verification of the identity of the user; d.) comparing the total identification score of the user to a minimum identification score associated with a transaction; e.) approving the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score; and f.) requesting additional sources of identification of the user before approving the transaction when the total identification score is less than the minimum identification score.
  • a method of verifying an identity of a user includes the steps of: a.) receiving at least one source of identification of the user; b.) assigning an identification score to each of the at least one source of identification; c.) generating a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function, wherein the total identification score of the user is associated with a level of verification of the identity of the user; d.) receiving approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score; and e.) receiving a request for additional sources of identification of the user before receiving approval of the transaction when the total identification score is less than the minimum identification score.
  • a method of verifying an identity of a user includes the steps of: a.) receiving a total identification score of the user, wherein the total identification score is generated from identification scores assigned to each of at least one source of identification of the user and a predetermined function, and wherein the total identification score of the user is associated with a level of verification of the identity of the user; b.) comparing the total identification score of the user to a minimum identification score associated with a transaction; c.) approving the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score; and d.) requesting additional sources of identification of the user before approving the transaction when the total identification score is less than the minimum identification score.
  • a system for verifying an identity of a user includes means for assigning an identity score.
  • the identity score assigning means is configured to receive at least one source of identification of the user.
  • the identity score assigning means is configured to assign an identification score to each of the at least one source of identification.
  • the system includes means for generating a total identity score in communication with the identity score assigning means.
  • the total identity score generating means is configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function.
  • the total identification score of the user is associated with a level of verification of the identity of the user.
  • the total identification score of the user is compared to a minimum identification score associated with a transaction. The transaction is performed when the total identification score of the user is one of greater than and equal to the minimum identification score. Additional sources of identification of the user are received before performing the transaction when the total identification score is less than the minimum identification score.
  • the at least one source of identification can comprise a driver's license of the user.
  • the at least one source of identification can comprise a birth certificate of the user.
  • the identification score assigned to each of the at least one source of identification can be based upon a reliability of the at least one source of identification.
  • the predetermined function can comprise, for example, a summing function, a weighted summing function or the like.
  • the system can include means for storing data. Personal information and/or financial information of the user can be stored in the data storing means.
  • the total identification score can be associated with the personal information and/or financial information of the user.
  • the system can include means for generating an access code.
  • the access code generating means can be configured to generate a unique identity access authorization code associated with the user for use by a third party to access information associated with the user.
  • the system can include means for transmitting data.
  • the data transmitting means can be configured to transmit at least the total identification score of the user to the third party upon verification of the identity access authorization code.
  • the data transmitting means can be configured to transmit at least the total identification score of the user to the third party upon further verification of a user identification code of the user.
  • the user identification code can comprise, for example, a social security number of the user.
  • the system can include means for logging.
  • the logging means can be configured to record accesses associated with the total identification score of the user by the third party.
  • the system can include means for generating a report.
  • the report generating means can be configured to generate reports for displaying the record of accesses associated with the total identification score of the user.
  • personal information and/or financial information associated with the user can be transmitted to the third party upon verification of the identity access authorization code.
  • the personal information and/or financial information associated with the user can be transmitted to the third party upon further verification of a user identification code of the user.
  • the user identification code can comprise, for example, a social security number of the user.
  • the system can include an identity card means.
  • the identity card means can be configured to securely contain identification information associated with the user.
  • the identity card can comprise, for example, a smart card means.
  • the identification information associated with the user can be encrypted on the identity card means. Uses of the identification information securely contained on the identity card means can be restricted by the user. For example, locations of where the identification information is used can be restricted by the user. Times of when the identification information is used can be restricted by the user. Types of transactions for which the identification information is used can be restricted by the user. Use of the identification information for the transaction can be prohibited when the identification information is restricted by the user for the transaction. The identification information for the transaction can be used when the identification information is not prohibited by the user for the transaction.
  • the system can include means for generating a transaction order.
  • the transaction order generating means can be configured to generate a transaction order using the total identification score of the user.
  • the transaction order can be submitted by the user to perform the transaction.
  • Personal information and/or financial information of the user can be accessed, using the transaction order, to complete the transaction.
  • the system can include means for generating an address identification code.
  • the address identification code generating means can be configured to generate an address identification code associated with an address of the user.
  • the address identification code and an address of a communication reception center can be supplied to a third party. Communications for the user from the third party can be received at the communication reception center.
  • the communications can include, for example, the address identification code.
  • the system can include means for displaying a communication.
  • the communication displaying means can be configured to display communications to the user associated with the address identification code.
  • the system can include means for generating an identity risk factor.
  • the identity risk factor generating means can be configured to generate an identity risk factor associated with the user.
  • the identity risk factor can be associated with a level of risk of theft of the identity of the user by identity thieves.
  • the transaction can comprise an application for credit, a purchase transaction or the like.
  • the system can also include a graphical user interface means.
  • the graphical user interface means can be configured to provide access to and management of identification information associated with the user.
  • a system for verifying an identity of a user includes means for receiving configured to receive at least one source of identification of the user.
  • the system includes means for assigning an identification score configured to assign an identification score to each of the at least one source of identification.
  • the system includes means for generating an identification score configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function.
  • the total identification score of the user is associated with a level of verification of the identity of the user.
  • the system includes means for comparing configured to compare the total identification score of the user to a minimum identification score associated with a transaction.
  • the system includes means for approving a transaction.
  • the transaction approving means is configured to generate an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score.
  • the transaction approving means is configured to generate a request for additional sources of identification of the user before generating the approval of the transaction when the total identification score is less than the minimum identification score.
  • a system for verifying an identity of a user includes means for assigning an identification score configured to receive at least one source of identification of the user and configured to assign an identification score to each of the at least one source of identification.
  • the system includes means for generating a total identification score configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function.
  • the total identification score of the user is associated with a level of verification of the identity of the user.
  • the system includes means for receiving an approval.
  • the approval receiving means is configured to receive an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score.
  • the approval receiving means is configured to receive a request for additional sources of identification of the user before receiving the approval of the transaction when the total identification score is less than the minimum identification score.
  • a system for verifying an identity of a user includes means for receiving configured to receive a total identification score of the user.
  • the total identification score is generated from identification scores assigned to each of at least one source of identification of the user and a predetermined function.
  • the total identification score of the user is associated with a level of verification of the identity of the user.
  • the system includes means for comparing configured to compare the total identification score of the user to a minimum identification score associated with a transaction.
  • the system includes means for approving a transaction.
  • the transaction approving means is configured to generate an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score.
  • the transaction approving means is configured to generate a request for additional sources of identification of the user before generating the approval of the transaction when the total identification score is less than the minimum identification score.
  • a computer-readable medium contains a computer program for verifying an identity of a user.
  • the computer program performs the steps of: a.) receiving at least one source of identification of the user; b.) assigning an identification score to each of the at least one source of identification; and c.) generating a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function, wherein the total identification score of the user is associated with a level of verification of the identity of the user, wherein the total identification score of the user is compared to a minimum identification score associated with a transaction, wherein the transaction is performed when the total identification score of the user is one of greater than and equal to the minimum identification score, and wherein additional sources of identification of the user are received before performing the transaction when the total identification score is less than the minimum identification score.
  • the at least one source of identification can comprise a driver's license of the user.
  • the at least one source of identification can comprise a birth certificate of the user.
  • the identification score assigned to each of the at least one source of identification can be based upon a reliability of the at least one source of identification.
  • the predetermined function can comprise, for example, a summing function, a weighted summing function or the like.
  • the computer program can perform the steps of: d.) retrieving at least one of personal information and financial information of the user, wherein the total identification score is associated with the at least one of personal information and financial information of the user; e.) generating a unique identity access authorization code associated with the user for use by a third party in the transaction; and f.) initiating transmission, to the third party, of at least the total identification score of the user upon verification of the identity access authorization code. At least the total identification score of the user can be transmitted to the third party upon further verification of a user identification code of the user.
  • the user identification code can comprise, for example, a social security number of the user.
  • the computer program can perform the steps of: g.) recording accesses associated with the total identification score of the user by the third party; h.) providing a review of the record of accesses associated with the total identification score of the user; and i.) initiating transmission, to the third party, of personal information and/or financial information associated with the user upon verification of the identity access authorization code of the user.
  • the personal information and/or financial information associated with the user can be transmitted to the third party upon further verification of a user identification code of the user.
  • the user identification code can comprise, for example, a social security number of the user.
  • the computer program can perform the step of: j.) generating authorization for issuance of an identity card securely containing identification information associated with the user.
  • the identity card can comprise, for example, a smart card or the like.
  • the identification information associated with the user can be encrypted on the identity card.
  • the computer program can perform the step of k.) generating use restrictions for the identification information securely contained on the identity card.
  • the computer program can perform the steps of: l.) generating location restrictions for where the identification information is used; m.) generating temporal restrictions for when the identification information is used; and n.) generating type restrictions for transactions for which the identification information is used.
  • the computer program can perform the steps of: o.) generating use prohibitions for the identification information for the transaction when the identification information is restricted by the user for the transaction; p.) generating authorization to use the identification information for the transaction when the identification information is not prohibited by the user for the transaction; q.) generating a transaction order using the total identification score of the user; r.) forwarding the transaction order to perform the transaction; s.) initiating transmission of at least one of personal information and financial information of the user, upon verification of the transaction order, to complete the transaction; t.) associating an address identification code with an address of the user; u.) providing the address identification code and an address of a communication reception center to a third party; v.) receiving communications for the user from the third party at the communication reception center, wherein the communications can include, for example, the address identification code; w.) forwarding the communications to the user associated with the address identification code; and x.) generating an identity risk factor associated with the user, wherein the identity risk factor can be associated with
  • a computer-readable medium contains a computer program for verifying an identity of a user, wherein the computer program performs the step of: a.) receiving at least one source of identification of the user; b.) assigning an identification score to each of the at least one source of identification; c.) generating a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function, wherein the total identification score of the user is associated with a level of verification of the identity of the user; d.) comparing the total identification score of the user to a minimum identification score associated with a transaction; e.) generating an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score; and f.) initiating a request for additional sources of identification of the user before generating the approval of the transaction when the total identification score is less than the minimum identification score.
  • a computer-readable medium contains a computer program for verifying an identity of a user, wherein the computer program performs the step of: a.) receiving at least one source of identification of the user; b.) assigning an identification score to each of the at least one source of identification; c.) generating a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function, wherein the total identification score of the user is associated with a level of verification of the identity of the user; d.) receiving an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score; and e.) receiving a request for additional sources of identification of the user before receiving the approval of the transaction when the total identification score is less than the minimum identification score.
  • a computer-readable medium contains a computer program for verifying an identity of a user, wherein the computer program performs the step of a.) receiving a total identification score of the user, wherein the total identification score is generated from identification scores assigned to each of at least one source of identification of the user and a predetermined function, and wherein the total identification score of the user is associated with a level of verification of the identity of the user; b.) comparing the total identification score of the user to a minimum identification score associated with a transaction; c.) generating an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score; and d.) initiating a request for additional sources of identification of the user before generating the approval of the transaction when the total identification score is less than the minimum identification score.
  • a system for verifying an identity of a user includes an identification score assignment module.
  • the identification score assignment module is configured to receive at least one source of identification of the user.
  • the identification score assignment module is configured to assign an identification score to each of the at least one source of identification.
  • the system includes a total identification score generation module in communication with the identification score assignment module.
  • the total identification score generation module is configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function.
  • the total identification score of the user is associated with a level of verification of the identity of the user.
  • the total identification score of the user is compared to a minimum identification score associated with a transaction.
  • the system includes an identity confidence factor generation module in communication with the total identification score generation module.
  • the identity confidence factor generation module is configured to generate an identity confidence factor associated with the user in accordance with a validity of the identity of the user.
  • the transaction is performed when at least one of i.) the total identification score of the user is one of greater than and equal to the minimum identification score, and ii.) the identity confidence factor of the user is greater than a predetermined identity threshold value. Additional sources of identification of the user are received before performing the transaction when at least one of: i.) the total identification score is less than the minimum identification score, and ii.) the identify confidence factor of the user is less than the predetermined identity threshold value.
  • the validity of the identity of the user can be based on a time factor.
  • the time factor can comprise a length of time in which the identity of the user is used legitimately.
  • the identity confidence factor of the user can be increased as the length of time in which the identity of the user is legitimately used increases.
  • the system can include a healthcare identity card.
  • the healthcare identity card can be configured to securely contain identification information associated with the user.
  • the healthcare identity card can be configured to be used by a healthcare provider to retrieve healthcare information associated with the user.
  • FIG. 1 is a block diagram illustrating a system for verifying an identity of a user, in accordance with an exemplary embodiment of the present invention.
  • FIGS. 2A-2C are flowcharts illustrating steps for verifying an identity of a user, in accordance with an exemplary embodiment of the present invention.
  • FIG. 3 is a flowchart illustrating steps for restricting uses of identification information securely contained on an identity card, in accordance with an exemplary embodiment of the present invention.
  • FIG. 4 is a flowchart illustrating steps for verifying an identity of a user, in accordance with an alternative exemplary embodiment of the present invention.
  • FIG. 5 is a flowchart illustrating steps for verifying an identity of a user, in accordance with an alternative exemplary embodiment of the present invention.
  • FIG. 6 is a flowchart illustrating steps for verifying an identity of a user, in accordance with an alternative exemplary embodiment of the present invention.
  • FIG. 7 is a diagram illustrating information routing for GIS, in accordance with an exemplary embodiment of the present invention.
  • FIG. 8 is a diagram illustrating the identity management system distributed platform model, in accordance with an exemplary embodiment of the present invention.
  • FIG. 9 is a diagram illustrating an exemplary architecture for the identity management system 100 platform, in accordance with an exemplary embodiment of the present invention.
  • FIGS. 10A and 10B are flow diagrams illustrating a transaction using an automated pre-authorization process for the identity management system without using a one-time card number, in accordance with an exemplary embodiment of the present invention.
  • FIGS. 11A and 11B are flow diagrams illustrating a transaction using an automated pre-authorization process for the identity management system using a one-time card number, in accordance with an exemplary embodiment of the present invention.
  • FIGS. 12A and 12B are flow diagrams illustrating a transaction using an automated pre-authorization process for the identity management system without registration and without using a one-time card number, in accordance with an exemplary embodiment of the present invention.
  • FIGS. 13A and 13B are flow diagrams illustrating a transaction using an automated pre-authorization process for the identity management system without registration but using a one-time card number, in accordance with an exemplary embodiment of the present invention.
  • FIG. 14 is a diagram illustrating insurance coverage using the identity management system, in accordance with an exemplary embodiment of the present invention.
  • FIG. 15 is a diagram illustrating on-line gambling transactions with the identity management system, in accordance with an exemplary embodiment of the present invention.
  • FIG. 16 is a diagram illustrating a commerce platform for the identity management system, in accordance with an exemplary embodiment of the present invention.
  • Exemplary embodiments of the present invention are directed to a system and method for identity verification and management.
  • the identity of an individual or entity (collectively, a “user”) is first verified.
  • One or more sources of identification are supplied by the user, with each source of identification being verified and given an individual identity value or score based on, for example, the level of reliability or authenticity of the identification source.
  • the identity of the user is then evaluated based on the total of the identity scores. A total identification score is assigned to the user. Once the identity of the user is verified, the user can manage its identity using the identity management system of the present invention.
  • the identity management system can, for example, provide authorization to certain organizations to supply services to the user for a period of time. For example, each time the user authorizes an organization to provide a service to the user using the user's identity, the identity management system can provide the user with an identity authorization code to pass to the organization. Once a user sends the identity authorization code, along with its identity information, such as, for example, a social security number, the organization can further verify the identity of the user by using an additional aspect of the identity management system of the present invention. According to exemplary embodiments, the identity management system can be used by vendors wishing to provide a service to the user.
  • the identity management system can allow the vendor to input the client's identity information (e.g., social security number) along with the provided identity authorization code to determine if the user has verified the vendor to use the user's identity information based on the criteria the user has inputted into the identity management system.
  • client's identity information e.g., social security number
  • the user can also restrict the use of its identity information and credit information based on, for example, an identification card issued to the user by the system.
  • the identification card can also restrict uses of the user's identity and/or credit based on specified restrictions.
  • the user can specify a restriction such that any credit card issued to the user cannot be used internationally or the like. Such a restriction will allow the user to restrict the user's exposure to identity theft.
  • the identity management system can also issue an identity risk factor to the user.
  • the identity risk factor can assist both the user and third parties in evaluating the exposure of the user to identity theft.
  • Online purchases can also be verified using the identity management system according to exemplary embodiments.
  • the identity management system can identify a user by asking the user to provide an identification number and/or an identity code uniquely assigned to the user.
  • an online merchant can be certain that the credit card being used has not been stolen and is not being used in a fraudulent manner.
  • the user can restrict the use of the credit card based on specified restrictions as part of process of managing the user's identity profile.
  • exemplary embodiments of the present invention can establish, maintain and secure the identity of a user through proper identity verification and management, issuance of secure identity cards and unique identity codes to be used along with the identity cards, and the like.
  • a “user” can be any person, group of individuals, company, corporation, business, retail establishment, organization or other any suitable type of entity that possesses a unique identity that can be potentially stolen or otherwise compromised, and for which protection against identity theft is desired.
  • FIG. 1 is a block diagram illustrating an identity management system 100 for verifying an identity of a user, in accordance with an exemplary embodiment of the present invention.
  • the identity management system 100 includes an identification score assignment module 105 .
  • the identification score assignment module 105 is configured to receive at least one source of identification 110 of the user. Any suitable number N of sources of identification 110 can be supplied or otherwise transmitted by the user to the identification score assignment module 105 (e.g., source of identification 1 , source of identification 2 , . . . , source of identification N).
  • Each source of identification 110 can be any appropriate means for uniquely identifying a user, such as, for example, a driver's license, a social security card, a birth certificate, passport or other like credential(s) of the user.
  • the sources of identification 110 can be supplied by the user to the identification score assignment module 105 using any appropriate means, such as any suitable form of electronic transmission (e.g., a scanned copy of the documentation, facsimile, electronic mail and/or the like) or manual delivery.
  • the identification score assignment module 105 is configured to assign an identification score to each of the at least one source of identification 110 .
  • an identification score is a value that represents the level of verification or veracity of a given source of identification 110 .
  • the identification score assigned to each of the at least one source of identification 110 is based upon the reliability of the at least one source of identification 110 .
  • identification scores can be based on a scale, such as 0 to 10, 0 to 100 or any suitable scale.
  • an identification score below a certain threshold number can represent that the source of identification 110 cannot be considered trusted or reliable and is not (or cannot be) verified
  • an identification score at or above the given threshold can represent that the source of identification 110 can be considered trusted, reliable and verified (or verifiable).
  • any appropriate identification score can be assigned to a source of information 110 , so long as the identification score is indicative of the level of verification, reliability and/or veracity of the source of identification 110 .
  • identification scores for each type of source of identification 110 can pre-assigned and stored in, for example, a look-up table or database.
  • driver's licenses can have a score of for example, 60 (or other suitable value)
  • birth certificates can have a score of, for example, 85 (or other suitable value)
  • each score being retrieved from the look-up table or database based on the type of source of identification 110 provided by the user.
  • identification scores for each source of identification 110 can be assigned dynamically, i.e., the identification scores can be generated based on one or more factors, for example, the type of source of identification 110 , personal information of the user, and the like.
  • the identification score assigned to this source of identification 110 can be high, otherwise it can be assigned a lower score.
  • Those of ordinary skill in the art will recognize that other methods of assigning identification scores to sources of identification 110 can be used.
  • the identity management system 100 includes a total identification score generation module 115 in communication with the identification score assignment module 105 .
  • the total identification score generation module 115 is configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification 110 using a predetermined function.
  • a total identification score of a user is a value that represents the level of verification of the identity of the user.
  • the total identification score can be considered akin to, for example, a credit score that is given to a user based on the user's credit history.
  • total identification scores can be based on a scale, such as 0 to 10, 0 to 100 or any suitable scale.
  • a total identification score below a certain threshold number can represent that the identity of the user cannot be considered reliable and is not (or cannot be) verified
  • a total identification score at or above the given threshold can represent that the identity of the user can be considered trusted, reliable and verified (or verifiable).
  • any appropriate threshold can be used as the demarcation for the total identification score, so long as any total identification score at or above such a threshold is indicative of the level of verification, reliability and/or veracity of the identity of the user.
  • the total identification score generation module 115 generates a total identification score by combining the identification scores of each source of identification 110 .
  • the total identification score generation module 115 can use a summing function to sum the individual scores to create the total identification score.
  • the total identification score generation module 115 can use a weighted summing function to add the individuals identification scores of each of the sources of identification 110 , while giving greater weight to those sources of identification 110 that are more reliable (e.g., assigning greater weight to a birth certificate than to a social security card).
  • the total identification score generation module 115 can use an averaging function to average the identification scores of the sources of identification 110 .
  • any suitable method for generating the total identification score from the identification scores of each of the sources of identification 110 can be used, so long as the resulting total identification score is indicative of the level of verification or reliability of the identity of the user.
  • the identification score assignment module 105 can then attempt to verify each source of identification 110 .
  • the identification score assignment module 105 can be configured to access public record databases (e.g., via the Internet), state department of motor vehicle databases (e.g., to verify the driver's license) or other databases of other state agencies (e.g., to verify the birth certificate), federal record databases (e.g., to verify the social security card) and the like.
  • public record databases e.g., via the Internet
  • state department of motor vehicle databases e.g., to verify the driver's license
  • other databases of other state agencies e.g., to verify the birth certificate
  • federal record databases e.g., to verify the social security card
  • the identification score assignment module 105 assigns an identification score of 54 to the social security card, an identification score of 68 to the driver's license, and an identification score of 85 to the birth certificate.
  • each of the identification scores can be either a pre-assigned number based on the type of source of identification 110 , or dynamically generated based on one or more factors.
  • the total identification score assigned to the user can be used as part of a transaction.
  • the transaction can include an application for credit, a purchase transaction, or any suitable transaction for which verification of a user's identity is required.
  • the credit card company can receive the total identification score of the user (as discussed below) as part of the application process.
  • the total identification score of the user can be compared to a minimum identification score associated with the transaction.
  • the total identification score generation module 115 can alternatively perform the comparison on behalf of the credit card company.
  • the total identification score generation module 115 can include or be in communication with a comparator module configured to compare the total identification score of the user to the minimum identification score associated with the transaction.
  • the credit card company requires a minimum total identification score of 50 (using an averaging function) to issue the user a credit card. Since the total identification score of the user is 70, the credit card company can be assured of the verification of the identity of the user. In other words, the transaction can be performed (e.g., the credit card is issued), since the total identification score of the user (e.g., 70) is greater than or equal to the minimum identification score (e.g., 50) required to perform the transaction. However, if the total identification score was less than the minimum identification score, one or more additional sources of identification 110 of the user can be requested, received and verified (e.g., until the total identification score is above the minimum identification score) before the transaction can be performed.
  • the minimum identification score e.g., 50
  • the total identification score generation module 115 can include or be in communication with a transaction approval module.
  • the transaction approval module can be configured to generate an approval of the transaction when the total identification score of the user is greater than or equal to the minimum identification score, and to generate a request to the user for additional sources of identification 110 before generating the approval of the transaction when the total identification score is less than the minimum identification score.
  • the total identification score generation module 115 can include or be in communication with an approval receiver module.
  • the approval receiver module can be configured to receive an approval of the transaction when the total identification score of the user is greater than or equal to the minimum identification score, and to receive a request for additional sources of identification 110 of the user before receiving the approval of the transaction when the total identification score is less than the minimum identification score.
  • the identification scores assigned to each of the sources of identification 110 , the total identification score of the user, and the minimum identification score required to perform the transaction will depend on such factors as the types of documents submitted by the user, the predetermined function used to generate the total identification score, the level of verification desired by the third party to perform the transaction, the type of transaction to be performed, and other like factors.
  • a CONFIDENCE FACTORTM (which can also be referred to as an “identity confidence factor”) can be used to evaluate and measure the validity of a user's identity, additionally or alternatively to the total identification score of the user.
  • the CONFIDENCE FACTORTM can be used by the total identification score generation module 115 as part of the generation of the total identification score of the user.
  • the CONFIDENCE FACTORTM is a value represents the validity of a user's identity.
  • the CONFIDENCE FACTORTM can be a base value (e.g., 0 or any suitable value) that can be increased or otherwise altered based on one or more factors, including, for example, time.
  • the CONFIDENCE FACTORTM can be increased (e.g., by suitable increments): i.) as a user's identity is consistently and legitimately used over a period of time; ii.) based on the length of time the user has been a member of the identity verification and management system according to exemplary embodiments; iii.) based on the length of time a user preserves a healthy credit report; and/or other like temporal indications.
  • Other appropriate factors or variables can be combined with, for example, time to determine the CONFIDENCE FACTORTM. For example, such factors can include the number of instances that a user accesses their on-line identity account, the lack of criminal records, arrests or other criminal activity, and the like.
  • the probability of a false identity decreases.
  • the CONFIDENCE FACTORTM can be combined with or used separately from the total identification score to indicate the level of verification or reliability of the identity of the user.
  • the CONFIDENCE FACTORTM can represent the validity of a user's identity proven over time and which can be based on information provided by an entity other than the user, such as criminal records later discovered and the like, while the total identification score represents a combination of identity scores that may not be dependent upon factors such as time.
  • the CONFIDENCE FACTORTM can be added to the total identification score to improve the level of verification or reliability of the identify of the user.
  • the CONFIDENCE FACTORTM can be used as part of the evaluation of the total identification score by a third party.
  • a high CONFIDENCE FACTORTM can provide the additional identity verification required by the financial institution to authorize the loan. Additionally, if the user has a high total identification score, then a high CONFIDENCE FACTORTM can be used by the financial institution to authorize an increased loan amount or lower interest rate for the loan.
  • the identity management system 100 can include a data storage device 120 in communication with, for example, the total identification score assignment module 115 .
  • the data storage device 120 can be used to store personal information and/or financial information of the user, although any suitable information associated with the user can be stored in the data storage device 120 .
  • the data storage device 120 can be any suitable type of computer memory or other computer storage medium capable of storing information.
  • the total identification score of the user can be associated with the personal and/or financial information stored in the data storage device 120 . By creating such an association, the information associated with the total identification score can be accessed and retrieved as part of a transaction, rather than having the user personally supply such information for each and every transaction.
  • the identity management system 100 can include an access code generation module 125 in communication with, for example, the total identification score assignment module 115 .
  • the access code generation module 125 is configured to generate a unique identity access authorization code associated with the user for use by a third party to access the personal and/or financial information associated with the user.
  • the identity management system 100 also can include a data transmission module 130 in communication with, for example, the access code generation module 125 and, through a communication link 133 , to a third party entity.
  • the data transmission module 130 is configured to transmit at least the total identification score of the user to the third party upon verification of the identity access authorization code.
  • the data transmission module 130 is also configured to receive information from external (i.e., third party) sources via the communication link 133 .
  • the user has a total identification score of 70, which was generated as discussed in the previous illustration.
  • the user desires to apply for credit, such as a credit card.
  • the user can log into or otherwise gain access to the identity management system 100 of the present invention by, for example, logging into (e.g., via login name and password) a website or through a suitable graphical user interface (e.g., graphical user interface 170 ).
  • a suitable graphical user interface e.g., graphical user interface 170
  • the user can have a unique identity access authorization code generated for the user by the access code generation module 125 .
  • the identity access authorization code can be given to a third party by the user to allow the third party to gain access to the user's personal and/or financial information maintained by the identity management system 100 .
  • the identity access authorization code can be any suitable code or number that is unique to the user, such as, for example, a random number, an alphanumeric string of characters, the public key of a public key-private key public key infrastructure (PKI) system, or the like.
  • the identity access authorization code can be a one-time use code, although the identity access authorization code can be used any number of times.
  • the user when applying for the credit card, instead of inputting its personal and financial information into the application form, the user can supply the identity access authorization code to the bank or other financial institution to whom the user is applying for credit.
  • the financial institution can gain access to the identity management system 100 to retrieve information associated with the user (e.g., through the graphical user interface 170 or like interface).
  • the personal information and/or financial information associated with the user can be transmitted to the third party (e.g., via data transmission module 130 ) upon verification of the identity access authorization code.
  • the financial institution can retrieve the total identification score of the user, as well as any personal and/or financial information associated with the user that is needed for the credit application. The retrieved information can then be used by the financial institution to complete or otherwise fill in, for example, the credit card application on behalf of the user. As discussed previously, the financial institution can compare the total identification score of the user to a minimum identification score to determine whether the application process can continue (e.g., when the total identification score is greater than or equal to the minimum identification score) or whether additional sources of identification 110 are required from the user before continuing (e.g., when the total identification score is less than the minimum identification score).
  • a user identification code can be generated by the identity management system 100 (e.g., by the access code generation module 125 ) or supplied by the user to the third party entity, along with the identity access authorization code.
  • the third party entity can use the user identification code in connection with the identity access authorization code before access and retrieval of the user's information is granted to the third party entity.
  • the data transmission module 130 can be configured to transmit at least the total identification score of the user to the third party upon further verification of the user identification code of the user.
  • the user identification code can be any suitable number or code that uniquely identifies the user, such as the user's social security number or the like.
  • the identity management system 100 can include a log module 135 in communication with, for example, the access code generation module 125 .
  • the log module 135 can be configured to record or otherwise store a list of, for example, accesses associated with the total identification score of the user by the third party. However, the log module 135 can be configured to record accesses to any of the personal and/or financial information associated with the user that is stored and maintained by the identity management system 100 .
  • the identity management system 100 can also include a report generation module 140 in communication with, for example, the access code generation module 125 .
  • the report generation module 140 can be configured to generate, for example, reports for displaying the record of accesses associated with the total identification score and other information associated with the user.
  • the record of accesses can be displayed to the user through, for example, a graphical user interface (e.g., graphical user interface 170 ) or other display device or printed in hard copy for review by the user.
  • the log module 135 can be used to maintain a record of each use of a user's identification information by a third party.
  • the report generation module 140 can then provide an identity report to the user by which the user can view the activities performed by the third parties with respect to the user's identity, in a manner similar to that which a user reviews a credit report to view credit transactions and credit activity.
  • an identity card 145 can be issued by the identity management system 100 at the request of the user (e.g., by logging into the identity management system 100 through the graphical user interface 170 and making such a request).
  • the identity card 145 can be configured to securely contain identification information associated with the user.
  • the total identification score of the user can be encrypted (e.g., using any suitable encryption technique) and stored on the identity card 145 , although any suitable information can be securely contained on the identity card 145 , such as, for example, the personal and/or financial information associated with the user.
  • the identity card 145 can act as a key to access information stored remotely.
  • the identity card 145 can comprise a smart card (e.g., containing a “smart chip”), a card with a magnetic stripe, or any suitable storage medium on which encrypted information can be stored.
  • the identify card 145 can comprise any suitable form of electronic device capable of storing information, such as, for example, a cell phone or other electrical or electronic devices.
  • the identity card 145 can include biometric forms of identification, such as, for example, a fingerprint or the like.
  • the identify card 145 can comprise a unique identifying feature of a human, such as an individual's sclera, retina or fingerprint that can be used with or without an accompanying card or other identifying device.
  • suitable RFID technology can be used.
  • the RFID technology can be used instead of the card (e.g., a suitable RFID chip can be implanted within or on a person or a person's belongings) for use with the identity management system 100 .
  • a suitable RFID chip or device can reside on the identity card 145 .
  • the user can then provide the identity card 145 to a third party, who can decrypt the identification information stored on the card and use that information as part of a transaction (e.g., applying for credit, a purchase transaction, and the like).
  • the identification information contained on the identity card 145 can be used by the third party in addition or alternatively to the information that can be retrieved by the third party using the identity access authorization code.
  • the identification information contained on the identity card 145 can comprise, for example, the identity access authorization code by which the third party gains access to the information associated with user that is stored and maintained by the identity management system 100 .
  • the user can restrict the uses of the identification information securely contained on the identity card 145 .
  • the user can restrict the locations of where the identification information is used (e.g., the identification information can only be used in the United States and Canada, but not in Mexico).
  • the user can restrict the times of when the identification information is used (e.g., the identification information can only be used between the hours of 9:00 a.m. and 5:00 p.m.).
  • the user can restrict the types of transactions for which the identification information can be used (e.g., the identification information can only be used for purchase transactions, but not applications for credit).
  • Other types of restrictions of the identification information securely stored on the identity card 145 are possible.
  • the third party can decrypt the identification information stored on the identity card 145 .
  • the third party can access the identity management system 100 (e.g., through the graphical user interface 170 using the identity access authorization code, through a secure socket connection using an appropriate network protocol and the like) as part of a transaction.
  • the identity management system 100 can prohibit or otherwise deny the use of the identification information when the identification information is restricted by the user for the transaction, or allow or otherwise approve the use of the identification information when the identification information is not prohibited by the user.
  • the use of the identification information securely contained on the identity card 145 can be approved or denied in a manner similar to that which a bank either approves or denies the use of a credit card for a purchase transaction.
  • the identity card 145 can also be used to restrict the uses of accompanying credit cards, checks, affiliated identification cards (as discussed below) and the like forms of payment or identification that can be used in conjunction with the identity card 145 .
  • the user can restrict the use of credit cards by specifying where, when and how the credit cards can be used.
  • a merchant or other third party can either allow the accompanying credit card to be used when the use falls within the restriction(s) specified in the identification information, or deny the use of the credit card when the use does not.
  • the restriction information can be included in the identification information securely contained on the identity card 145 , which is provided to the third party once the identification information is decrypted.
  • the identity management system 100 can automatically inform the third party of the restrictions by allowing or rejecting the use of the identity card 145 .
  • the identification information can be used by the third party to gain access to the identity management system 100 , at which time the user-specified restriction(s) for the credit card are provided to the third party.
  • the third party can access the user-specified restrictions directly from the identity management system 100 using, for example, a unique third party authorization code (e.g., generated by the identity management system 100 ), regardless of the presence of the identity card 145 .
  • a third party can independently access the identity management system 100 remotely (e.g., through the Internet, graphical user interface 170 , telephone or automated customer service, through an appropriate secure network connection, or the like) to check for the user's total identification score, other identification information, and for any user-specified restrictions placed on the form of payment (e.g., a credit card, check or the like) proffered by the user, when the user does not provide the third party with an identity card 145 .
  • the form of payment e.g., a credit card, check or the like
  • the third party can log into the identity management system 100 (e.g., through the graphical user interface 170 , telephone support, secure network connection or the like), enter the third party's unique vendor authorization code, and enter the account number of the form of payment proffered by the user (e.g., credit card number, checking account number, and the like).
  • the identity information and any user-specified restrictions can then be provided to the third party by the identity management system 100 .
  • the identity theft protection provided by the use of an identity card 145 can be separate from credit protection that can be associated with one or more credit cards.
  • a separate identity card 145 and credit card(s) can be used.
  • the identity card 145 can be used in conjunction with any suitable form of payment or identification, the identity card 145 can also serve as both a form of payment (e.g., a credit card or the like) and means of identification simultaneously, without the need for separate forms of payment and identification.
  • the identity card 145 can serve as the only form of payment and identification that the user need carry.
  • credit card information or other payment information can be entered into the identity management system 100 and be accessible by the identity card 145 , along with the identification information of the user (including, for example, any user-specified restrictions associated with the forms of payment).
  • the user can enter a personalized PIN number or suitable pass code into a third party's point-of-sale (POS) system that will allow the use of the information associated with the particular credit card or other form of payment for the transaction.
  • POS point-of-sale
  • Each form of payment can be associated with a unique pass code, or a single pass code can be associated with all forms of payment, allowing the user to associate a particular form of payment with the pass code as desired.
  • the user can log into the identity management system 100 (e.g., using the user's unique name and password) and enter information associated with one or more forms of payment, such as, for example, credit card numbers, expiration dates and authorization codes, although information associated with any suitable form of payment (e.g., check cards, checks and the like) can be entered.
  • information associated with a credit card such as the following:
  • a single identity card 145 can be used to access any or all identification or credit card information.
  • a user can carry the identity card 145 instead of many other cards.
  • users can store or otherwise associate any credit card information with the identity card 145 using the identity management system 100 .
  • the user can access the identity management system 100 via, for example, the Internet or World Wide Web via a suitable graphical user interface (e.g., graphical user interface 170 ) and an appropriate Internet or network connection.
  • the merchant or third party can process the charge through conventional credit card network.
  • the credit card network is a specialized network that is connected to merchants, credit card companies and banks.
  • the user or the merchant swipes a credit card through a credit card reading device.
  • the device reads the information from the card and sends it to a first processing site (a “first processor” or “acquirer”) for processing by the merchant.
  • first processor a first processing site
  • second processor a second processing site
  • the bank or other financial institution that receives the charge information is the bank or financial institution that issued the credit card to the user.
  • An authorization or denial of the charge based on the user's available credit, will be sent to the merchant or third party via the second and first processors.
  • the identity management system 100 can review the authorization transactions processed by the merchants or third parties as part of identity theft prevention.
  • the existing merchant authorization process can be modified by placing a third processing site (a “third processor”) between the first and second processors.
  • a third processor a third processing site
  • the third processor can reside in, for example, the identity management system 100 .
  • the third processor can compare the identity information associated with the credit card information to verify the identity of the user to ensure that an actual or potential identity theft is not occurring (e.g., the credit card has not been marked as lost or stolen and the like, as discussed below). For example, if the identity of the user making the credit card charge is not the correct identity associated with the credit card authorization, the third processor can issue an identity denial of the credit card transaction based on the failed identity verification. Otherwise, the third processor can issue an identity authorization for the credit card transaction as a result of the verified identity. After the information has been verified by the third processor, the charge information can be sent to the second processor at the bank for financial authorization or denial of the transaction, for example, based on the user's available credit.
  • the first processor receives a request for credit card authorization from the point-of-sale (POS) and passes that request to the issuing bank for verification. The first processor then relays the answer to that request from the issuing bank to the merchant.
  • POS point-of-sale
  • the first processor then relays the answer to that request from the issuing bank to the merchant.
  • POS point-of-sale
  • the merchant When a merchant wants to establish a connection with a network, the merchant establishes the connection through a gateway.
  • the first processor receives the merchant request for credit card authorization and sends it to the network. From the network, the request finds its way to the issuing bank's database for authorization. Some banks act as their own processor and receive and answer any requests. However, many banks register with a second processor, such as Élan Financial Services or the like.
  • the second processor has access to the issuing bank's information and can issue authorization. Once the second processor accesses the bank data, it can relay an answer back through the network to the first processor and ultimately
  • the third processor can act like the second processor, and, in a manner, replace the second processor.
  • the identity management system 100 can issue a global or universal credit card (such as the identity card 145 or a separate credit card), as discussed below.
  • the global credit card can be used in several different ways.
  • the global credit card can be used to store other credit cards.
  • an authorization request can be sent from the merchant through a gateway to the merchant's chosen processor. From the first processor the request can be sent to the network and finally to the identity management system 100 .
  • the identity management system 100 can make a connection to the issuing bank and check the user's account for availability of funds.
  • the transaction can be performed using an “On-Us” approach to avoid network charges, as discussed below. If funds are available, an authorization message can be sent to the merchant. If funds are not available, a authorization declined messages can be sent instead. If an authorization is provided to the merchant, a settlement can be requested to transfer the funds to, for example, the identity management system 100 as soon as possible. In such a transactional system, the user would have zero credit balance in the identity management system 100 . All balances would be provided by the issuing bank. The identity management system 100 would then be used for management of the transaction.
  • the global credit card can be used to store other credit cards and can be used as a credit card itself: If used as a credit card itself, the user can use their global credit card without using an associated PIN.
  • the authorization request can be sent from the merchant through a gateway to the merchant's chosen processor. From the first processor, the request can be sent to the network and finally to the identity management system 100 . The transaction can be recorded, and, if the user has sufficient funds in their account, an authorization message can be sent to the merchant. Otherwise an authorization declined message can be sent. Users can use the identity management system 100 to assign each transaction to a bank or credit card of choice. At regular intervals, the identity management system 100 can collect requests and send user's requested transactions to the issuing banks.
  • the user's account can be credited and money can be collected from the issuing bank. If sufficient funds are not available, the user's account will not be credited, which will be reflected in the user's account. If the user does not assign the transaction to any of the other banks, the user's account with the identity management system 100 will be affected. In such case, the identity management system 100 can act as a credit card company.
  • exemplary embodiments of the present invention can reduce/avoid any extra costs incurred by introducing the identity card 145 into the credit card system.
  • exemplary embodiments can use an “On-Us” approach.
  • the entity creating the extra charges can partner with banks or other financial institutions to eliminate those extra charges.
  • such an approach can eliminate the need for a third processor, as the second processor can be used to perform both the identity authorization and the financial (credit card) authorization.
  • negotiations can take place with banks or other financial institutions to lower or eliminate such charges.
  • such negotiations can take many shapes and forms, with various incentives, give-backs and concessions made between the parties to reduce or eliminate such charges.
  • a third processor would still be used.
  • FIG. 16 is a diagram illustrating a commerce platform for the identity management system 100 , in accordance with an exemplary embodiment of the present invention.
  • a user 1610 can register with the identity management system 100 (also referred to as a “Global Identity (GID) processor”) (see flow 1650 ).
  • the identity management system 100 also referred to as a “Global Identity (GID) processor”
  • GID Global Identity
  • the bank of the user 1610 is a participating entity 1615 of the commerce platform network 1600
  • the user 1610 can be automatically registered by opening, for example, a credit card or the like with the bank and having the bank issue the credit card to the user 1610 .
  • the credit card can be, for example, an identity card 145 or the like associated with the identity management system 100 , and can have a suitable PIN number associated with the card to identify the card as an identity card 145 .
  • the user 1610 can associate one or more credit cards with an identity card 145 , with each credit card assigned a unique PIN number so that the user 1610 can choose which credit card(s) to use at the time of the transaction.
  • the PIN number can be used to identify the card as an identity card 145 and to select the credit card to use for the transaction, while the credit card numbers can be used to identify the correct issuing bank.
  • the user 1610 When the user 1610 participates in a transaction at the store 1605 , the user 1610 can enter the PIN or other identifier associated with the identity card 145 .
  • the transaction information including, for example, credit card and PIN numbers, can be passed to the identity management system 100 (see flow 1650 ).
  • the identity management system 100 can query a suitable database to look up or otherwise retrieve the credit card and PIN number combination (see flow 1655 ). Such information can allow the identity management system 100 to determine the particular bank (e.g., participating entity 1615 ) that issued the credit card. Once such a determination is made, the identity management system 100 can query or otherwise access the account information for the user 1605 from the proper participating entity 1615 (e.g., for no fee since it is a participating entity).
  • the transaction information can then be routed to the proper participating entity 1615 from the identity management system 100 to complete the transaction (e.g., an “OnUs” transaction based on the PIN numbers—see flow 1660 ).
  • the completed and authorized transaction information can then be passed from the participating entity 1615 through the identity management system 100 using the corresponding network 1625 (e.g., the credit card network or the like) to the store 1605 to finish the transaction.
  • the identity management system 100 can perform any suitable type of transaction exchange with participating entities 1615 , such as, for example, ACH-based transactions to transfer money (see flow 1665 ) to settle charges made by the user 1605 or the like.
  • non-participating entities 1630 entities that do not participate in the commerce platform according to exemplary embodiments can still use the commerce platform network 1600 to perform transactions.
  • the transaction information received by the identity management system 100 from the user 1610 at the initiation of a transaction can be forwarded by the identity management system 100 to the appropriate non-participating entity 1630 , for example, based on the credit card number.
  • the identity management system 100 may not be able to access the account information of the user 1610 from the non-participating entity 1630 , the identity management system 100 can still perform appropriate transaction routing functions to route the transaction information to the non-participating entity 1620 via the network 1635 (e.g., a credit card network or the like).
  • the identity management system 100 can perform suitable transaction exchanges with the non-participating entities 1630 .
  • the identity management system 100 can perform ACH-based transactions or other electronic funds transfer to transfer money to, for example, settle charges made by the user 1605 and other like transactions.
  • the user 1605 can have their account debited or otherwise charged by either direct access to bank account of the user (e.g., via a participating entity 1615 ) or by having the identity management system 100 use electronic funds transfer systems, such as an ACH-based transaction system, to interact with non-participating entities 1630 to settle such transactions.
  • the user 1610 can participate in a transaction at the store 1605 by entering the PIN number along with the credit card information (e.g., by swiping the card at an appropriate purchase terminal). By using the PIN number, the user 1605 can choose the credit card(s) to which the transaction is to be assigned at the time the transaction is being made. However, according to an alternative exemplary embodiment, the user 1610 can simply enter the credit card information, thereby not assigning the transaction to any particular credit card at the time of the transaction. In such a scenario, the identity management system 100 can hold the transaction, while still authorizing the charge.
  • the user 1605 can then log into or otherwise access their account on the identity management system 100 (e.g., through a suitable graphical user interface over, for example, the Internet or World Wide Web) (see flow 1670 ).
  • the user 1605 can then use the identity management system 100 to assign the transaction(s) to one or more accounts (e.g., credit card accounts or the like) in block 1640 .
  • the identity management system 100 can then perform suitable interactions with either or both of the participating and non-participating entities 1615 and 1630 to settle the transaction (e.g., through proper money transfers, charge reconciliations or the like).
  • the identity management system 100 can act as a credit card company.
  • the identity management system 100 can perform steps, such as: checking the identity card 145 to ensure that it is valid and not marked as compromised (e.g., lost) by the owner; checking to ensure that the identity card 145 has not been restricted based on the location, type or any other restrictions imposed by the user; verifying that the person meets the minimum identity score requirement of the merchant; checking for any additional restrictions and other like steps.
  • the identity management system 100 can automatically send the credit card information (including the financial transaction information, such as amount of purchase and the like) to the appropriate credit card processing company.
  • the credit card processing company performs the account processing in the conventional manner and returns an answer (e.g., financial transaction is accepted or denied). The answer can be relayed from the identity management system 100 , either directly or indirectly, to the merchant, thus completing the financial transaction.
  • a form of payment can have more than one pass code associated with it.
  • each pass code can impose certain restrictions on a transaction.
  • a parent can enter the form of payment information under the identity account of their child. Using one pass code, the parent can restrict the transaction to a certain dollar amount. However, using another, different, pass code, the parent can increase this spending limit.
  • the child can enter a store and decide to make one or more purchases. During the checkout, the child can use a first pass code to make a purchase which limits the expenditure to only non-alcoholic items under a total of $100.00. However, if the child is stranded and is required to make an emergency transaction that may exceed the $100.00 limit, the child can be provided with an additional emergency pass code, different than the first pass code, that does not impose any limitation on the expenditure.
  • the account number of a form of payment (e.g., a credit card number) stored or otherwise located on the identity card 145 can be designated as a default form of payment with certain restrictions.
  • the default form of payment can be automatically selected from the identity card 145 for the purchase transaction.
  • the user can designate an AMERICAN EXPRESSTM card to be the default form of payment.
  • the default form of payment can also be subject to certain rules, with the rules being the set of restrictions and requirements that the user imposes on the use of the form of payment.
  • the rules for the default form of payment can include, for example, the maximum amount that can be charged for this form of payment, the venues in which the form of payment can be used, the geographical areas in which the form of payment can be used, or any other suitable rule.
  • multiple different default forms of payment can be associated with the identity card 145 , with each default form of payment being used for different purposes.
  • the default form of payment can be the aforementioned AMERICAN EXPRESSTM card.
  • a Visa card can be default form of payment.
  • the rules for the default form of payment associated with an identity card 145 can be establish to use any suitable number of forms of payment (credit cards, debit cards, checks, and the like) for any types of purchases or transactions.
  • multiple pass codes can be entered, so that the purchase or other financial transaction can be divided or otherwise split based on the rules associated with each of the multiple forms of payment stored along with a user's identity profile. For example, if a first credit card has a pass code of 12345 and second credit card has a pass code of 98765, entering a code of 1234598765 would cause the purchase transaction to be performed based on the rules imposed on both credit cards associated with these respective pass codes (e.g., a union or other accumulation of the respective rule sets). Consequently, for purposes of illustration and not limitation, a $5000 transaction can be divided between the credit card assigned to pass code 12345 and credit card assigned to pass code 98765.
  • the purchase transaction split can be specified in the pass code that is entered by the user. For example, a $5000 transaction can be split by assigning $1000 for the pass code 12345 and $4000 for the pass code 98765. The resulting pass code can be entered as, for example, 123451000987654000 or the like.
  • the identity information associated with the identity card 145 can instead be integrated with any other suitable form of payment and/or identification issued by another institution.
  • a credit card issued by a financial institution can be configured to include a user's identity number either on the credit card or associated with the credit card number (e.g., in the financial institution's database), thereby allowing an integration with the identity information available from the identity management system 100 .
  • a user can use a form of payment, such as a credit card, and still have the form of payment checked for all of the restrictions imposed by the user through the identity management system 100 on the particular form of payment.
  • a user applies for a Visa credit card.
  • the issuing bank can associate the user's identity information with the credit card being issued.
  • the user can then impose restrictions on the use of the credit card account through the identity management system 100 (e.g., the credit card cannot be used outside of the United States).
  • the credit card company can check with the identity management system 100 to determine whether there are any restrictions imposed on the purchase transaction for the given credit card. For example, if the credit card cannot be used outside of the United Sates, then an attempt to make a purchase in Taiwan would be rejected.
  • Such integration is not limited to credit cards or other similar forms of payment, but can also be used in association with suitable forms of identification, such as, for example, a social security card.
  • the social security card can be configured to contain or be associated with the identity information of the user, so that the use of social security card number can also be restricted through the identity management system 100 .
  • a user can provide its social security card to a prospective employer without fear of the social security number being stolen or used for fraudulent purposes.
  • the social security number can be used for any purpose, such as, for example, reporting a 1099 Form to the Internal Revenue Service (IRS)
  • the IRS can first check with the identity management system 100 to verify that the user has allowed the use of the social security number by the given employer, thereby ensuring that the employer is not making fraudulent claims.
  • the identity management system 100 can be configured to store the routing number and the bank account number for checks. A user can then assign a rule for use of the check information, and one or more pass codes can be issued to allow use of and access to this check information. For example, during a purchase transaction, a user can enter identification information (e.g., via the identity card 145 ) and the (check) pass code into the merchant's POS system. The identity management system 100 can determine if the purchase transaction satisfies the rule(s) that apply to the use of the check information.
  • a new (i.e., the next) check number can be issued and the check can be verified against the bank account (e.g., to determine if there are sufficient funds).
  • the merchant can receive a verification code or other unique number that can be used for an electronic deposit or electronic funds transfer from the bank account of the user to the bank account of the merchant.
  • a verification code or other unique number can be used for an electronic deposit or electronic funds transfer from the bank account of the user to the bank account of the merchant.
  • Other forms of payment can be maintained by and used in accordance with exemplary embodiments of the present invention.
  • the same process that is used for identifying a user in the United States can be adapted for identifying a user in a foreign country, such as, for example, Germany, using identification documents native to that country (e.g., German identification documents).
  • identification documents native to that country e.g., German identification documents
  • a European Union identification card can be used instead of a social security card for purposes a creating a German user's total identification score.
  • the meaning of the total identification score and/or the meaning of the CONFIDENCE FACTORTM does not change for different geographical regions. For example, when a total identification score of 70 is assigned to a user in the United States, if the same total identification score is assigned to a user in Germany, these two users are considered to be completely equal in their level of identity.
  • the identity card 145 can be used as a type of “global identification card.” As such, a foreign user traveling in the United States and having a total identification score of 70 can be treated equally to a United States citizen with a similar total identification score, regardless of the nationality of the foreign user. For example, providing the user's identity card 145 along with a check as a form of payment can ensure that the transaction is treated equally, regardless of where the user originates from and from which country the check is issued. Since the level of identity of a user can be uniformly ascertainable throughout the world according to exemplary embodiments, any transaction can be performed anywhere as safely as if it were performed in the user's native country.
  • the identity card 145 can be associated with any form of identification or financial information
  • the usage of the identity card 145 anywhere in the world can be tracked for the user and logged for immediate or later access through the identity management system 100 . Consequently, the user can track the usage of the identity card 145 in different geographical locations, thereby providing the user with a global record of not only the use of the user's identity and identification information, but also the user's financial information. Other characteristics or behavior of the user can be tracked in such a manner.
  • the identity card 145 is used for purposes of travel (e.g., as the identity card 145 is swiped or otherwise recorded at identity checkpoints, such as airports or other like points of embarkation and disembarkation), a record of the user's travel can be maintained.
  • identity checkpoints such as airports or other like points of embarkation and disembarkation
  • a record of the user's travel can be maintained.
  • a user's travel both nationally and internationally, can be monitored and logged, thereby allowing the user to track travel with the identity card 145 in different geographical locations. Other such characteristics or behavior can be tracked using the identity card 145 .
  • the identity management system 100 can be based on a distributed model that allows users to maintain and host their identity and related information according to a Global Identification Number (GIN).
  • the GIN can be any suitable form of alpha-numeric or other identifier that is capable of uniquely identifying a user.
  • the distributed model can be implemented through a service called, for example, Global Identity Services (GIS), as discussed below.
  • GIS Global Identity Services
  • the GIS can allow both authoritative and non-authoritative hosting of data and perform information routing based on the GIN.
  • an “authoritative organization” is an entity or other user whose purpose is to securely maintain identity and identity-related data and information that is globally accessible by other entities.
  • the data and information maintained by the authoritative organizations is trusted by other users and is accepted by any user that “joins” or otherwise uses the identity management system 100 .
  • Each of the authoritative organizations would be required to obtain an organizational GIN (OGIN).
  • a “non-authoritative organization” is any other entity or user that chooses to provide limited or no access to identity and identity-related data and information, for example, to maintain the privacy or confidentiality of the data.
  • Such non-authoritative organizations do have the ability to obtain data from (authoritative) partners through the GIS. However, the non-authoritative organizations would not be required to obtain an organizational GIN, unless they choose to share their identity and identity-related data and information with another organization.
  • a primary function of the GIS is to provide a routing mechanism for data stored in various locations.
  • FIG. 7 is a diagram illustrating information routing for GIS, in accordance with an exemplary embodiment of the present invention.
  • an entity requests services (e.g., retrieval of identity information or the like) associated with the identity management system 100
  • the request is first routed to the Local GIS (LGIS) server 705 . If no LGIS server exists, the request is directly sent to the Primary GIS (PGIS) server(s) 710 . Otherwise, if an LGIS server 705 exists, and this server can satisfy the request (e.g., the identity information resides on that LGIS server 705 ), the request is immediately fulfilled.
  • LGIS Local GIS
  • PGIS Primary GIS
  • the request is forwarded to one of the PGIS servers 710 .
  • the PGIS server 710 processing the request finds the Authoritative GIS (AGIS) server 715 associated with the request and sends the request to that server.
  • AGIS Authoritative GIS
  • the AGIS server 715 satisfies the request by, for example, retrieving and returning the requested information to the requesting entity. If the information is not located at the specified AGIS server 715 , an error or other like indication can be returned to the requesting entity (e.g., to indicate that the identity information cannot be located or otherwise retrieved).
  • the LGIS server(s) 705 , PGIS servers 710 and AGIS servers 715 can communicate with each other any suitable type of network or computer connection.
  • the identity management system 100 can conform to and is compatible with the Federation model.
  • a Federation is an association of organizations that come together to exchange information as appropriate regarding their users and resources to enable collaboration and transactions.
  • members of a Federation can easily integrate and use all or parts of the identity management system 100 (or corresponding commerce platform or e-commerce platform) that can enable them to use the services offered by such platforms.
  • FIG. 8 is a diagram illustrating the identity management system 100 distributed platform model, in accordance with an exemplary embodiment of the present invention.
  • a bank 805 is a participating bank that can be responsible for holding the identification information of a member 810 .
  • the member 810 is an individual or entity who desires to have their identity protected.
  • An identity specialist 815 is, for example, a bank agent or the like specially trained to assist the members 810 in creating their global identification account.
  • a local institution global identity (GID) system 820 can include a licensed GID appliance and platform which the banks 805 can use to store identity information of members 810 .
  • the GID appliance can be connected to a GID main processing and routing system 830 so that it can be located by other local GID systems 820 .
  • a local main processor and routing system 825 is the main routing system that can control the local institution GID systems 820 .
  • the main GID system 830 is the global center for all connections between the local institution GID systems 820 and the banks 805 .
  • the users 835 are institutions or the like that can request access to information associated with a member 810 through the network.
  • FIG. 9 is a diagram illustrating an exemplary architecture for the identity management system 100 platform, in accordance with an exemplary embodiment of the present invention.
  • the client can visit the bank 805 and meets with a bank agent, such as an identity specialist 815 , who can assist the client in creating their identity account (and credit card account) to become a member 810 .
  • a bank agent such as an identity specialist 815
  • the member 815 can then use the identity management system 100 to manage their identity account (and/or credit account).
  • the member 815 then can use the identity card 145 to provide access to the users 835 or other institutions to information stored in that account.
  • the information can be accessed in one of several ways.
  • the member 810 can visit a participating merchant. If the member 810 wishes to open an account with the merchant, instead of writing all of the information on the account application, the member 810 can swipe their identity card 145 and enter the corresponding PIN assigned to the identity card 145 .
  • the merchant can send the information provided by the identity card 145 and PIN to the network, which can be routed to the GID main processor (e.g., GID main system 830 ).
  • the GID main processor can use the account information to retrieve and decrypt the relevant identity information and encrypt it with the participating merchant's key.
  • the encrypted identity information can be communicated from the GID main processor to GID transactional processing (e.g., local main processor and routing system 820 ) for the participating merchant.
  • the participating merchant can then use its log-in or other unique identifier to access the identity information to complete the account application.
  • the member 810 can use an automated voice response (VRU) system 905 , a live customer service center or the like to authorize the transfer of identity information.
  • VRU automated voice response
  • the merchant can also access the voice response system or customer service center to obtain the identity information (with the authorization of the member 810 ), in case the identity management system 100 is not available through the direct connection.
  • a secured databank and system can be created by which the identity of individuals or businesses can be managed and accessed.
  • Initial access by the user to the system can be through a bank or other trusted local organization or entity.
  • an identity theft specialist at the bank can receive users who want to subscribe to this system.
  • the identity theft specialist can first educate the customer on the identity management system 100 .
  • the identity theft specialist can ask the user for identification papers, such as a social security card, birth certificate, driver's license, proof of residency (passport, Green Card), proof of domicile, or the like.
  • the identity theft specialist can login to the identity management system 100 (e.g., through graphical user interface 170 ) to create a unique user number.
  • the user can create a PIN. Selection of the PIN can be done by the user without any access by the identity theft specialist. The user must memorize the PIN. For example, if the PIN is lost or forgotten, the user must return to, for example, the bank to have the PIN reset.
  • the identity management system 100 can then create an identity account for that user.
  • the user can also create, for example, a Global Credit Card account or the like, as discussed previously, to allow identity management on a global basis. The user will, for example, have an audit trail of all or substantially all of the transactions that occur on the Global Credit Card account and the associated stored cards. Coupled with the alert system, the user can track any transaction charged to their account.
  • a separate card with a credit card number can be issued to the user.
  • the user can program, for example, all of the user's credit card accounts onto this card through access to the identity management system 100 (e.g., via graphical user interface 170 ).
  • the user can additionally limit the use of each credit card (or other cards) by placing limits or other restrictions on each card, as discussed previously.
  • An identity card 145 holding the unique user number can be mailed to that user's address (or to the bank, if user wishes).
  • the user can then have access to the user's identity and credit card accounts maintained by the identity management system 100 . Initially, when the user logs in to their account, the user can use the card number for a login name and the PIN for a password. However, once access to the user's identity account in the identity management system 100 has been obtained, the user can change their login name password to any unique login name and password.
  • the user can have many options. For example, the user can receive alerts, for example, regarding their identity use or improper uses thereof.
  • the user can receive requests for identity authorizations, such as, for example, requests for the use of the user's identity.
  • the identity account can also allow the user to monitor identity account activity, monitor credit card activity, make and/or receive credit card payments, and any other identity- and financially-related transactions, such as, for example, prepaid cards, gift cards, debit cards, ATM cards and the like.
  • the identity management system 100 can also allow the user to input credit card information. For each credit card number, the user can choose a unique PIN, with the PIN for each credit card being different from the PIN used for identity access purposes.
  • the user need only carry a Global Identity Credit Card (e.g., identity card 145 ) instead of several different cards, such as, for example, credit cards, debit cards, gift cards, ATM cards and the like.
  • a Global Identity Credit Card e.g., identity card 145
  • the Global Identity Credit Card can be used along with the PIN associated with one stored credit card to make transactions with the given credit card transaction.
  • the user can user one or more credit cards for the transaction, based on the sequence of PIN numbers entered.
  • the vendor will not have access to the actual credit card number.
  • the identity system management 100 can also support ACH/EFT (Automatic Clearing House/Electronic Funds Transfer).
  • An alert system can be associated with the use of the Global Identity Credit Card and the associated stored cards. For example, when a purchase takes place, an alert can be sent to the user's alert receiving device (e.g., mobile phone, PDA, e-mail or the like) about the occurrence of a transaction. Such an alert can further include suitable accompanying information, such as, for example, amounts, merchant identification, location and other like information.
  • the user when applying for a mobile phone plan, can use the Global Identity Credit Card number.
  • the user can authorize the identity management system 100 to reveal required identity and financial information to the business, for example, once or for a limited time.
  • authorized persons at the business or stationed at the headquarter of the mobile phone company can have viewing privileges for the identity and financial information, but their access is recorded.
  • the identity management system 100 can also provide credit status to a requesting party as well.
  • the identity management system 100 can establish a network or computer connection to a credit reporting agency to retrieve a user's credit report. Each time a credit report is retrieved from the credit reporting agency, the corresponding credit history, credit score and the access can be recorded for the user to review.
  • credit card transactions can go through the identity management system 100 . Consequently, limits on the credit card(s) can be applied and each transaction can be recorded, thereby ensuring the identity and financial safety of each transaction.
  • a default system can be available. For example, when no PIN is entered, a specified default credit card can be charged.
  • restrictions such as, for example, amount, geographic or vendor type, can be placed on the default credit card. For example, the default credit card without a PIN could only be used in, for example, restaurants.
  • a CONFIDENCE FACTORTM can also be assigned to each user. For example, the longer the user remains with the identity management system 100 , and based on the authenticity of the documents the user presented to the identity theft specialist at the bank, the user's CONFIDENCE FACTORTM can be increased. As noted previously, the CONFIDENCE FACTORTM can be used as an additional or alternative measure of the validity of a user's identity.
  • a one-time use PIN can be generated for a credit card maintained in the identity management system 100 , thereby not comprising the original PIN.
  • the one-time use PIN can be retrieved from identity management system 100 during the online transaction (e.g., at time of payment).
  • a PIN can be generated periodically (e.g., at predetermined intervals) for a user and sent to, for example, the mobile phone, PDA, pager, e-mail address or the like of the user. The user then does not need to access the identity management system 100 each time a one-time use PIN is required.
  • the identity management system 100 can also functions as a fund transfer system for, for example, on line auctions or other transactions. For example, buyers and sellers can communicate through the identity management system 100 and transfer funds by credit card or check, because the identity of each user is established and verified in the identity management system 100 . If users provide or otherwise authorize distribution of their CONFIDENCE FACTORTM to other users, the CONFIDENCE FACTORTM can also assist in the decision making of each party.
  • any or all information maintained or otherwise stored in, for example, databases in the identity management system 100 can be encrypted using any suitable encryption technique.
  • information and data stored in the identity management system 100 databases can be stored using a double encryption system.
  • a double encryption system operates in a manner similar to a safety deposit box, where the owner of the box has one key and the bank has another and both keys are required for the information to be unlocked.
  • the identity information stored in the identity management system 100 database can be encrypted by a first key that the identity management system 100 maintains, and also by a second key that the user maintains. Both encryption keys would be needed before the identity information can be decrypted and viewed. Such encryption can ensure that the data stored will be secure from hackers and other malicious attacks. Such encryption techniques can further ensure that even if the information or data was hacked, such information could not be decrypted without the presence of both the identity management system 100 key and the user's key. Additionally, the key maintained by the identity management system 100 can also change per record or otherwise periodically to ensure further security.
  • the identity management system 100 can also be used for e-commerce transactions or other purchase transactions.
  • the identity management system 100 can include a transaction order generation module 150 in communication with, for example, the total identification score generation module 115 .
  • the transaction order generation module 150 can be configured to generate a transaction or purchase order using the total identification score of the user. For example, before making a purchase, either online or in person, the user can generate a transaction order using the transaction order generation module 150 (e.g., by logging into the identity management system 100 and making such a request). When making a purchase, instead of using its credit card and personal information, the user can submit the transaction order to perform the transaction. The merchant or other third party can then use the transaction order to gain access to the total identification score, financial information (e.g., credit card number) and personal information (e.g., billing address of the user) to complete the transaction in the manner discussed previously on behalf of the user.
  • financial information e.g., credit card number
  • personal information e.g., billing address of the user
  • the transaction order can contain an identity access authorization code by which the third party can gain access to the identity management system 100 to retrieve the relevant information.
  • the user can specify different types of restrictions on the use of the user's information maintained by the identity management system 100 .
  • the user when generating the transaction order, the user can specify, for example, that the transaction order can only be used by a certain third party to perform a certain type of transaction. The third party would then only be able to access the information to which the third party has been restricted.
  • the information retrieved by the third party is maintained by the third party temporarily to conduct the transaction, but then discarded after the transaction is complete.
  • temporal restrictions can be placed on the information retrieved by the third party using the transaction order, thus limiting the amount of time by which the third party can successfully access and use the user's information.
  • the third party can be restricted to receive only the funds authorized for the transaction.
  • the identity management system 100 can be used to conduct the actual transaction on behalf of the third party.
  • the website can send the information to the identity management system 100 .
  • the identity management system 100 can then verify the payment information associated with the identity card 145 and pass code, including all of the rules specified for the use of the particular form of payment (other types of verification can also be performed, such as verifying that sufficient funds are available for the form of payment).
  • the manager or other proprietor of the website can receive an authorization number that can be used to receive the payment from the identity management system 100 (e.g., through an electronic funds transfer or the like).
  • FIGS. 10A and 10B are flow diagrams illustrating a transaction 1000 using an automated pre-authorization process for the identity management system 100 without using a one-time card number, in accordance with an exemplary embodiment of the present invention.
  • the transaction 1000 can involve a vendor 1002 , a cart 1004 , a client 1006 , an API 1008 and the identity management system 1010 .
  • the vendor 1002 may or may not sign up with the GID network.
  • the vendor 1002 can download the GID e-commerce API.
  • the vendor 1002 can integrate the GID e-commerce API into the e-commerce website of the vendor 1002 .
  • the client 1006 can register for a GID card (e.g., identity card 145 ).
  • the client 1006 can store their other cards in association with their GID card using the identity management system 100 .
  • step 1022 the client 1006 navigates a suitable web browser to a website of the vendor 1002 to make a purchase (these examples are also applicable to, for example, at POS self-checkout counters).
  • step 1024 the client can make any and all required purchases and then prepare for checkout.
  • the client 1006 can enter the number of its identity card 145 , name, billing address, and other like information.
  • step 1028 the vendor 1002 can recognize the entered number as an identity card 145 number that belongs to the identity management system 100 , and the cart 1004 of the vendor 1002 can pass the cart information to the API 1008 .
  • the API 1008 can return a unique URL to the vendor 1002 .
  • the cart 1004 of the vendor 1002 can present a link or button to the client 1006 called, for example, “Pre-Authorize Order.”
  • the client 1006 can click on the “Pre-Authorize Order” link to pre-approve the on-line transaction and access his/her stored credit cards maintained on the identity management system 100 (e.g., where the user has stored his/her credit cards with restrictions applied to them, and the like).
  • the client 1006 can securely log onto the identity management system 100 .
  • the secured login process can include, for example, User ID, pre assigned security questions, encryption keys, pre-assigned pictures, passwords and the like.
  • the transaction information can be retrieved by the identity management system 100 and verified from the presented link.
  • the pre-authorization can be presented to the client 1006 .
  • the client 1006 can choose to assign the transaction to the identity card 145 or another credit card registered with the system.
  • the client 1006 can submit the pre-approval by clicking on, for example, an “Approve” link or button.
  • the identity management system 1046 can store the pre-authorization information in the system.
  • the client 1006 can exit the identity management site and return to the cart 1004 .
  • the client 1006 can complete the purchase through the vendor 1006 site by clicking on a, for example, “Submit Order” button or the like.
  • the transaction request can be transferred from the cart 1004 through the network to the identity management system 100 (which supports the transaction).
  • the identity management system 100 can receive the transaction.
  • the transaction can be matched against the pre-authorization transaction. From the decision step 1058 , if the transferred transaction matches the pre-approved transaction (including any the limitations and filtrations such as time, geography, and the like), the transaction can be approved in step 1060 and the results can be sent back to the vendor 1002 . Otherwise, in step 1062 , the order or transaction can be rejected and the client 1006 can be given an opportunity to repeat the process.
  • FIGS. 11A and 11B are flow diagrams illustrating a transaction 1100 using an automated pre-authorization process for the identity management system 100 using a one-time card number, in accordance with an exemplary embodiment of the present invention.
  • the flow of the transaction 1100 can follow the steps 1012 - 1044 of FIGS. 10A and 10B .
  • the identity management system 100 can generate a one-time use credit card number or the like.
  • the client 1006 can choose which card to charge the transaction to, and the client 1006 can also select to have a one-time temporary credit card number to be generated.
  • the identity management system 100 can then generate a one-time use, temporary credit card number (including, for example, expiration and CVV numbers) or other suitable payment information for the client 1006 .
  • the flow of transaction 1100 can continue with steps 1046 and 1048 as discussed previously with respect to FIG. 10B .
  • the client 1006 can copy or otherwise enter the generated one-time use credit card number in the credit card number field of the vendor 1006 site (or it can be entered automatically by the system).
  • the transaction 1100 can then be completed in steps 1052 - 1062 in the manner discussed previously with respect to FIG. 10B . Once the transaction 1100 is completed, the one-time use credit card number becomes invalid and no longer usable in future transactions.
  • POS Point-of-Sale
  • the user can receive a request in the form of, for example, a call on his/her mobile phone (PDA, or any other electronic device) from the identity management system 100 .
  • the request can provide the user with a choice of approving or not approving the transaction. For example, in the case of the request going through a mobile phone, the user can enter “1” for approving transaction and “2” for declining transaction.
  • the transaction request can then transferred through the network to the identity management system 100 . If the transferred transaction matches the pre-approved transaction (including any limitations and filtrations such as time, geography, and the like), the transaction can be approved and the results can be sent back to the merchant.
  • the pre-approved transaction including any limitations and filtrations such as time, geography, and the like
  • the identity management system 100 can be used as a commerce or e-commerce platform that can provide users and/or merchants per transaction insurance coverage.
  • FIG. 14 is a diagram illustrating insurance coverage using the identity management system 100 , in accordance with an exemplary embodiment of the present invention.
  • the per transaction insurance coverage can include a suitable insurance underwriter 1405 , the identity management system 100 , a vendor 1410 and a consumer 1415 .
  • the identity management system 100 in conjunction with the insurance underwriter 1405 can underwrite the per transaction activity.
  • a per transaction insurance coverage can be calculated in many different ways.
  • the coverage and rates can be based on the number of transactions the consumer 1415 makes, the number of transactions a vendor 1410 receives, the dollar amount of the transaction, the fraud risk associated with the purchased item, the fraud risk associated with the consumer 1415 habits, and other like information.
  • the purpose of the insurance can be for, for example, identity theft fraud, credit card fraud, damaged merchandise, or the like.
  • the identity management system 100 can be underwritten by an insurance company to provide per transaction insurance to consumers 1415 and/or vendors 1410 . If the consumer 1415 uses the identity card 145 for identity verification and/or for another transaction at or with the vendor 1410 , the given transaction can be insured by the identity management system 100 . For being insured, a suitable fee can be charged to every transaction. Such a fee can be paid by the vendor 1410 and/or the consumer 1415 . Alternatively, neither party pays such a fee and the cost can be offset by other income, charges, fees, or the like.
  • the consumer 1415 can purchase an item (e.g., on-line or POS) from the vendor 1425 .
  • the vendor 1410 can submit the transaction to the identity management system 100 .
  • the identity management system 100 can authorize and/or insure the transaction, based suitable criteria.
  • the vendor 1410 can receive the response to the transaction submission, along with, for example, an authorization number.
  • the consumer 1415 can be provided with a receipt (e.g., a paper receipt or electronic notification).
  • a deposit can be made to the insurance underwriter 1405 for the transaction.
  • a fraud can be declared in step 1470 .
  • the consumer 1415 , the vendor 1410 or the identity management system 100 can determine that a fraud has occurred (e.g., an unauthorized charge made on a credit card) in any suitable manner. If a fraud has occurred, then the identity management system 100 can be appropriately notified in step 1475 .
  • the identity management system 100 can reimburse the vendor against any, all or none of the back charges in step 1460 .
  • the identity management system 100 can suitably cover any, all or none of the costs associated with the theft or fraud associated with the consumer 1415 .
  • FIG. 15 is a diagram illustrating on-line gambling transactions with the identity management system 100 , in accordance with an exemplary embodiment of the present invention. As illustrated in FIG.
  • a consumer 1505 attempts to use a non-GID credit card (e.g., a credit card not associated with the identity management system 100 ) for an on-line gambling company 1510 (see flow 1525 )
  • the MCC of the on-line gambling company 1510 would be passed to the credit card issuing entity 1515 (see flow 1530 ).
  • the credit card issuing company 1515 can deny the transaction, because the MCC of the on-line gambling company 1510 is blocked (see flow 1535 ).
  • the MCC of the identity management system 100 can be used instead of that of the vendors. Therefore, consumers 1505 can use their credit cards without unwanted restrictions. For example, assume that the consumer 1505 visits an on-line merchant (e.g., on-line gambling company 1510 ) whose MCC is blocked by the consumer 1505 credit card issuing entity 1515 . If the consumer 1505 uses their Global Identity Credit Card (e.g., identity card 145 ) (see flow 1540 ) to, for example, subscribe to an on-line gambling site, the MCC that will be presented to the credit card issuing entity 1515 will be the MCC of the identity management system 100 .
  • an on-line merchant e.g., on-line gambling company 1510
  • identity card 145 e.g., identity card 145
  • the on-line gambling company 1510 can communicate the transaction information with the identity management system 100 (see flow 1545 ).
  • the identity management system 100 can then pass the transaction information and the MCC of the identity management system 100 to the credit card issuing entity 1515 (see flow 1550 ).
  • Approval for the transaction can then be passed back from the credit card issuing entity 1515 to the identity management system 100 (see flow 1555 ), and from the identity management system 100 to the on-line gambling company 1510 (see flow 1545 ) to complete the transaction.
  • the MCC of the identity management system 100 would not be blocked, the transaction can occur and be processed.
  • the identity management system 100 the user can enjoy a high level of security. Because users can manage, control and set restrictions on their stored accounts, the users can substantially reduce the incidence of credit card and/or identity fraud.
  • FIGS. 12A and 12B are flow diagrams illustrating a transaction 1200 using an automated pre-authorization process for the identity management system 100 without registration and without using a one-time card number, in accordance with an exemplary embodiment of the present invention.
  • vendors 1002 can download and integrate the appropriate e-commerce APIs into their commerce websites, as discussed with respect steps 1012 - 1016 of FIGS. 10A and 11A .
  • a credit card issuing entity 1210 can become a member of the identity management system 100 .
  • the credit card issuing entity 1210 can integrate the identity management system 100 into their systems.
  • client 1006 of the member credit card issuing entity 1210 shops on-line.
  • the transaction can continue in the manner discussed in steps 1022 - 1034 with respect to FIGS. 10A and 11A .
  • client 1006 can enter their GID card number (this time issued by the credit card issuing entity 1210 ) to use the transaction Pre-Authorization.
  • the vendor 1002 can recognize the GID card number and can send the information to the GID API.
  • the GID API can send the vendor a unique URL to present the Pre-Authorization link to the client 1006 (the link can be either pre-stored in the API or the API can be configured to request the link from a secure connection to the identity management system 100 ).
  • the client 1006 can follow a secure login protocol to reach the identity management system 100 (through the credit card online management system of the credit card issuing entity 1210 ).
  • the client 1006 can securely log into the credit card online management system of the credit card issuing entity 1210 .
  • the transaction information can be retrieved and verified from the presented link, as discussed with respect to step 1038 illustrated in FIGS. 10B and 11A .
  • the pre-authorization can be presented to the client from the credit card online management system of the credit card issuing entity 1210 .
  • step 1044 the flow continues to step 1044 if either the credit card issuing entity has no multi-card capability or if step 1042 is successfully completed.
  • the process can then continue in steps 1046 - 1062 in the manner discussed previously with respect to FIGS. 10B and 11B .
  • the submitted order can be cross referenced with the information stored at the identity management system 100 to verify the pre-authorization.
  • the order or transaction can then be verified or rejected based on whether there is a match with the pre-authorization information stored at the identity management system 100 .
  • FIGS. 13A and 13B are flow diagrams illustrating a transaction 1300 using an automated pre-authorization process for the identity management system 100 without registration but using a one-time card number, in accordance with an exemplary embodiment of the present invention.
  • the transaction 1300 proceeds with steps 1012 - 1034 in the manner discussed previously with respect to FIGS. 10A , 11 A and 12 A.
  • steps 1215 and 1220 are not executed for transaction 1300 , as no registration takes place by the credit card issuing entity 1210 .
  • the flow of transaction 1300 then proceeds through step 1225 , 1038 , 1230 , 1235 and 1042 , in the manner discussed with respect to FIG. 12A .
  • the client can take the temporary credit card number and enter it in the appropriate space on the vendor 1006 check-out page (or it can be entered automatically by the system) and click on the submit link to finalize the transaction.
  • the flow of transaction 1300 can then proceed through steps 1048 , 1110 and 1052 - 1062 , as discussed with respect to FIG. 11B , so that the order or transaction can then be verified or rejected based on whether there is a match with the pre-authorization information stored at the identity management system 100 .
  • the identity management system 100 of the present invention can also be used to combat mail fraud to which the user may fail prey.
  • the identity management system 100 can include an address identification code generation module 155 in communication with, for example, the total identification score generation module 115 .
  • the address identification code generation module 155 is configured to generate an address identification code associated with an address of the user.
  • a user of the identity management system 100 can establish an address (e.g., the user's home address) and the identity management system 100 will generate a unique address identification code associated with that address.
  • the address identification code can be any suitable number (e.g., a random number, code or the like) that uniquely identifies a user and the user's associated address.
  • the address identification code generation module 155 can generate a unique address identification code such as, for example, 187653 that represents the user's address.
  • the address identification code and an address of a communication reception center can be given to a third party.
  • the address information could be 123 Processing Street, Box 187653, New City, Utah 54321, in which the address identification code forms the box number of the address of the communication reception center. Any communications sent to the user at that address by the third party are received at the communications reception center.
  • the communications can be scanned or otherwise entered into the identity management system 100 and made available to the user associated with the address identification code.
  • the identity management system 100 can include a communication display module 160 in communication with, for example, the total identification score generation module 115 .
  • the communication display module 160 is configured to format the communications for display to the user associated with the address identification code (e.g., through the graphical user interface 170 ).
  • the user can be notified of incoming mail (e.g., through electronic notification, such as e-mail) and access its mail, for example, remotely over the Internet by logging into the identity management system 100 and retrieve any and all communications received at the communication reception center.
  • the identity management system 100 can also be used to prevent healthcare identity theft.
  • a patient can go to the healthcare provider.
  • the administrator can enter the patient's drivers license or other unique identifying documentation into the identity management system 100 , as well as any other required patient's personal information, billing information, scheduling and the like.
  • access to identity management system 100 can be granted to authorized administrators.
  • Each authorized administrator can have a unique PIN for accessing identity information in the identity management system 100 .
  • all accesses can be recorded and logged for security purposes.
  • the identity management system 100 can be integrated with other suitable systems to retrieve, for example, other healthcare-related information and the like.
  • a unique identifying number can be assigned to the patient that is maintained by the identity management system 100 .
  • the identifying number can be associated with an appropriate barcode.
  • the identifying number and barcode can be placed on a card for the patient to maintain. During future visits, the patient can present the card to sign-in with the healthcare provider.
  • the patient's identification information and healthcare information can be maintained securely in the identity management system 100 . Consequently, secure identity information will not have to be included in the patient's physical or electronic files.
  • the patient's physical file can be assigned a barcode that correlates to the patient's unique identifying number to allow for easy retrieval from the healthcare provider's file room.
  • the healthcare provider can then store patient files without concerns for information theft.
  • Such a system can also place the healthcare providers in compliance with HIPAA regulations, because the patient's secure identity information has been removed from the files, thereby preserving patient identity privacy.
  • the identity management system 100 can include an identity risk factor generation module 165 in communication with, for example, the total identification score generation module 115 .
  • the identity risk factor generation module 165 is configured to generate an identity risk factor associated with the user.
  • the identity risk factor is associated with a level of risk of theft of the identity of the user by identity thieves.
  • the identity risk factor generation module 165 is configured to determine the exposure of a user's identity by analyzing such factors as, for example, the number and types of uses of the user's identity.
  • the identity risk factor generation module 165 can determine that the level of risk of theft of the user's identity is high, and can generate a correspondingly high identity risk factor. However, if a user uses its identity only sporadically to apply for credit with reputable financial institutions, the identity risk factor generation module 165 can determine that the level of risk of theft of the user's identity is low, and generate a correspondingly low identity risk factor. Thus, by analyzing the pattern and types of uses of a user's identity (e.g., as maintained by the log module 135 ), the identity risk factor generation module 165 can generate an appropriate identity risk factor. The user can then use the identity risk factor to reduce its exposure to potential identity theft by, for example, modifying the manner and types of uses of the user's identity.
  • the identity management system 100 can also include any suitable type of graphical user interface 170 configured to provide access to, either locally or remotely, and management of identification information associated with the user.
  • the graphical user interface 170 can be, for example, any suitable Web browser that can support secure connections and remote access to the identity management system 100 .
  • the graphical user interface 170 can be displayed on any suitable computer display or monitor capable of displaying graphical and/or textual information to a user and which allows a user to enter information (e.g., commands, information and the like) through, for example, a keyboard, a touch-screen, any type of pointing device, electronic pen, and the like.
  • the graphical user interface 170 can be used by the user to access, control and manage any and all of the functionality of the identity management system 100 , including viewing and managing the user's identity profile, viewing identity reports, and the like.
  • the identity management system 100 can be comprised of a microprocessor and associated memory that stores the steps of a computer program to perform the functions of the modules of the identity management system 100 .
  • the microprocessor can be any suitable type of processor, such as, for example, any type of general purpose microprocessor or microcontroller, a digital signal processing (DSP) processor, an application-specific integrated circuit (ASIC), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically-erasable programmable read-only memory (EEPROM), a computer-readable medium, or the like.
  • DSP digital signal processing
  • ASIC application-specific integrated circuit
  • PROM programmable read-only memory
  • EPROM erasable programmable read-only memory
  • EEPROM electrically-erasable programmable read-only memory
  • the memory can be any suitable type of computer memory or any other type of electronic storage medium, such as, for example, read-only memory (ROM), random access memory (RAM), cache memory, compact disc read-only memory (CDROM), electro-optical memory, magneto-optical memory, or the like.
  • ROM read-only memory
  • RAM random access memory
  • CDROM compact disc read-only memory
  • electro-optical memory magneto-optical memory, or the like.
  • the memory can be programmed using conventional techniques known to those having ordinary skill in the art of computer programming.
  • the actual source code or object code of the computer program can be stored in the memory.
  • FIGS. 2A-2C are flowcharts illustrating steps for verifying an identity of a user, in accordance with an exemplary embodiment of the present invention.
  • step 201 of FIG. 2A at least one source of identification of the user is received.
  • the at least one source of identification can comprise a driver's license of the user, a birth certificate of the user or the like.
  • the identification score assigned to each of the at least one source of identification is based upon a reliability of the at least one source of identification.
  • an identification score is assigned to each of the at least one source of identification.
  • a total identification score of the user is generated from the identification scores of each of the at least one source of identification and a predetermined function.
  • the predetermined function can comprise a summing function, a weighted summing function or the like.
  • the total identification score of the user is associated with a level of verification of the identity of the user.
  • the total identification score of the user is compared to a minimum identification score associated with a transaction.
  • the transaction can comprise an application for credit, a purchase transaction or the like.
  • the transaction is performed when the total identification score of the user is one of greater than and equal to the minimum identification score. Additional sources of identification of the user are received before performing the transaction when the total identification score is less than the minimum identification score.
  • step 210 at least one of personal information and financial information of the user can be supplied to a third party.
  • the total identification score can be associated with the at least one of personal information and financial information of the user.
  • a unique identity access authorization code associated with the user can be generated for use by a third party in the transaction.
  • step 216 at least the total identification score of the user can be transmitted to the third party upon verification of the identity access authorization code.
  • At least the total identification score of the user can be transmitted to the third party upon further verification of a user identification code of the user.
  • the user identification code can comprise a social security number of the user or the like.
  • step 219 accesses associated with the total identification score of the user by the third party can be recorded.
  • an identity card securely containing identification information associated with the user can be issued.
  • the identity card can comprise a smart card or the like.
  • the identification information associated with the user can be encrypted on the identity card.
  • uses of the identification information securely contained on the identity card can be restricted.
  • the uses of the identification information can be restricted in many ways.
  • FIG. 3 is a flowchart illustrating steps for restricting uses of identification information securely contained on an identity card, in accordance with an exemplary embodiment of the present invention.
  • locations of where the identification information is used can be restricted.
  • times of when the identification information is used can be restricted.
  • types of transactions for which the identification information is used can be restricted.
  • an address identification code can be associated with an address of the user.
  • the address identification code and an address of a communication reception center can be supplied to a third party.
  • communications for the user can be received from the third party at the communication reception center.
  • the communications can include the address identification code, for example, as part of the address on the communications.
  • the communications can be supplied to the user associated with the address identification code.
  • an identity risk factor associated with the user can be supplied. The identity risk factor is associated with a level of risk of theft of the identity of the user by identity thieves.
  • step 425 the transaction is approved when the total identification score of the user is one of greater than and equal to the minimum identification score.
  • step 430 additional sources of identification of the user are requested before approving the transaction when the total identification score is less than the minimum identification score.
  • FIG. 5 is a flowchart illustrating steps for verifying an identity of a user, in accordance with an alternative exemplary embodiment of the present invention.
  • step 505 at least one source of identification of the user is received.
  • step 510 an identification score is assigned to each of the at least one source of identification.
  • step 515 a total identification score of the user is generated from the identification scores of each of the at least one source of identification and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user.
  • approval of the transaction is received when the total identification score of the user is one of greater than and equal to a minimum identification score.
  • step 525 a request for additional sources of identification of the user is received before receiving approval of the transaction when the total identification score is less than the minimum identification score.
  • any or all of the steps of a computer program as illustrated in FIGS. 2A , 2 B, 2 C and 3 - 6 for identity verification and management can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions.
  • a “computer-readable medium” can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
  • the computer readable medium can be, for example but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device, or propagation medium.
  • the computer-readable medium can include the following: an electrical connection having one or more wires, a portable computer diskette, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, and a portable compact disc read-only memory (CDROM).
  • RAM random access memory
  • ROM read-only memory
  • EPROM or Flash memory erasable programmable read-only memory
  • CDROM portable compact disc read-only memory
  • Exemplary embodiments of the present invention can be used in conjunction with any device, system, process or transaction in which the reliability and authenticity of the identification information associated with a user is needed.
  • exemplary embodiments can be used by financial institutions as part of various types of financial transactions (e.g., applications for credit), by retail establishments as part of various types of purchase transactions (e.g., online or in-person merchandise purchases using credit cards), by credit reporting agencies to maintain, manage and verify the identity of users in conjunction with the maintenance of the credit history of a user, and the like.

Abstract

A system for verifying the identity of a user includes an identification score assignment module configured to receive at least one source of identification of the user and to assign an identification score to each of the at least one source of identification. The system includes a total identification score generation module, in communication with the identification score assignment module, configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user, and compared to a minimum identification score associated with a transaction. The transaction is performed when the total identification score of the user is greater than or equal to the minimum identification score.

Description

  • This application is a continuation of U.S. patent application Ser. No. 11/295,516, filed on Dec. 7, 2005, which claims priority under 35 U.S.C. §119(e) to U.S. Provisional Application No. 60/633,419, filed on Dec. 7, 2004, and to U.S. Provisional Application No. 60/697,991, filed on Jun. 12, 2005, the entire contents of each of which are hereby incorporated by reference herein.
  • BACKGROUND
  • 1. Field of the Invention
  • The present invention relates to identity theft protection systems. More particularly, the present invention relates to a system and method for identity verification and management.
  • 2. Background Information
  • Identity theft is considered one of the fastest growing crimes in the United States. For example, between 2002 and 2003, the number of reported cases of identity theft grew 80 percent. In 2002 alone, nearly ten million cases of identify theft were reported. Nearly one in 8 United States adults have fallen victim to identity theft in the last five years. On average, identify theft will cost a victim approximately $1,000 in expenses to rectify the damage caused to their financial accounts and reputations. The yearly costs of identity theft are enormous, costing business approximately $48 billion and individuals approximately $5 billion.
  • Identity thieves can operate in a number of ways. With the spread of the Internet and the increases in computer processing technology, access to personal and financial information of individuals (through both legal and illegal means) has become far easier and more prevalent. Other more conventional techniques include stealing credit card numbers and using those numbers to create new credit cards under false names. Job applications, personnel records and employment data that should be confidential can instead be stolen by thieves who use the information to steal workers' identities. A person's social security number can be stolen and used by the criminal to apply for credit. Once the identification is stolen and credit is issued, the identity thief can use the credit in an unrestricted manner. Typically, the victim of the identity theft may not learn of the theft until many weeks or months after the crime has occurred, for example, not until the next credit card statement is received.
  • Much of identity theft occurs because an individual cannot control how and who uses their identity and, consequently, their credit. The problem of identity theft also applies to companies and other like entities whose identities are also at risk, such as financial institutions, retail stores and the like. For example, a criminal company can pretend to represent a reputable company and use the reputable company's stolen identity for financial gain. For example, a fraudulent mortgage company could pretend to represent a reputable and established Bank to steal money from unsuspecting individuals, to the financial and reputational detriment of both the individuals and the Bank.
  • SUMMARY OF THE INVENTION
  • A system and method are disclosed for identity verification and management. In accordance with exemplary embodiments of the present invention, according to a first aspect of the present invention, a system for verifying an identity of a user includes an identification score assignment module. The identification score assignment module is configured to receive at least one source of identification of the user. The identification score assignment module is configured to assign an identification score to each of the at least one source of identification. The system includes a total identification score generation module in communication with the identification score assignment module. The total identification score generation module is configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user. The total identification score of the user is compared to a minimum identification score associated with a transaction. The transaction is performed when the total identification score of the user is one of greater than and equal to the minimum identification score. Additional sources of identification of the user are received before performing the transaction when the total identification score is less than the minimum identification score.
  • According to the first aspect, the at least one source of identification can comprise a driver's license of the user. According to an alternative exemplary embodiment of the first aspect, the at least one source of identification can comprise a birth certificate of the user. The identification score assigned to each of the at least one source of identification can be based upon a reliability of the at least one source of identification. The predetermined function can comprise, for example, a summing function, a weighted summing function or the like. The system can include a data storage device. Personal information and/or financial information of the user can be stored in the data storage device. The total identification score can be associated with the personal information and/or financial information of the user. The system can include an access code generation module. The access code generation module can be configured to generate a unique identity access authorization code associated with the user for use by a third party to access information associated with the user. The system can include a data transmission module. The data transmission module can be configured to transmit at least the total identification score of the user to the third party upon verification of the identity access authorization code. The data transmission module can be configured to transmit at least the total identification score of the user to the third party upon further verification of a user identification code of the user. The user identification code can comprise a social security number of the user.
  • According to the first aspect, the system can include a log module. The log module can be configured to record accesses associated with the total identification score of the user by the third party. The system can include a report generation module. The report generation module can be configured to generate reports for displaying the record of accesses associated with the total identification score of the user. Personal information and/or financial information associated with the user can be transmitted to the third party upon verification of the identity access authorization code. The personal information and/or financial information associated with the user can be transmitted to the third party upon further verification of a user identification code of the user. The user identification code can comprise a social security number of the user. The system can include an identity card. The identity card can be configured to securely contain identification information associated with the user. The identity card can comprise, for example, a smart card. The identification information associated with the user can be encrypted on the identity card. Uses of the identification information securely contained on the identity card can be restricted by the user. Locations of where the identification information is used can be restricted by the user. Times of when the identification information is used can be restricted by the user. Types of transactions for which the identification information is used can be restricted by the user. Use of the identification information for the transaction can be prohibited when the identification information is restricted by the user for the transaction. The identification information for the transaction can be used when the identification information is not prohibited by the user for the transaction.
  • According to the first aspect, the system can include a transaction order generation module. The transaction order generation module can be configured to generate a transaction order using the total identification score of the user. The transaction order can be submitted by the user to perform the transaction. Personal information and/or financial information of the user can be accessed, using the transaction order, to complete the transaction. The system can include an address identification code generation module. The address identification code generation module can be configured to generate an address identification code associated with an address of the user. The address identification code and an address of a communication reception center can be supplied to a third party. Communications for the user from the third party can be received at the communication reception center. The communications can include the address identification code. The system can include a communication display module. The communication display module can be configured to display the communications to the user associated with the address identification code. The system can include an identity risk factor generation module. The identity risk factor generation module can be configured to generate an identity risk factor associated with the user. The identity risk factor can be associated with a level of risk of theft of the identity of the user by identity thieves. According to exemplary embodiments of the first aspect, the transaction can comprise, for example, an application for credit, a purchase transaction or the like. The system can include a graphical user interface. The graphical user interface can be configured to provide access to and management of identification information associated with the user.
  • According to a second aspect of the present invention, a system for verifying an identity of a user includes a receiver module configured to receive at least one source of identification of the user. The system includes an identification score assignment module configured to assign an identification score to each of the at least one source of identification. The system includes an identification score generation module configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user. The system includes a comparator module configured to compare the total identification score of the user to a minimum identification score associated with a transaction. The system also includes a transaction approval module. The transaction approval module is configured to generate an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score. The transaction approval module is configured to generate a request for additional sources of identification of the user before generating the approval of the transaction when the total identification score is less than the minimum identification score.
  • According to a third aspect of the present invention, a system for verifying an identity of a user includes an identification score assignment module configured to receive at least one source of identification of the user, and configured to assign an identification score to each of the at least one source of identification. The system includes a total identification score generation module configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user. The system also includes an approval receiver module. The approval receiver module is configured to receive an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score. The approval receiver module is configured to receive a request for additional sources of identification of the user before receiving the approval of the transaction when the total identification score is less than the minimum identification score.
  • According to a fourth aspect of the present invention, a system for verifying an identity of a user includes a receiver module configured to receive a total identification score of the user. The total identification score is generated from identification scores assigned to each of at least one source of identification of the user and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user. The system includes a comparator module configured to compare the total identification score of the user to a minimum identification score associated with a transaction. The system includes a transaction approval module. The transaction approval module is configured to generate an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score. The transaction approval module is configured to generate a request for additional sources of identification of the user before generating the approval of the transaction when the total identification score is less than the minimum identification score.
  • According to a fifth aspect of the present invention, a method of verifying an identity of a user includes the steps of: a.) receiving at least one source of identification of the user; b.) assigning an identification score to each of the at least one source of identification; and c.) generating a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user. The total identification score of the user is compared to a minimum identification score associated with a transaction. The transaction is performed when the total identification score of the user is one of greater than and equal to the minimum identification score. Additional sources of identification of the user are received before performing the transaction when the total identification score is less than the minimum identification score.
  • According to the fifth aspect, the at least one source of identification can comprise a driver's license of the user. According to an alternative exemplary embodiment of the fifth aspect, the at least one source of identification can comprise a birth certificate of the user. The identification score assigned to each of the at least one source of identification can be based upon a reliability of the at least one source of identification. The predetermined function can comprise, for example, a summing function, a weighted summing function or the like. The method can include the steps of: d.) supplying at least one of personal information and financial information of the user, wherein the total identification score can be associated with the at least one of personal information and financial information of the user; e.) generating a unique identity access authorization code associated with the user for use by a third party in the transaction; and f.) transmitting, to the third party, at least the total identification score of the user upon verification of the identity access authorization code. At least the total identification score of the user can be transmitted to the third party upon further verification of a user identification code of the user. The user identification code can comprise, for example, a social security number of the user.
  • According to the fifth aspect, the method can include the steps of: g.) recording accesses associated with the total identification score of the user by the third party; h.) reviewing the record of accesses associated with the total identification score of the user; and i.) transmitting, to the third party, personal information and/or financial information associated with the user upon verification of the identity access authorization code of the user. The personal information and/or financial information associated with the user can be transmitted to the third party upon further verification of a user identification code of the user. The user identification code can comprise, for example, a social security number of the user. The method can include the step of: j.) issuing an identity card securely containing identification information associated with the user. The identity card can comprise, for example, a smart card. The identification information associated with the user can be encrypted on the identity card.
  • According to the fifth aspect, the method can include the step of: k.) restricting uses of the identification information securely contained on the identity card. According to an exemplary embodiment of the fifth aspect, step (k) can comprise the steps of: l.) restricting locations of where the identification information is used; m.) restricting times of when the identification information is used; and n.) restricting types of transactions for which the identification information is used. The method can include the steps of: o.) prohibiting use of the identification information for the transaction when the identification information is restricted by the user for the transaction; p.) using the identification information for the transaction when the identification information is not prohibited by the user for the transaction; q.) generating a transaction order using the total identification score of the user; r.) submitting the transaction order to perform the transaction; s.) transmitting at least one of personal information and financial information of the user, upon verification of the transaction order, to complete the transaction; t.) associating an address identification code with an address of the user; u.) supplying the address identification code and an address of a communication reception center to a third party; v.) receiving communications for the user from the third party at the communication reception center, wherein the communications include the address identification code; w.) supplying the communications to the user associated with the address identification code; and x.) supplying an identity risk factor associated with the user, wherein the identity risk factor can be associated with a level of risk of theft of the identity of the user by identity thieves. According to exemplary embodiments of the fifth aspect, the transaction can comprise, for example, an application for credit, a purchase transaction or the like.
  • According to a sixth aspect of the present invention, a method of verifying an identity of a user includes the steps of: a.) receiving at least one source of identification of the user; b.) assigning an identification score to each of the at least one source of identification; c.) generating a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function, wherein the total identification score of the user is associated with a level of verification of the identity of the user; d.) comparing the total identification score of the user to a minimum identification score associated with a transaction; e.) approving the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score; and f.) requesting additional sources of identification of the user before approving the transaction when the total identification score is less than the minimum identification score.
  • According to a seventh aspect of the present invention, a method of verifying an identity of a user includes the steps of: a.) receiving at least one source of identification of the user; b.) assigning an identification score to each of the at least one source of identification; c.) generating a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function, wherein the total identification score of the user is associated with a level of verification of the identity of the user; d.) receiving approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score; and e.) receiving a request for additional sources of identification of the user before receiving approval of the transaction when the total identification score is less than the minimum identification score.
  • According to an eighth aspect of the present invention, a method of verifying an identity of a user includes the steps of: a.) receiving a total identification score of the user, wherein the total identification score is generated from identification scores assigned to each of at least one source of identification of the user and a predetermined function, and wherein the total identification score of the user is associated with a level of verification of the identity of the user; b.) comparing the total identification score of the user to a minimum identification score associated with a transaction; c.) approving the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score; and d.) requesting additional sources of identification of the user before approving the transaction when the total identification score is less than the minimum identification score.
  • According to a ninth aspect of the present invention, a system for verifying an identity of a user includes means for assigning an identity score. The identity score assigning means is configured to receive at least one source of identification of the user. The identity score assigning means is configured to assign an identification score to each of the at least one source of identification. The system includes means for generating a total identity score in communication with the identity score assigning means. The total identity score generating means is configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user. The total identification score of the user is compared to a minimum identification score associated with a transaction. The transaction is performed when the total identification score of the user is one of greater than and equal to the minimum identification score. Additional sources of identification of the user are received before performing the transaction when the total identification score is less than the minimum identification score.
  • According to the ninth aspect, the at least one source of identification can comprise a driver's license of the user. According to an alternative exemplary embodiment of the ninth aspect, the at least one source of identification can comprise a birth certificate of the user. The identification score assigned to each of the at least one source of identification can be based upon a reliability of the at least one source of identification. The predetermined function can comprise, for example, a summing function, a weighted summing function or the like. The system can include means for storing data. Personal information and/or financial information of the user can be stored in the data storing means. The total identification score can be associated with the personal information and/or financial information of the user. The system can include means for generating an access code. The access code generating means can be configured to generate a unique identity access authorization code associated with the user for use by a third party to access information associated with the user. The system can include means for transmitting data. The data transmitting means can be configured to transmit at least the total identification score of the user to the third party upon verification of the identity access authorization code. The data transmitting means can be configured to transmit at least the total identification score of the user to the third party upon further verification of a user identification code of the user. The user identification code can comprise, for example, a social security number of the user.
  • According to the ninth aspect, the system can include means for logging. The logging means can be configured to record accesses associated with the total identification score of the user by the third party. The system can include means for generating a report. The report generating means can be configured to generate reports for displaying the record of accesses associated with the total identification score of the user. Personal information and/or financial information associated with the user can be transmitted to the third party upon verification of the identity access authorization code. The personal information and/or financial information associated with the user can be transmitted to the third party upon further verification of a user identification code of the user. The user identification code can comprise, for example, a social security number of the user. The system can include an identity card means. The identity card means can be configured to securely contain identification information associated with the user. The identity card can comprise, for example, a smart card means. The identification information associated with the user can be encrypted on the identity card means. Uses of the identification information securely contained on the identity card means can be restricted by the user. For example, locations of where the identification information is used can be restricted by the user. Times of when the identification information is used can be restricted by the user. Types of transactions for which the identification information is used can be restricted by the user. Use of the identification information for the transaction can be prohibited when the identification information is restricted by the user for the transaction. The identification information for the transaction can be used when the identification information is not prohibited by the user for the transaction.
  • According to the ninth aspect, the system can include means for generating a transaction order. The transaction order generating means can be configured to generate a transaction order using the total identification score of the user. The transaction order can be submitted by the user to perform the transaction. Personal information and/or financial information of the user can be accessed, using the transaction order, to complete the transaction. The system can include means for generating an address identification code. The address identification code generating means can be configured to generate an address identification code associated with an address of the user. The address identification code and an address of a communication reception center can be supplied to a third party. Communications for the user from the third party can be received at the communication reception center. The communications can include, for example, the address identification code. The system can include means for displaying a communication. The communication displaying means can be configured to display communications to the user associated with the address identification code. The system can include means for generating an identity risk factor. The identity risk factor generating means can be configured to generate an identity risk factor associated with the user. The identity risk factor can be associated with a level of risk of theft of the identity of the user by identity thieves. According to exemplary embodiments of the ninth aspect, the transaction can comprise an application for credit, a purchase transaction or the like. The system can also include a graphical user interface means. The graphical user interface means can be configured to provide access to and management of identification information associated with the user.
  • According to a tenth aspect of the present invention, a system for verifying an identity of a user includes means for receiving configured to receive at least one source of identification of the user. The system includes means for assigning an identification score configured to assign an identification score to each of the at least one source of identification. The system includes means for generating an identification score configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user. The system includes means for comparing configured to compare the total identification score of the user to a minimum identification score associated with a transaction. The system includes means for approving a transaction. The transaction approving means is configured to generate an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score. The transaction approving means is configured to generate a request for additional sources of identification of the user before generating the approval of the transaction when the total identification score is less than the minimum identification score.
  • According to an eleventh aspect of the present invention, a system for verifying an identity of a user includes means for assigning an identification score configured to receive at least one source of identification of the user and configured to assign an identification score to each of the at least one source of identification. The system includes means for generating a total identification score configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user. The system includes means for receiving an approval. The approval receiving means is configured to receive an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score. The approval receiving means is configured to receive a request for additional sources of identification of the user before receiving the approval of the transaction when the total identification score is less than the minimum identification score.
  • According to a twelfth aspect of the present invention, a system for verifying an identity of a user includes means for receiving configured to receive a total identification score of the user. The total identification score is generated from identification scores assigned to each of at least one source of identification of the user and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user. The system includes means for comparing configured to compare the total identification score of the user to a minimum identification score associated with a transaction. The system includes means for approving a transaction. The transaction approving means is configured to generate an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score. The transaction approving means is configured to generate a request for additional sources of identification of the user before generating the approval of the transaction when the total identification score is less than the minimum identification score.
  • According to a thirteenth aspect of the present invention, a computer-readable medium contains a computer program for verifying an identity of a user. The computer program performs the steps of: a.) receiving at least one source of identification of the user; b.) assigning an identification score to each of the at least one source of identification; and c.) generating a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function, wherein the total identification score of the user is associated with a level of verification of the identity of the user, wherein the total identification score of the user is compared to a minimum identification score associated with a transaction, wherein the transaction is performed when the total identification score of the user is one of greater than and equal to the minimum identification score, and wherein additional sources of identification of the user are received before performing the transaction when the total identification score is less than the minimum identification score.
  • According to the thirteenth aspect, the at least one source of identification can comprise a driver's license of the user. According to an alternative exemplary embodiment of the thirteenth aspect, the at least one source of identification can comprise a birth certificate of the user. The identification score assigned to each of the at least one source of identification can be based upon a reliability of the at least one source of identification. The predetermined function can comprise, for example, a summing function, a weighted summing function or the like. The computer program can perform the steps of: d.) retrieving at least one of personal information and financial information of the user, wherein the total identification score is associated with the at least one of personal information and financial information of the user; e.) generating a unique identity access authorization code associated with the user for use by a third party in the transaction; and f.) initiating transmission, to the third party, of at least the total identification score of the user upon verification of the identity access authorization code. At least the total identification score of the user can be transmitted to the third party upon further verification of a user identification code of the user. The user identification code can comprise, for example, a social security number of the user.
  • According to the thirteenth aspect, the computer program can perform the steps of: g.) recording accesses associated with the total identification score of the user by the third party; h.) providing a review of the record of accesses associated with the total identification score of the user; and i.) initiating transmission, to the third party, of personal information and/or financial information associated with the user upon verification of the identity access authorization code of the user. The personal information and/or financial information associated with the user can be transmitted to the third party upon further verification of a user identification code of the user. The user identification code can comprise, for example, a social security number of the user. The computer program can perform the step of: j.) generating authorization for issuance of an identity card securely containing identification information associated with the user. The identity card can comprise, for example, a smart card or the like. The identification information associated with the user can be encrypted on the identity card.
  • According to the thirteenth aspect, the computer program can perform the step of k.) generating use restrictions for the identification information securely contained on the identity card. According to an exemplary embodiment of the thirteenth aspect, for step (k), the computer program can perform the steps of: l.) generating location restrictions for where the identification information is used; m.) generating temporal restrictions for when the identification information is used; and n.) generating type restrictions for transactions for which the identification information is used. The computer program can perform the steps of: o.) generating use prohibitions for the identification information for the transaction when the identification information is restricted by the user for the transaction; p.) generating authorization to use the identification information for the transaction when the identification information is not prohibited by the user for the transaction; q.) generating a transaction order using the total identification score of the user; r.) forwarding the transaction order to perform the transaction; s.) initiating transmission of at least one of personal information and financial information of the user, upon verification of the transaction order, to complete the transaction; t.) associating an address identification code with an address of the user; u.) providing the address identification code and an address of a communication reception center to a third party; v.) receiving communications for the user from the third party at the communication reception center, wherein the communications can include, for example, the address identification code; w.) forwarding the communications to the user associated with the address identification code; and x.) generating an identity risk factor associated with the user, wherein the identity risk factor can be associated with a level of risk of theft of the identity of the user by identity thieves. According to exemplary embodiments of the thirteenth aspect, the transaction can comprise an application for credit, a purchase transaction or the like.
  • According to a fourteenth aspect of the present invention, a computer-readable medium contains a computer program for verifying an identity of a user, wherein the computer program performs the step of: a.) receiving at least one source of identification of the user; b.) assigning an identification score to each of the at least one source of identification; c.) generating a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function, wherein the total identification score of the user is associated with a level of verification of the identity of the user; d.) comparing the total identification score of the user to a minimum identification score associated with a transaction; e.) generating an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score; and f.) initiating a request for additional sources of identification of the user before generating the approval of the transaction when the total identification score is less than the minimum identification score.
  • According to a fifteenth aspect of the present invention, a computer-readable medium contains a computer program for verifying an identity of a user, wherein the computer program performs the step of: a.) receiving at least one source of identification of the user; b.) assigning an identification score to each of the at least one source of identification; c.) generating a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function, wherein the total identification score of the user is associated with a level of verification of the identity of the user; d.) receiving an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score; and e.) receiving a request for additional sources of identification of the user before receiving the approval of the transaction when the total identification score is less than the minimum identification score.
  • According to a sixteenth aspect of the present invention, a computer-readable medium contains a computer program for verifying an identity of a user, wherein the computer program performs the step of a.) receiving a total identification score of the user, wherein the total identification score is generated from identification scores assigned to each of at least one source of identification of the user and a predetermined function, and wherein the total identification score of the user is associated with a level of verification of the identity of the user; b.) comparing the total identification score of the user to a minimum identification score associated with a transaction; c.) generating an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score; and d.) initiating a request for additional sources of identification of the user before generating the approval of the transaction when the total identification score is less than the minimum identification score.
  • According to a seventeenth aspect of the present application, a system for verifying an identity of a user includes an identification score assignment module. The identification score assignment module is configured to receive at least one source of identification of the user. The identification score assignment module is configured to assign an identification score to each of the at least one source of identification. The system includes a total identification score generation module in communication with the identification score assignment module. The total identification score generation module is configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user. The total identification score of the user is compared to a minimum identification score associated with a transaction. The system includes an identity confidence factor generation module in communication with the total identification score generation module. The identity confidence factor generation module is configured to generate an identity confidence factor associated with the user in accordance with a validity of the identity of the user. The transaction is performed when at least one of i.) the total identification score of the user is one of greater than and equal to the minimum identification score, and ii.) the identity confidence factor of the user is greater than a predetermined identity threshold value. Additional sources of identification of the user are received before performing the transaction when at least one of: i.) the total identification score is less than the minimum identification score, and ii.) the identify confidence factor of the user is less than the predetermined identity threshold value.
  • According to the seventeenth aspect, the validity of the identity of the user can be based on a time factor. The time factor can comprise a length of time in which the identity of the user is used legitimately. The identity confidence factor of the user can be increased as the length of time in which the identity of the user is legitimately used increases. The system can include a healthcare identity card. The healthcare identity card can be configured to securely contain identification information associated with the user. The healthcare identity card can be configured to be used by a healthcare provider to retrieve healthcare information associated with the user.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Other objects and advantages of the present invention will become apparent to those skilled in the art upon reading the following detailed description of preferred embodiments, in conjunction with the accompanying drawings, wherein like reference numerals have been used to designate like elements, and wherein:
  • FIG. 1 is a block diagram illustrating a system for verifying an identity of a user, in accordance with an exemplary embodiment of the present invention.
  • FIGS. 2A-2C are flowcharts illustrating steps for verifying an identity of a user, in accordance with an exemplary embodiment of the present invention.
  • FIG. 3 is a flowchart illustrating steps for restricting uses of identification information securely contained on an identity card, in accordance with an exemplary embodiment of the present invention.
  • FIG. 4 is a flowchart illustrating steps for verifying an identity of a user, in accordance with an alternative exemplary embodiment of the present invention.
  • FIG. 5 is a flowchart illustrating steps for verifying an identity of a user, in accordance with an alternative exemplary embodiment of the present invention.
  • FIG. 6 is a flowchart illustrating steps for verifying an identity of a user, in accordance with an alternative exemplary embodiment of the present invention.
  • FIG. 7 is a diagram illustrating information routing for GIS, in accordance with an exemplary embodiment of the present invention.
  • FIG. 8 is a diagram illustrating the identity management system distributed platform model, in accordance with an exemplary embodiment of the present invention.
  • FIG. 9 is a diagram illustrating an exemplary architecture for the identity management system 100 platform, in accordance with an exemplary embodiment of the present invention.
  • FIGS. 10A and 10B are flow diagrams illustrating a transaction using an automated pre-authorization process for the identity management system without using a one-time card number, in accordance with an exemplary embodiment of the present invention.
  • FIGS. 11A and 11B are flow diagrams illustrating a transaction using an automated pre-authorization process for the identity management system using a one-time card number, in accordance with an exemplary embodiment of the present invention.
  • FIGS. 12A and 12B are flow diagrams illustrating a transaction using an automated pre-authorization process for the identity management system without registration and without using a one-time card number, in accordance with an exemplary embodiment of the present invention.
  • FIGS. 13A and 13B are flow diagrams illustrating a transaction using an automated pre-authorization process for the identity management system without registration but using a one-time card number, in accordance with an exemplary embodiment of the present invention.
  • FIG. 14 is a diagram illustrating insurance coverage using the identity management system, in accordance with an exemplary embodiment of the present invention.
  • FIG. 15 is a diagram illustrating on-line gambling transactions with the identity management system, in accordance with an exemplary embodiment of the present invention.
  • FIG. 16 is a diagram illustrating a commerce platform for the identity management system, in accordance with an exemplary embodiment of the present invention.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • Exemplary embodiments of the present invention are directed to a system and method for identity verification and management. According to exemplary embodiments, the identity of an individual or entity (collectively, a “user”) is first verified. One or more sources of identification are supplied by the user, with each source of identification being verified and given an individual identity value or score based on, for example, the level of reliability or authenticity of the identification source. The identity of the user is then evaluated based on the total of the identity scores. A total identification score is assigned to the user. Once the identity of the user is verified, the user can manage its identity using the identity management system of the present invention.
  • The identity management system according to exemplary embodiments can, for example, provide authorization to certain organizations to supply services to the user for a period of time. For example, each time the user authorizes an organization to provide a service to the user using the user's identity, the identity management system can provide the user with an identity authorization code to pass to the organization. Once a user sends the identity authorization code, along with its identity information, such as, for example, a social security number, the organization can further verify the identity of the user by using an additional aspect of the identity management system of the present invention. According to exemplary embodiments, the identity management system can be used by vendors wishing to provide a service to the user. For example, the identity management system can allow the vendor to input the client's identity information (e.g., social security number) along with the provided identity authorization code to determine if the user has verified the vendor to use the user's identity information based on the criteria the user has inputted into the identity management system.
  • The user can also restrict the use of its identity information and credit information based on, for example, an identification card issued to the user by the system. The identification card can also restrict uses of the user's identity and/or credit based on specified restrictions. For example, the user can specify a restriction such that any credit card issued to the user cannot be used internationally or the like. Such a restriction will allow the user to restrict the user's exposure to identity theft. The identity management system according to exemplary embodiments can also issue an identity risk factor to the user. The identity risk factor can assist both the user and third parties in evaluating the exposure of the user to identity theft.
  • Online (i.e., Internet-based) purchases can also be verified using the identity management system according to exemplary embodiments. For example, the identity management system can identify a user by asking the user to provide an identification number and/or an identity code uniquely assigned to the user. Thus, an online merchant can be certain that the credit card being used has not been stolen and is not being used in a fraudulent manner. In addition, as discussed previously, the user can restrict the use of the credit card based on specified restrictions as part of process of managing the user's identity profile.
  • Accordingly, by providing control and management of one's identity to the user according to exemplary embodiments, identity theft can be significantly reduced. Currently, government issued identification cards and documents, such as driver's licenses, passports and birth certificates, are among the few means of verifying a user's identity. However, these forms of identification can be obtained easily using fake or falsified information, nor are copies of these forms of governmental identification generally required when applying for credit. In contrast, exemplary embodiments of the present invention can establish, maintain and secure the identity of a user through proper identity verification and management, issuance of secure identity cards and unique identity codes to be used along with the identity cards, and the like.
  • As used herein, a “user” can be any person, group of individuals, company, corporation, business, retail establishment, organization or other any suitable type of entity that possesses a unique identity that can be potentially stolen or otherwise compromised, and for which protection against identity theft is desired.
  • These and other aspects of the present invention will now be described in greater detail. FIG. 1 is a block diagram illustrating an identity management system 100 for verifying an identity of a user, in accordance with an exemplary embodiment of the present invention. The identity management system 100 includes an identification score assignment module 105. The identification score assignment module 105 is configured to receive at least one source of identification 110 of the user. Any suitable number N of sources of identification 110 can be supplied or otherwise transmitted by the user to the identification score assignment module 105 (e.g., source of identification 1, source of identification 2, . . . , source of identification N). Each source of identification 110 can be any appropriate means for uniquely identifying a user, such as, for example, a driver's license, a social security card, a birth certificate, passport or other like credential(s) of the user. The sources of identification 110 can be supplied by the user to the identification score assignment module 105 using any appropriate means, such as any suitable form of electronic transmission (e.g., a scanned copy of the documentation, facsimile, electronic mail and/or the like) or manual delivery.
  • The identification score assignment module 105 is configured to assign an identification score to each of the at least one source of identification 110. According to exemplary embodiments, an identification score is a value that represents the level of verification or veracity of a given source of identification 110. In other words, the identification score assigned to each of the at least one source of identification 110 is based upon the reliability of the at least one source of identification 110. For example, identification scores can be based on a scale, such as 0 to 10, 0 to 100 or any suitable scale. For example, on a scale of 0 to 100, an identification score below a certain threshold number (e.g., 50 or other suitable value) can represent that the source of identification 110 cannot be considered trusted or reliable and is not (or cannot be) verified, while an identification score at or above the given threshold (e.g., 50 or other suitable value) can represent that the source of identification 110 can be considered trusted, reliable and verified (or verifiable). However, any appropriate identification score can be assigned to a source of information 110, so long as the identification score is indicative of the level of verification, reliability and/or veracity of the source of identification 110.
  • According to an exemplary embodiment, identification scores for each type of source of identification 110 can pre-assigned and stored in, for example, a look-up table or database. According to the example of a scale of 0 to 100, driver's licenses can have a score of for example, 60 (or other suitable value), while birth certificates can have a score of, for example, 85 (or other suitable value), with each score being retrieved from the look-up table or database based on the type of source of identification 110 provided by the user. Alternatively, identification scores for each source of identification 110 can be assigned dynamically, i.e., the identification scores can be generated based on one or more factors, for example, the type of source of identification 110, personal information of the user, and the like. For example, if a driver's license is issued from a particular state, the driver's license is an original (not a copy) and the driver (i.e., the user) is above a certain age, then the identification score assigned to this source of identification 110 can be high, otherwise it can be assigned a lower score. Those of ordinary skill in the art will recognize that other methods of assigning identification scores to sources of identification 110 can be used.
  • The identity management system 100 includes a total identification score generation module 115 in communication with the identification score assignment module 105. The total identification score generation module 115 is configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification 110 using a predetermined function. According to exemplary embodiments, a total identification score of a user is a value that represents the level of verification of the identity of the user. The total identification score can be considered akin to, for example, a credit score that is given to a user based on the user's credit history. For example, total identification scores can be based on a scale, such as 0 to 10, 0 to 100 or any suitable scale. For example, on a scale of 0 to 100, a total identification score below a certain threshold number (e.g., 50 or other suitable value) can represent that the identity of the user cannot be considered reliable and is not (or cannot be) verified, while a total identification score at or above the given threshold (e.g., 50 or other suitable value) can represent that the identity of the user can be considered trusted, reliable and verified (or verifiable). However, any appropriate threshold can be used as the demarcation for the total identification score, so long as any total identification score at or above such a threshold is indicative of the level of verification, reliability and/or veracity of the identity of the user.
  • According to exemplary embodiments, the total identification score generation module 115 generates a total identification score by combining the identification scores of each source of identification 110. For example, the total identification score generation module 115 can use a summing function to sum the individual scores to create the total identification score. Alternatively, the total identification score generation module 115 can use a weighted summing function to add the individuals identification scores of each of the sources of identification 110, while giving greater weight to those sources of identification 110 that are more reliable (e.g., assigning greater weight to a birth certificate than to a social security card). Alternatively, the total identification score generation module 115 can use an averaging function to average the identification scores of the sources of identification 110. However, any suitable method for generating the total identification score from the identification scores of each of the sources of identification 110 can be used, so long as the resulting total identification score is indicative of the level of verification or reliability of the identity of the user.
  • For purposes of illustration and not limitation, assume that a user provides three sources of identification 110 to the identification score assignment module 105: a social security card, a driver's license, and a birth certificate. The identification score assignment module 105 can then attempt to verify each source of identification 110. For example, the identification score assignment module 105 can be configured to access public record databases (e.g., via the Internet), state department of motor vehicle databases (e.g., to verify the driver's license) or other databases of other state agencies (e.g., to verify the birth certificate), federal record databases (e.g., to verify the social security card) and the like. Assume for purposes of illustration that a scale of 0 to 100 is used for identification scores. After the verification process, the identification score assignment module 105 assigns an identification score of 54 to the social security card, an identification score of 68 to the driver's license, and an identification score of 85 to the birth certificate. As discussed previously, each of the identification scores can be either a pre-assigned number based on the type of source of identification 110, or dynamically generated based on one or more factors. These individual identification scores are then passed to the total identification score generation module 115. If the total identification score generation module 115 uses a summing function to generate the total identification score, then the summed total identification score assigned to the user would be 54+71+85=210. If an averaging function is used to generate the total identification score, the total identification score assigned to the user would be 210/3=70.
  • According to exemplary embodiments, the total identification score assigned to the user can be used as part of a transaction. For example, the transaction can include an application for credit, a purchase transaction, or any suitable transaction for which verification of a user's identity is required. Continuing with the present illustration, assume that the user applies for a credit card. The credit card company can receive the total identification score of the user (as discussed below) as part of the application process. The total identification score of the user can be compared to a minimum identification score associated with the transaction. Although the credit card company can perform the comparison, the total identification score generation module 115 can alternatively perform the comparison on behalf of the credit card company. For example, the total identification score generation module 115 can include or be in communication with a comparator module configured to compare the total identification score of the user to the minimum identification score associated with the transaction.
  • For purposes of the present illustration, assume that the credit card company requires a minimum total identification score of 50 (using an averaging function) to issue the user a credit card. Since the total identification score of the user is 70, the credit card company can be assured of the verification of the identity of the user. In other words, the transaction can be performed (e.g., the credit card is issued), since the total identification score of the user (e.g., 70) is greater than or equal to the minimum identification score (e.g., 50) required to perform the transaction. However, if the total identification score was less than the minimum identification score, one or more additional sources of identification 110 of the user can be requested, received and verified (e.g., until the total identification score is above the minimum identification score) before the transaction can be performed. For example, if the comparison is performed by the identity management system 100, the total identification score generation module 115 can include or be in communication with a transaction approval module. The transaction approval module can be configured to generate an approval of the transaction when the total identification score of the user is greater than or equal to the minimum identification score, and to generate a request to the user for additional sources of identification 110 before generating the approval of the transaction when the total identification score is less than the minimum identification score. Alternatively, if the comparison is performed by the third party, the total identification score generation module 115 can include or be in communication with an approval receiver module. The approval receiver module can be configured to receive an approval of the transaction when the total identification score of the user is greater than or equal to the minimum identification score, and to receive a request for additional sources of identification 110 of the user before receiving the approval of the transaction when the total identification score is less than the minimum identification score.
  • As will be apparent to those of ordinary skill, the identification scores assigned to each of the sources of identification 110, the total identification score of the user, and the minimum identification score required to perform the transaction will depend on such factors as the types of documents submitted by the user, the predetermined function used to generate the total identification score, the level of verification desired by the third party to perform the transaction, the type of transaction to be performed, and other like factors.
  • For example, a CONFIDENCE FACTOR™ (which can also be referred to as an “identity confidence factor”) can be used to evaluate and measure the validity of a user's identity, additionally or alternatively to the total identification score of the user. For example, the CONFIDENCE FACTOR™ can be used by the total identification score generation module 115 as part of the generation of the total identification score of the user.
  • According to an exemplary embodiment, the CONFIDENCE FACTOR™ is a value represents the validity of a user's identity. For example, the CONFIDENCE FACTOR™ can be a base value (e.g., 0 or any suitable value) that can be increased or otherwise altered based on one or more factors, including, for example, time. For example, the CONFIDENCE FACTOR™ can be increased (e.g., by suitable increments): i.) as a user's identity is consistently and legitimately used over a period of time; ii.) based on the length of time the user has been a member of the identity verification and management system according to exemplary embodiments; iii.) based on the length of time a user preserves a healthy credit report; and/or other like temporal indications. Other appropriate factors or variables can be combined with, for example, time to determine the CONFIDENCE FACTOR™. For example, such factors can include the number of instances that a user accesses their on-line identity account, the lack of criminal records, arrests or other criminal activity, and the like. As with the total identification score, as a user's CONFIDENCE FACTOR™ increases, the probability of a false identity decreases.
  • According to the exemplary embodiment, the CONFIDENCE FACTOR™ can be combined with or used separately from the total identification score to indicate the level of verification or reliability of the identity of the user. The CONFIDENCE FACTOR™ can represent the validity of a user's identity proven over time and which can be based on information provided by an entity other than the user, such as criminal records later discovered and the like, while the total identification score represents a combination of identity scores that may not be dependent upon factors such as time. Thus, for example, the CONFIDENCE FACTOR™ can be added to the total identification score to improve the level of verification or reliability of the identify of the user. Alternatively, the CONFIDENCE FACTOR™ can be used as part of the evaluation of the total identification score by a third party. For purposes of illustration and not limitation, if the user has a marginal total identification score that does not qualify the user for, for example, a business loan from a financial institution, a high CONFIDENCE FACTOR™ can provide the additional identity verification required by the financial institution to authorize the loan. Additionally, if the user has a high total identification score, then a high CONFIDENCE FACTOR™ can be used by the financial institution to authorize an increased loan amount or lower interest rate for the loan.
  • Exemplary embodiments of the present invention can be used to perform identity access control. Accordingly, the identity management system 100 can include a data storage device 120 in communication with, for example, the total identification score assignment module 115. The data storage device 120 can be used to store personal information and/or financial information of the user, although any suitable information associated with the user can be stored in the data storage device 120. The data storage device 120 can be any suitable type of computer memory or other computer storage medium capable of storing information. According to exemplary embodiments, the total identification score of the user can be associated with the personal and/or financial information stored in the data storage device 120. By creating such an association, the information associated with the total identification score can be accessed and retrieved as part of a transaction, rather than having the user personally supply such information for each and every transaction.
  • Accordingly, the identity management system 100 can include an access code generation module 125 in communication with, for example, the total identification score assignment module 115. The access code generation module 125 is configured to generate a unique identity access authorization code associated with the user for use by a third party to access the personal and/or financial information associated with the user. The identity management system 100 also can include a data transmission module 130 in communication with, for example, the access code generation module 125 and, through a communication link 133, to a third party entity. The data transmission module 130 is configured to transmit at least the total identification score of the user to the third party upon verification of the identity access authorization code. The data transmission module 130 is also configured to receive information from external (i.e., third party) sources via the communication link 133.
  • For purposes of illustration and not limitation, assume the user has a total identification score of 70, which was generated as discussed in the previous illustration. The user then desires to apply for credit, such as a credit card. According to exemplary embodiments, the user can log into or otherwise gain access to the identity management system 100 of the present invention by, for example, logging into (e.g., via login name and password) a website or through a suitable graphical user interface (e.g., graphical user interface 170). Once the user accesses the identity management system 100, the user can have a unique identity access authorization code generated for the user by the access code generation module 125. The identity access authorization code can be given to a third party by the user to allow the third party to gain access to the user's personal and/or financial information maintained by the identity management system 100. The identity access authorization code can be any suitable code or number that is unique to the user, such as, for example, a random number, an alphanumeric string of characters, the public key of a public key-private key public key infrastructure (PKI) system, or the like. According to an exemplary embodiment, the identity access authorization code can be a one-time use code, although the identity access authorization code can be used any number of times.
  • Continuing with the present illustration, when applying for the credit card, instead of inputting its personal and financial information into the application form, the user can supply the identity access authorization code to the bank or other financial institution to whom the user is applying for credit. Using the user's identity access authorization code and, for example, an identifier that uniquely identifies the financial institution (e.g., a financial institution identification number), the financial institution can gain access to the identity management system 100 to retrieve information associated with the user (e.g., through the graphical user interface 170 or like interface). In other words, the personal information and/or financial information associated with the user can be transmitted to the third party (e.g., via data transmission module 130) upon verification of the identity access authorization code. For example, the financial institution can retrieve the total identification score of the user, as well as any personal and/or financial information associated with the user that is needed for the credit application. The retrieved information can then be used by the financial institution to complete or otherwise fill in, for example, the credit card application on behalf of the user. As discussed previously, the financial institution can compare the total identification score of the user to a minimum identification score to determine whether the application process can continue (e.g., when the total identification score is greater than or equal to the minimum identification score) or whether additional sources of identification 110 are required from the user before continuing (e.g., when the total identification score is less than the minimum identification score).
  • According to an exemplary embodiment, to improve the security of the user's personal and/or financial information stored in the identity management system 100, a user identification code can be generated by the identity management system 100 (e.g., by the access code generation module 125) or supplied by the user to the third party entity, along with the identity access authorization code. The third party entity can use the user identification code in connection with the identity access authorization code before access and retrieval of the user's information is granted to the third party entity. For example, the data transmission module 130 can be configured to transmit at least the total identification score of the user to the third party upon further verification of the user identification code of the user. The user identification code can be any suitable number or code that uniquely identifies the user, such as the user's social security number or the like.
  • The identity management system 100 can include a log module 135 in communication with, for example, the access code generation module 125. The log module 135 can be configured to record or otherwise store a list of, for example, accesses associated with the total identification score of the user by the third party. However, the log module 135 can be configured to record accesses to any of the personal and/or financial information associated with the user that is stored and maintained by the identity management system 100. The identity management system 100 can also include a report generation module 140 in communication with, for example, the access code generation module 125. The report generation module 140 can be configured to generate, for example, reports for displaying the record of accesses associated with the total identification score and other information associated with the user. The record of accesses can be displayed to the user through, for example, a graphical user interface (e.g., graphical user interface 170) or other display device or printed in hard copy for review by the user. Additionally, the log module 135 can be used to maintain a record of each use of a user's identification information by a third party. The report generation module 140 can then provide an identity report to the user by which the user can view the activities performed by the third parties with respect to the user's identity, in a manner similar to that which a user reviews a credit report to view credit transactions and credit activity.
  • According to exemplary embodiments, an identity card 145 can be issued by the identity management system 100 at the request of the user (e.g., by logging into the identity management system 100 through the graphical user interface 170 and making such a request). The identity card 145 can be configured to securely contain identification information associated with the user. For example, the total identification score of the user can be encrypted (e.g., using any suitable encryption technique) and stored on the identity card 145, although any suitable information can be securely contained on the identity card 145, such as, for example, the personal and/or financial information associated with the user. However, according to an alternative exemplary embodiment, the identity card 145 can act as a key to access information stored remotely.
  • The identity card 145 can comprise a smart card (e.g., containing a “smart chip”), a card with a magnetic stripe, or any suitable storage medium on which encrypted information can be stored. Alternatively, the identify card 145 can comprise any suitable form of electronic device capable of storing information, such as, for example, a cell phone or other electrical or electronic devices. In addition, the identity card 145 can include biometric forms of identification, such as, for example, a fingerprint or the like. Alternatively, the identify card 145 can comprise a unique identifying feature of a human, such as an individual's sclera, retina or fingerprint that can be used with or without an accompanying card or other identifying device. According to an alternative exemplary embodiment, suitable RFID technology can be used. The RFID technology can be used instead of the card (e.g., a suitable RFID chip can be implanted within or on a person or a person's belongings) for use with the identity management system 100. Alternatively, a suitable RFID chip or device can reside on the identity card 145.
  • The user can then provide the identity card 145 to a third party, who can decrypt the identification information stored on the card and use that information as part of a transaction (e.g., applying for credit, a purchase transaction, and the like). For example, the identification information contained on the identity card 145 can be used by the third party in addition or alternatively to the information that can be retrieved by the third party using the identity access authorization code. Alternatively, the identification information contained on the identity card 145 can comprise, for example, the identity access authorization code by which the third party gains access to the information associated with user that is stored and maintained by the identity management system 100.
  • According to exemplary embodiments, the user can restrict the uses of the identification information securely contained on the identity card 145. For example, the user can restrict the locations of where the identification information is used (e.g., the identification information can only be used in the United States and Canada, but not in Mexico). Additionally or alternatively, the user can restrict the times of when the identification information is used (e.g., the identification information can only be used between the hours of 9:00 a.m. and 5:00 p.m.). Additionally or alternatively, the user can restrict the types of transactions for which the identification information can be used (e.g., the identification information can only be used for purchase transactions, but not applications for credit). Other types of restrictions of the identification information securely stored on the identity card 145 are possible. According to exemplary embodiments, the third party can decrypt the identification information stored on the identity card 145. Using the decrypted identification information, the third party can access the identity management system 100 (e.g., through the graphical user interface 170 using the identity access authorization code, through a secure socket connection using an appropriate network protocol and the like) as part of a transaction. Based on the restrictions placed on the identification information by the user, the identity management system 100 can prohibit or otherwise deny the use of the identification information when the identification information is restricted by the user for the transaction, or allow or otherwise approve the use of the identification information when the identification information is not prohibited by the user. Thus, the use of the identification information securely contained on the identity card 145 can be approved or denied in a manner similar to that which a bank either approves or denies the use of a credit card for a purchase transaction.
  • According to an alternative exemplary embodiment of the present invention, the identity card 145 can also be used to restrict the uses of accompanying credit cards, checks, affiliated identification cards (as discussed below) and the like forms of payment or identification that can be used in conjunction with the identity card 145. For example, the user can restrict the use of credit cards by specifying where, when and how the credit cards can be used. For example, based on the identification information securely contained on the identity card 145, a merchant or other third party can either allow the accompanying credit card to be used when the use falls within the restriction(s) specified in the identification information, or deny the use of the credit card when the use does not. As discussed previously, the restriction information can be included in the identification information securely contained on the identity card 145, which is provided to the third party once the identification information is decrypted. For example, when the user provides the identity card 145, the identity management system 100 can automatically inform the third party of the restrictions by allowing or rejecting the use of the identity card 145.
  • Alternatively, the identification information can be used by the third party to gain access to the identity management system 100, at which time the user-specified restriction(s) for the credit card are provided to the third party. According to an alternative exemplary embodiment, the third party can access the user-specified restrictions directly from the identity management system 100 using, for example, a unique third party authorization code (e.g., generated by the identity management system 100), regardless of the presence of the identity card 145. For example, a third party can independently access the identity management system 100 remotely (e.g., through the Internet, graphical user interface 170, telephone or automated customer service, through an appropriate secure network connection, or the like) to check for the user's total identification score, other identification information, and for any user-specified restrictions placed on the form of payment (e.g., a credit card, check or the like) proffered by the user, when the user does not provide the third party with an identity card 145. To access the user's identity information and any accompanying restrictions, the third party can log into the identity management system 100 (e.g., through the graphical user interface 170, telephone support, secure network connection or the like), enter the third party's unique vendor authorization code, and enter the account number of the form of payment proffered by the user (e.g., credit card number, checking account number, and the like). The identity information and any user-specified restrictions can then be provided to the third party by the identity management system 100.
  • According to an exemplary embodiment, the identity theft protection provided by the use of an identity card 145 can be separate from credit protection that can be associated with one or more credit cards. Thus, a separate identity card 145 and credit card(s) can be used. Although the identity card 145 can be used in conjunction with any suitable form of payment or identification, the identity card 145 can also serve as both a form of payment (e.g., a credit card or the like) and means of identification simultaneously, without the need for separate forms of payment and identification. Thus, the identity card 145 can serve as the only form of payment and identification that the user need carry. For example, credit card information or other payment information can be entered into the identity management system 100 and be accessible by the identity card 145, along with the identification information of the user (including, for example, any user-specified restrictions associated with the forms of payment). To access a particular credit card or other form of payment, the user can enter a personalized PIN number or suitable pass code into a third party's point-of-sale (POS) system that will allow the use of the information associated with the particular credit card or other form of payment for the transaction. Each form of payment can be associated with a unique pass code, or a single pass code can be associated with all forms of payment, allowing the user to associate a particular form of payment with the pass code as desired.
  • For example, the user can log into the identity management system 100 (e.g., using the user's unique name and password) and enter information associated with one or more forms of payment, such as, for example, credit card numbers, expiration dates and authorization codes, although information associated with any suitable form of payment (e.g., check cards, checks and the like) can be entered. For purposes of illustration and not limitation, the user can enter information associated with a credit card, such as the following:
      • Name on Credit Card: John Q. Smith
      • Credit Card Type: Visa
      • Credit Card Number: 1234-1234-1234-1234
      • Expiration Date: 07/2010
      • CVV Code: 4567
        Once this information is entered, the identity management system 100 can generate a unique code that can be assigned to the credit card (such as, for example, Card Pass Code: 98765) and associated with the identity card 145 of the user. Any unique code or number can be assigned to the form of payment. The user can then use the identity card 145 to conduct a financial transaction, without the need to proffer a separate form of payment. For purposes of the present example, when making a purchase or performing a financial transaction, to use the aforementioned Visa credit card, the user can swipe or otherwise enter the identity card 145 into the merchant's POS system and enter the pass code of 98765, thereby retrieving the credit card information associated with the identity card 145 and the pass code.
  • As discussed previously, according to one exemplary embodiment, a single identity card 145 can be used to access any or all identification or credit card information. In other words, a user can carry the identity card 145 instead of many other cards. As noted previously, users can store or otherwise associate any credit card information with the identity card 145 using the identity management system 100. For example, the user can access the identity management system 100 via, for example, the Internet or World Wide Web via a suitable graphical user interface (e.g., graphical user interface 170) and an appropriate Internet or network connection. However, to charge a credit card stored on or otherwise associated with the identity card 145, the merchant or third party can process the charge through conventional credit card network. The credit card network is a specialized network that is connected to merchants, credit card companies and banks.
  • Conventionally, to perform a credit card transaction, the user or the merchant swipes a credit card through a credit card reading device. The device reads the information from the card and sends it to a first processing site (a “first processor” or “acquirer”) for processing by the merchant. From the first processor, the information will be transmitted via the credit card network and ultimately reach a second processing site (a “second processor”) at a designated bank or financial institution for processing (e.g., authorization or denial of the charge). The bank or other financial institution that receives the charge information is the bank or financial institution that issued the credit card to the user. An authorization or denial of the charge, based on the user's available credit, will be sent to the merchant or third party via the second and first processors.
  • According to an exemplary embodiment, the identity management system 100 can review the authorization transactions processed by the merchants or third parties as part of identity theft prevention. To review such authorization transactions, the existing merchant authorization process can be modified by placing a third processing site (a “third processor”) between the first and second processors. Thus, according to exemplary embodiments, when the merchant or user swipes the identity card 145 through the credit card reading device, the information from the identity card 145 will be sent to the first processor. From the first processor, the information can be transmitted through the credit card network to the third processor. The third processor can reside in, for example, the identity management system 100. For example, the third processor can compare the identity information associated with the credit card information to verify the identity of the user to ensure that an actual or potential identity theft is not occurring (e.g., the credit card has not been marked as lost or stolen and the like, as discussed below). For example, if the identity of the user making the credit card charge is not the correct identity associated with the credit card authorization, the third processor can issue an identity denial of the credit card transaction based on the failed identity verification. Otherwise, the third processor can issue an identity authorization for the credit card transaction as a result of the verified identity. After the information has been verified by the third processor, the charge information can be sent to the second processor at the bank for financial authorization or denial of the transaction, for example, based on the user's available credit.
  • More particularly, the first processor receives a request for credit card authorization from the point-of-sale (POS) and passes that request to the issuing bank for verification. The first processor then relays the answer to that request from the issuing bank to the merchant. When a merchant wants to establish a connection with a network, the merchant establishes the connection through a gateway. The first processor receives the merchant request for credit card authorization and sends it to the network. From the network, the request finds its way to the issuing bank's database for authorization. Some banks act as their own processor and receive and answer any requests. However, many banks register with a second processor, such as Élan Financial Services or the like. The second processor has access to the issuing bank's information and can issue authorization. Once the second processor accesses the bank data, it can relay an answer back through the network to the first processor and ultimately to the merchant. Most or all accounts can settle through a clearing house and get deposited into the merchant's acquiring bank for final reconciliation of authorizations.
  • The third processor can act like the second processor, and, in a manner, replace the second processor. For example, the identity management system 100 can issue a global or universal credit card (such as the identity card 145 or a separate credit card), as discussed below. The global credit card can be used in several different ways. For example, the global credit card can be used to store other credit cards. When a user uses the global credit card along with a PIN associated with a certain stored credit card, an authorization request can be sent from the merchant through a gateway to the merchant's chosen processor. From the first processor the request can be sent to the network and finally to the identity management system 100. The identity management system 100 can make a connection to the issuing bank and check the user's account for availability of funds. The transaction can be performed using an “On-Us” approach to avoid network charges, as discussed below. If funds are available, an authorization message can be sent to the merchant. If funds are not available, a authorization declined messages can be sent instead. If an authorization is provided to the merchant, a settlement can be requested to transfer the funds to, for example, the identity management system 100 as soon as possible. In such a transactional system, the user would have zero credit balance in the identity management system 100. All balances would be provided by the issuing bank. The identity management system 100 would then be used for management of the transaction.
  • Alternatively, the global credit card can be used to store other credit cards and can be used as a credit card itself: If used as a credit card itself, the user can use their global credit card without using an associated PIN. In such a scenario, the authorization request can be sent from the merchant through a gateway to the merchant's chosen processor. From the first processor, the request can be sent to the network and finally to the identity management system 100. The transaction can be recorded, and, if the user has sufficient funds in their account, an authorization message can be sent to the merchant. Otherwise an authorization declined message can be sent. Users can use the identity management system 100 to assign each transaction to a bank or credit card of choice. At regular intervals, the identity management system 100 can collect requests and send user's requested transactions to the issuing banks. If sufficient funds are available, the user's account can be credited and money can be collected from the issuing bank. If sufficient funds are not available, the user's account will not be credited, which will be reflected in the user's account. If the user does not assign the transaction to any of the other banks, the user's account with the identity management system 100 will be affected. In such case, the identity management system 100 can act as a credit card company.
  • Introduction of a third processor into existing credit card systems could disturb cost equilibriums in the credit card authorization process and could result in the incurring of extra charges. The extra charges could result, because when data travels to each processor, a percentage of the transaction amount is deducted in favor of that processor. Thus, adding a third processor can increase the charge. In existing credit card systems, any such extra charge is pushed back to the merchants. Merchants have come to accept such charges to compete for customers who prefer to use credit cards. Accordingly, a new system that produces new costs will either have to absorb the costs itself or push those costs to the merchants. Therefore, exemplary embodiments of the present invention can reduce/avoid any extra costs incurred by introducing the identity card 145 into the credit card system. To eliminate such extra charges, exemplary embodiments can use an “On-Us” approach. For example, the entity creating the extra charges (the entity maintaining the identity verification system 100) can partner with banks or other financial institutions to eliminate those extra charges. Additionally, such an approach can eliminate the need for a third processor, as the second processor can be used to perform both the identity authorization and the financial (credit card) authorization. Alternatively, negotiations can take place with banks or other financial institutions to lower or eliminate such charges. As will be recognized, such negotiations can take many shapes and forms, with various incentives, give-backs and concessions made between the parties to reduce or eliminate such charges. However, with the negotiation approach, a third processor would still be used.
  • FIG. 16 is a diagram illustrating a commerce platform for the identity management system 100, in accordance with an exemplary embodiment of the present invention. To participate in transactions at a store 1605, a user 1610 can register with the identity management system 100 (also referred to as a “Global Identity (GID) processor”) (see flow 1650). For example, if the bank of the user 1610 is a participating entity 1615 of the commerce platform network 1600, then the user 1610 can be automatically registered by opening, for example, a credit card or the like with the bank and having the bank issue the credit card to the user 1610. The credit card can be, for example, an identity card 145 or the like associated with the identity management system 100, and can have a suitable PIN number associated with the card to identify the card as an identity card 145. Alternatively or additionally, the user 1610 can associate one or more credit cards with an identity card 145, with each credit card assigned a unique PIN number so that the user 1610 can choose which credit card(s) to use at the time of the transaction. Thus, according to exemplary embodiments, the PIN number can be used to identify the card as an identity card 145 and to select the credit card to use for the transaction, while the credit card numbers can be used to identify the correct issuing bank.
  • When the user 1610 participates in a transaction at the store 1605, the user 1610 can enter the PIN or other identifier associated with the identity card 145. The transaction information, including, for example, credit card and PIN numbers, can be passed to the identity management system 100 (see flow 1650). The identity management system 100 can query a suitable database to look up or otherwise retrieve the credit card and PIN number combination (see flow 1655). Such information can allow the identity management system 100 to determine the particular bank (e.g., participating entity 1615) that issued the credit card. Once such a determination is made, the identity management system 100 can query or otherwise access the account information for the user 1605 from the proper participating entity 1615 (e.g., for no fee since it is a participating entity). The transaction information, can then be routed to the proper participating entity 1615 from the identity management system 100 to complete the transaction (e.g., an “OnUs” transaction based on the PIN numbers—see flow 1660). The completed and authorized transaction information can then be passed from the participating entity 1615 through the identity management system 100 using the corresponding network 1625 (e.g., the credit card network or the like) to the store 1605 to finish the transaction. The identity management system 100 can perform any suitable type of transaction exchange with participating entities 1615, such as, for example, ACH-based transactions to transfer money (see flow 1665) to settle charges made by the user 1605 or the like.
  • However, entities that do not participate in the commerce platform according to exemplary embodiments (referred to as non-participating entities 1630) can still use the commerce platform network 1600 to perform transactions. For example, the transaction information received by the identity management system 100 from the user 1610 at the initiation of a transaction can be forwarded by the identity management system 100 to the appropriate non-participating entity 1630, for example, based on the credit card number. Although the identity management system 100 may not be able to access the account information of the user 1610 from the non-participating entity 1630, the identity management system 100 can still perform appropriate transaction routing functions to route the transaction information to the non-participating entity 1620 via the network 1635 (e.g., a credit card network or the like). Alternatively or additionally, the identity management system 100 can perform suitable transaction exchanges with the non-participating entities 1630. For example, the identity management system 100 can perform ACH-based transactions or other electronic funds transfer to transfer money to, for example, settle charges made by the user 1605 and other like transactions. Thus, for example, with either participating or non-participating entities 1615 and 1630, the user 1605 can have their account debited or otherwise charged by either direct access to bank account of the user (e.g., via a participating entity 1615) or by having the identity management system 100 use electronic funds transfer systems, such as an ACH-based transaction system, to interact with non-participating entities 1630 to settle such transactions.
  • As noted previously, the user 1610 can participate in a transaction at the store 1605 by entering the PIN number along with the credit card information (e.g., by swiping the card at an appropriate purchase terminal). By using the PIN number, the user 1605 can choose the credit card(s) to which the transaction is to be assigned at the time the transaction is being made. However, according to an alternative exemplary embodiment, the user 1610 can simply enter the credit card information, thereby not assigning the transaction to any particular credit card at the time of the transaction. In such a scenario, the identity management system 100 can hold the transaction, while still authorizing the charge. After the transaction takes place, the user 1605 can then log into or otherwise access their account on the identity management system 100 (e.g., through a suitable graphical user interface over, for example, the Internet or World Wide Web) (see flow 1670). The user 1605 can then use the identity management system 100 to assign the transaction(s) to one or more accounts (e.g., credit card accounts or the like) in block 1640. Once assigned, the identity management system 100 can then perform suitable interactions with either or both of the participating and non-participating entities 1615 and 1630 to settle the transaction (e.g., through proper money transfers, charge reconciliations or the like). As discussed previously, in such a scenario, the identity management system 100 can act as a credit card company.
  • To conduct the financial transaction, the identity management system 100 can perform steps, such as: checking the identity card 145 to ensure that it is valid and not marked as compromised (e.g., lost) by the owner; checking to ensure that the identity card 145 has not been restricted based on the location, type or any other restrictions imposed by the user; verifying that the person meets the minimum identity score requirement of the merchant; checking for any additional restrictions and other like steps. Once the initial verification has been performed, the identity management system 100 can automatically send the credit card information (including the financial transaction information, such as amount of purchase and the like) to the appropriate credit card processing company. The credit card processing company performs the account processing in the conventional manner and returns an answer (e.g., financial transaction is accepted or denied). The answer can be relayed from the identity management system 100, either directly or indirectly, to the merchant, thus completing the financial transaction.
  • According to an alternative exemplary embodiment, a form of payment can have more than one pass code associated with it. For example, each pass code can impose certain restrictions on a transaction. For instance, a parent can enter the form of payment information under the identity account of their child. Using one pass code, the parent can restrict the transaction to a certain dollar amount. However, using another, different, pass code, the parent can increase this spending limit. For purposes of illustration and not limitation, the child can enter a store and decide to make one or more purchases. During the checkout, the child can use a first pass code to make a purchase which limits the expenditure to only non-alcoholic items under a total of $100.00. However, if the child is stranded and is required to make an emergency transaction that may exceed the $100.00 limit, the child can be provided with an additional emergency pass code, different than the first pass code, that does not impose any limitation on the expenditure.
  • In addition, there can be situations where it may not be possible to enter a pass code upon purchase, such as restaurant payment. In these situations, the account number of a form of payment (e.g., a credit card number) stored or otherwise located on the identity card 145 can be designated as a default form of payment with certain restrictions. The default form of payment can be automatically selected from the identity card 145 for the purchase transaction. For example, the user can designate an AMERICAN EXPRESS™ card to be the default form of payment. The default form of payment can also be subject to certain rules, with the rules being the set of restrictions and requirements that the user imposes on the use of the form of payment. The rules for the default form of payment can include, for example, the maximum amount that can be charged for this form of payment, the venues in which the form of payment can be used, the geographical areas in which the form of payment can be used, or any other suitable rule. However, multiple different default forms of payment can be associated with the identity card 145, with each default form of payment being used for different purposes. For example, for restaurant purchases, the default form of payment can be the aforementioned AMERICAN EXPRESS™ card. However, for clothing purchases, a Visa card can be default form of payment. The rules for the default form of payment associated with an identity card 145 can be establish to use any suitable number of forms of payment (credit cards, debit cards, checks, and the like) for any types of purchases or transactions.
  • According to an alternative exemplary embodiment, multiple pass codes can be entered, so that the purchase or other financial transaction can be divided or otherwise split based on the rules associated with each of the multiple forms of payment stored along with a user's identity profile. For example, if a first credit card has a pass code of 12345 and second credit card has a pass code of 98765, entering a code of 1234598765 would cause the purchase transaction to be performed based on the rules imposed on both credit cards associated with these respective pass codes (e.g., a union or other accumulation of the respective rule sets). Consequently, for purposes of illustration and not limitation, a $5000 transaction can be divided between the credit card assigned to pass code 12345 and credit card assigned to pass code 98765. Although the merchant will see the transaction as a single purchase transaction, for the transaction to proceed, both of the respective credit cards are checked and suitably verified by the identity management system 100. The purchase transaction split can be specified in the pass code that is entered by the user. For example, a $5000 transaction can be split by assigning $1000 for the pass code 12345 and $4000 for the pass code 98765. The resulting pass code can be entered as, for example, 123451000987654000 or the like.
  • According to an alternative exemplary embodiment, instead of using an identity card 145, the identity information associated with the identity card 145 can instead be integrated with any other suitable form of payment and/or identification issued by another institution. For example, a credit card issued by a financial institution can be configured to include a user's identity number either on the credit card or associated with the credit card number (e.g., in the financial institution's database), thereby allowing an integration with the identity information available from the identity management system 100. Thus, a user can use a form of payment, such as a credit card, and still have the form of payment checked for all of the restrictions imposed by the user through the identity management system 100 on the particular form of payment.
  • For purposes of illustration and not limitation, assume a user applies for a Visa credit card. The issuing bank can associate the user's identity information with the credit card being issued. The user can then impose restrictions on the use of the credit card account through the identity management system 100 (e.g., the credit card cannot be used outside of the United States). When the new credit card is used (without any accompanying identity card 145), the credit card company can check with the identity management system 100 to determine whether there are any restrictions imposed on the purchase transaction for the given credit card. For example, if the credit card cannot be used outside of the United Sates, then an attempt to make a purchase in Taiwan would be rejected.
  • Such integration is not limited to credit cards or other similar forms of payment, but can also be used in association with suitable forms of identification, such as, for example, a social security card. For example, the social security card can be configured to contain or be associated with the identity information of the user, so that the use of social security card number can also be restricted through the identity management system 100. In such an embodiment, for example, a user can provide its social security card to a prospective employer without fear of the social security number being stolen or used for fraudulent purposes. As with the credit card number illustrated above, before the social security number can be used for any purpose, such as, for example, reporting a 1099 Form to the Internal Revenue Service (IRS), the IRS can first check with the identity management system 100 to verify that the user has allowed the use of the social security number by the given employer, thereby ensuring that the employer is not making fraudulent claims.
  • Although numerous illustrative examples have been given in which a credit card has been discussed as a form of payment, other forms of payment can be used according to exemplary embodiments of the present invention. For example, the identity management system 100 can be configured to store the routing number and the bank account number for checks. A user can then assign a rule for use of the check information, and one or more pass codes can be issued to allow use of and access to this check information. For example, during a purchase transaction, a user can enter identification information (e.g., via the identity card 145) and the (check) pass code into the merchant's POS system. The identity management system 100 can determine if the purchase transaction satisfies the rule(s) that apply to the use of the check information. If so, a new (i.e., the next) check number can be issued and the check can be verified against the bank account (e.g., to determine if there are sufficient funds). Once verified, the merchant can receive a verification code or other unique number that can be used for an electronic deposit or electronic funds transfer from the bank account of the user to the bank account of the merchant. Such an embodiment can eliminate the need for a user to carry and write checks to perform purchase and other financial transactions. Other forms of payment can be maintained by and used in accordance with exemplary embodiments of the present invention.
  • According to exemplary embodiments, the same process that is used for identifying a user in the United States can be adapted for identifying a user in a foreign country, such as, for example, Germany, using identification documents native to that country (e.g., German identification documents). For example, a European Union identification card can be used instead of a social security card for purposes a creating a German user's total identification score. However, the meaning of the total identification score and/or the meaning of the CONFIDENCE FACTOR™ does not change for different geographical regions. For example, when a total identification score of 70 is assigned to a user in the United States, if the same total identification score is assigned to a user in Germany, these two users are considered to be completely equal in their level of identity. Thus, if the two users with equal total identification scores travel to another country, such as India, their identification scores represent a level of identity that is equal to an Indian resident with a total identification score of 70. According to exemplary embodiments, then, the identity card 145 can be used as a type of “global identification card.” As such, a foreign user traveling in the United States and having a total identification score of 70 can be treated equally to a United States citizen with a similar total identification score, regardless of the nationality of the foreign user. For example, providing the user's identity card 145 along with a check as a form of payment can ensure that the transaction is treated equally, regardless of where the user originates from and from which country the check is issued. Since the level of identity of a user can be uniformly ascertainable throughout the world according to exemplary embodiments, any transaction can be performed anywhere as safely as if it were performed in the user's native country.
  • In addition, since the identity card 145 can be associated with any form of identification or financial information, the usage of the identity card 145 anywhere in the world can be tracked for the user and logged for immediate or later access through the identity management system 100. Consequently, the user can track the usage of the identity card 145 in different geographical locations, thereby providing the user with a global record of not only the use of the user's identity and identification information, but also the user's financial information. Other characteristics or behavior of the user can be tracked in such a manner. For example, as the identity card 145 is used for purposes of travel (e.g., as the identity card 145 is swiped or otherwise recorded at identity checkpoints, such as airports or other like points of embarkation and disembarkation), a record of the user's travel can be maintained. Thus, a user's travel, both nationally and internationally, can be monitored and logged, thereby allowing the user to track travel with the identity card 145 in different geographical locations. Other such characteristics or behavior can be tracked using the identity card 145.
  • According to an exemplary embodiment, the identity management system 100 can be based on a distributed model that allows users to maintain and host their identity and related information according to a Global Identification Number (GIN). The GIN can be any suitable form of alpha-numeric or other identifier that is capable of uniquely identifying a user. The distributed model can be implemented through a service called, for example, Global Identity Services (GIS), as discussed below. The GIS can allow both authoritative and non-authoritative hosting of data and perform information routing based on the GIN.
  • As used herein, an “authoritative organization” is an entity or other user whose purpose is to securely maintain identity and identity-related data and information that is globally accessible by other entities. The data and information maintained by the authoritative organizations is trusted by other users and is accepted by any user that “joins” or otherwise uses the identity management system 100. Each of the authoritative organizations would be required to obtain an organizational GIN (OGIN).
  • As used herein, a “non-authoritative organization” is any other entity or user that chooses to provide limited or no access to identity and identity-related data and information, for example, to maintain the privacy or confidentiality of the data. Such non-authoritative organizations do have the ability to obtain data from (authoritative) partners through the GIS. However, the non-authoritative organizations would not be required to obtain an organizational GIN, unless they choose to share their identity and identity-related data and information with another organization.
  • According to exemplary embodiments, a primary function of the GIS is to provide a routing mechanism for data stored in various locations. FIG. 7 is a diagram illustrating information routing for GIS, in accordance with an exemplary embodiment of the present invention. When an entity requests services (e.g., retrieval of identity information or the like) associated with the identity management system 100, the request is first routed to the Local GIS (LGIS) server 705. If no LGIS server exists, the request is directly sent to the Primary GIS (PGIS) server(s) 710. Otherwise, if an LGIS server 705 exists, and this server can satisfy the request (e.g., the identity information resides on that LGIS server 705), the request is immediately fulfilled. If the LGIS server 705 cannot satisfy the request (e.g., the identity information does not reside on that LGIS server 705), the request is forwarded to one of the PGIS servers 710. The PGIS server 710 processing the request finds the Authoritative GIS (AGIS) server 715 associated with the request and sends the request to that server. The AGIS server 715 satisfies the request by, for example, retrieving and returning the requested information to the requesting entity. If the information is not located at the specified AGIS server 715, an error or other like indication can be returned to the requesting entity (e.g., to indicate that the identity information cannot be located or otherwise retrieved). The LGIS server(s) 705, PGIS servers 710 and AGIS servers 715 can communicate with each other any suitable type of network or computer connection.
  • According to an additional exemplary embodiment, the identity management system 100 can conform to and is compatible with the Federation model. A Federation is an association of organizations that come together to exchange information as appropriate regarding their users and resources to enable collaboration and transactions. For example, members of a Federation can easily integrate and use all or parts of the identity management system 100 (or corresponding commerce platform or e-commerce platform) that can enable them to use the services offered by such platforms.
  • FIG. 8 is a diagram illustrating the identity management system 100 distributed platform model, in accordance with an exemplary embodiment of the present invention. In FIG. 8, a bank 805 is a participating bank that can be responsible for holding the identification information of a member 810. The member 810 is an individual or entity who desires to have their identity protected. An identity specialist 815 is, for example, a bank agent or the like specially trained to assist the members 810 in creating their global identification account. A local institution global identity (GID) system 820 can include a licensed GID appliance and platform which the banks 805 can use to store identity information of members 810. The GID appliance can be connected to a GID main processing and routing system 830 so that it can be located by other local GID systems 820. A local main processor and routing system 825 is the main routing system that can control the local institution GID systems 820. The main GID system 830 is the global center for all connections between the local institution GID systems 820 and the banks 805. The users 835 are institutions or the like that can request access to information associated with a member 810 through the network.
  • FIG. 9 is a diagram illustrating an exemplary architecture for the identity management system 100 platform, in accordance with an exemplary embodiment of the present invention. For a client to have their identity protected, the client can visit the bank 805 and meets with a bank agent, such as an identity specialist 815, who can assist the client in creating their identity account (and credit card account) to become a member 810. Once the account is created in the bank 805, the member 815 can then use the identity management system 100 to manage their identity account (and/or credit account). Once an account has been configured, the member 815 then can use the identity card 145 to provide access to the users 835 or other institutions to information stored in that account.
  • The information can be accessed in one of several ways. For example, the member 810 can visit a participating merchant. If the member 810 wishes to open an account with the merchant, instead of writing all of the information on the account application, the member 810 can swipe their identity card 145 and enter the corresponding PIN assigned to the identity card 145. The merchant can send the information provided by the identity card 145 and PIN to the network, which can be routed to the GID main processor (e.g., GID main system 830). The GID main processor can use the account information to retrieve and decrypt the relevant identity information and encrypt it with the participating merchant's key. The encrypted identity information can be communicated from the GID main processor to GID transactional processing (e.g., local main processor and routing system 820) for the participating merchant. The participating merchant can then use its log-in or other unique identifier to access the identity information to complete the account application. In case the participating merchant cannot access a card swiping system or if the system is off-line for some reason, the member 810 can use an automated voice response (VRU) system 905, a live customer service center or the like to authorize the transfer of identity information. The merchant can also access the voice response system or customer service center to obtain the identity information (with the authorization of the member 810), in case the identity management system 100 is not available through the direct connection.
  • Those of ordinary skill in the art will recognize that the identity management system 100 can be implemented in a variety of ways. According to one exemplary embodiment of the present invention, a secured databank and system can be created by which the identity of individuals or businesses can be managed and accessed. Initial access by the user to the system can be through a bank or other trusted local organization or entity. For example, an identity theft specialist at the bank can receive users who want to subscribe to this system. At the bank, the identity theft specialist can first educate the customer on the identity management system 100. Following the education session, the identity theft specialist can ask the user for identification papers, such as a social security card, birth certificate, driver's license, proof of residency (passport, Green Card), proof of domicile, or the like. After examining the paperwork, the identity theft specialist can login to the identity management system 100 (e.g., through graphical user interface 170) to create a unique user number.
  • After the user number has been assigned, the user can create a PIN. Selection of the PIN can be done by the user without any access by the identity theft specialist. The user must memorize the PIN. For example, if the PIN is lost or forgotten, the user must return to, for example, the bank to have the PIN reset. The identity management system 100 can then create an identity account for that user. The user can also create, for example, a Global Credit Card account or the like, as discussed previously, to allow identity management on a global basis. The user will, for example, have an audit trail of all or substantially all of the transactions that occur on the Global Credit Card account and the associated stored cards. Coupled with the alert system, the user can track any transaction charged to their account. If created, a separate card with a credit card number can be issued to the user. The user can program, for example, all of the user's credit card accounts onto this card through access to the identity management system 100 (e.g., via graphical user interface 170). The user can additionally limit the use of each credit card (or other cards) by placing limits or other restrictions on each card, as discussed previously. An identity card 145 holding the unique user number can be mailed to that user's address (or to the bank, if user wishes).
  • Using the Internet or the World Wide Web, the user can then have access to the user's identity and credit card accounts maintained by the identity management system 100. Initially, when the user logs in to their account, the user can use the card number for a login name and the PIN for a password. However, once access to the user's identity account in the identity management system 100 has been obtained, the user can change their login name password to any unique login name and password.
  • Through the identity account, the user can have many options. For example, the user can receive alerts, for example, regarding their identity use or improper uses thereof. The user can receive requests for identity authorizations, such as, for example, requests for the use of the user's identity. The identity account can also allow the user to monitor identity account activity, monitor credit card activity, make and/or receive credit card payments, and any other identity- and financially-related transactions, such as, for example, prepaid cards, gift cards, debit cards, ATM cards and the like. As discussed previously, the identity management system 100 can also allow the user to input credit card information. For each credit card number, the user can choose a unique PIN, with the PIN for each credit card being different from the PIN used for identity access purposes. Consequently, the user need only carry a Global Identity Credit Card (e.g., identity card 145) instead of several different cards, such as, for example, credit cards, debit cards, gift cards, ATM cards and the like. For example, once at the Point-of-Sale, the Global Identity Credit Card can be used along with the PIN associated with one stored credit card to make transactions with the given credit card transaction. However, as discussed previously, the user can user one or more credit cards for the transaction, based on the sequence of PIN numbers entered. However, the vendor will not have access to the actual credit card number.
  • The identity system management 100 can also support ACH/EFT (Automatic Clearing House/Electronic Funds Transfer). An alert system can be associated with the use of the Global Identity Credit Card and the associated stored cards. For example, when a purchase takes place, an alert can be sent to the user's alert receiving device (e.g., mobile phone, PDA, e-mail or the like) about the occurrence of a transaction. Such an alert can further include suitable accompanying information, such as, for example, amounts, merchant identification, location and other like information.
  • For example, when applying for a mobile phone plan, the user can use the Global Identity Credit Card number. By entering the PIN associated with the identity of user and the credit card for the transaction, the user can authorize the identity management system 100 to reveal required identity and financial information to the business, for example, once or for a limited time. To ensure identity protection, authorized persons at the business or stationed at the headquarter of the mobile phone company can have viewing privileges for the identity and financial information, but their access is recorded. The identity management system 100 can also provide credit status to a requesting party as well. For example, the identity management system 100 can establish a network or computer connection to a credit reporting agency to retrieve a user's credit report. Each time a credit report is retrieved from the credit reporting agency, the corresponding credit history, credit score and the access can be recorded for the user to review.
  • According to an exemplary embodiment, credit card transactions can go through the identity management system 100. Consequently, limits on the credit card(s) can be applied and each transaction can be recorded, thereby ensuring the identity and financial safety of each transaction. For places where inputting a PIN is not feasible, a default system can be available. For example, when no PIN is entered, a specified default credit card can be charged. Using the identity management system 100, restrictions such as, for example, amount, geographic or vendor type, can be placed on the default credit card. For example, the default credit card without a PIN could only be used in, for example, restaurants.
  • Additionally, a CONFIDENCE FACTOR™ can also be assigned to each user. For example, the longer the user remains with the identity management system 100, and based on the authenticity of the documents the user presented to the identity theft specialist at the bank, the user's CONFIDENCE FACTOR™ can be increased. As noted previously, the CONFIDENCE FACTOR™ can be used as an additional or alternative measure of the validity of a user's identity.
  • Following the establishment of an identity with the identity management system 100, users can engage in trade with businesses or perform any other suitable transaction in which identity is a component. For example, for online transactions, a one-time use PIN can be generated for a credit card maintained in the identity management system 100, thereby not comprising the original PIN. To ensure identity safety, the one-time use PIN can be retrieved from identity management system 100 during the online transaction (e.g., at time of payment). Alternatively, upon request, a PIN can be generated periodically (e.g., at predetermined intervals) for a user and sent to, for example, the mobile phone, PDA, pager, e-mail address or the like of the user. The user then does not need to access the identity management system 100 each time a one-time use PIN is required.
  • The identity management system 100 can also functions as a fund transfer system for, for example, on line auctions or other transactions. For example, buyers and sellers can communicate through the identity management system 100 and transfer funds by credit card or check, because the identity of each user is established and verified in the identity management system 100. If users provide or otherwise authorize distribution of their CONFIDENCE FACTOR™ to other users, the CONFIDENCE FACTOR™ can also assist in the decision making of each party.
  • According to exemplary embodiments, any or all information maintained or otherwise stored in, for example, databases in the identity management system 100 can be encrypted using any suitable encryption technique. According to an exemplary embodiments, information and data stored in the identity management system 100 databases can be stored using a double encryption system. A double encryption system operates in a manner similar to a safety deposit box, where the owner of the box has one key and the bank has another and both keys are required for the information to be unlocked.
  • For example, the identity information stored in the identity management system 100 database can be encrypted by a first key that the identity management system 100 maintains, and also by a second key that the user maintains. Both encryption keys would be needed before the identity information can be decrypted and viewed. Such encryption can ensure that the data stored will be secure from hackers and other malicious attacks. Such encryption techniques can further ensure that even if the information or data was hacked, such information could not be decrypted without the presence of both the identity management system 100 key and the user's key. Additionally, the key maintained by the identity management system 100 can also change per record or otherwise periodically to ensure further security.
  • According to an exemplary embodiment of the present invention, the identity management system 100 can also be used for e-commerce transactions or other purchase transactions. The identity management system 100 can include a transaction order generation module 150 in communication with, for example, the total identification score generation module 115. The transaction order generation module 150 can be configured to generate a transaction or purchase order using the total identification score of the user. For example, before making a purchase, either online or in person, the user can generate a transaction order using the transaction order generation module 150 (e.g., by logging into the identity management system 100 and making such a request). When making a purchase, instead of using its credit card and personal information, the user can submit the transaction order to perform the transaction. The merchant or other third party can then use the transaction order to gain access to the total identification score, financial information (e.g., credit card number) and personal information (e.g., billing address of the user) to complete the transaction in the manner discussed previously on behalf of the user.
  • For example, the transaction order can contain an identity access authorization code by which the third party can gain access to the identity management system 100 to retrieve the relevant information. As noted previously, the user can specify different types of restrictions on the use of the user's information maintained by the identity management system 100. Thus, when generating the transaction order, the user can specify, for example, that the transaction order can only be used by a certain third party to perform a certain type of transaction. The third party would then only be able to access the information to which the third party has been restricted. According to an exemplary embodiment, the information retrieved by the third party is maintained by the third party temporarily to conduct the transaction, but then discarded after the transaction is complete. Alternatively or additionally, temporal restrictions can be placed on the information retrieved by the third party using the transaction order, thus limiting the amount of time by which the third party can successfully access and use the user's information. Additionally, once an identity access authorization code is entered by the third party, the third party can be restricted to receive only the funds authorized for the transaction. Thus, the identity management system 100 can be used to conduct the actual transaction on behalf of the third party.
  • For example, assume that a user navigates a web browser to a website to make a purchase. When ready to enter payment information, instead of a credit card number or the like, the user can enter the number of its identity card 145 and an accompanying pass code. Once the “submit payment” button is clicked, the website can send the information to the identity management system 100. The identity management system 100 can then verify the payment information associated with the identity card 145 and pass code, including all of the rules specified for the use of the particular form of payment (other types of verification can also be performed, such as verifying that sufficient funds are available for the form of payment). Once verified, the manager or other proprietor of the website can receive an authorization number that can be used to receive the payment from the identity management system 100 (e.g., through an electronic funds transfer or the like).
  • According to an alternative exemplary embodiment, another means by which a purchase (for example, POS, on-line, telephonic or the like) can occur using the identity management system 100 is referred to herein as an “Automated Pre-Authorization.” In such an alternative exemplary embodiment, the identity management system 100 can be referred to as a “Global Identity (GID) system” that can be used in conjunction with a “GID network.” Such an alternative embodiment can be used to facilitate and secure purchases such as, for example, on-line purchases and the like, and can be based on the “Purchase Order” (PO) concept. For example, to integrate their on-line payment processing system and to become a member, on-line merchants can download an Application Programming Interface (API) from the identity management system 100. Alternatively, the on-line merchant can “officially” register with identity management system 100 to obtain a unique key and certificate, including a set of Application Programming Interfaces (APIs). Such APIs can enable the merchant to create a unique encrypted key based on the information gathered from the client. Various appropriate criteria can be used by the API to create the unique encrypted key, such as, for example, the merchant name, the total invoice amount and other like criteria. Officially registered and un-officially registered merchants can be differentiated for the users by, for example, identity score, CONFIDENCE FACTOR™ or risk factor and the customer can be made aware of the merchant's identity. Such an Automated Pre-Authorization process can be illustrated with the following examples.
  • FIGS. 10A and 10B are flow diagrams illustrating a transaction 1000 using an automated pre-authorization process for the identity management system 100 without using a one-time card number, in accordance with an exemplary embodiment of the present invention. As illustrated in FIG. 10A, the transaction 1000 can involve a vendor 1002, a cart 1004, a client 1006, an API 1008 and the identity management system 1010. In step 1012, the vendor 1002 may or may not sign up with the GID network. In step 1014, the vendor 1002 can download the GID e-commerce API. In step 1016, the vendor 1002 can integrate the GID e-commerce API into the e-commerce website of the vendor 1002. In step 1018, the client 1006 can register for a GID card (e.g., identity card 145). In step 1020, the client 1006 can store their other cards in association with their GID card using the identity management system 100.
  • For purposes of illustration and not limitation, assume that in step 1022 the client 1006 navigates a suitable web browser to a website of the vendor 1002 to make a purchase (these examples are also applicable to, for example, at POS self-checkout counters). In step 1024, the client can make any and all required purchases and then prepare for checkout. When ready to enter payment information, instead of a credit card number or the like, in step 1026, the client 1006 can enter the number of its identity card 145, name, billing address, and other like information. In step 1028, the vendor 1002 can recognize the entered number as an identity card 145 number that belongs to the identity management system 100, and the cart 1004 of the vendor 1002 can pass the cart information to the API 1008. In step 1030, the API 1008 can return a unique URL to the vendor 1002. In step 1032, the cart 1004 of the vendor 1002 can present a link or button to the client 1006 called, for example, “Pre-Authorize Order.” In step 1034, the client 1006 can click on the “Pre-Authorize Order” link to pre-approve the on-line transaction and access his/her stored credit cards maintained on the identity management system 100 (e.g., where the user has stored his/her credit cards with restrictions applied to them, and the like). In step 1036, the client 1006 can securely log onto the identity management system 100. The secured login process can include, for example, User ID, pre assigned security questions, encryption keys, pre-assigned pictures, passwords and the like.
  • Continuing in FIG. 10B, in step 1038, the transaction information can be retrieved by the identity management system 100 and verified from the presented link. In step 1040, the pre-authorization can be presented to the client 1006. In step 1042, the client 1006 can choose to assign the transaction to the identity card 145 or another credit card registered with the system. In step 1044, the client 1006 can submit the pre-approval by clicking on, for example, an “Approve” link or button. In step 1046, the identity management system 1046 can store the pre-authorization information in the system. In step 1048, the client 1006 can exit the identity management site and return to the cart 1004. In step 1050, the client 1006 can complete the purchase through the vendor 1006 site by clicking on a, for example, “Submit Order” button or the like. In step 1052, the transaction request can be transferred from the cart 1004 through the network to the identity management system 100 (which supports the transaction). In step 1054, the identity management system 100 can receive the transaction. In step 1056, the transaction can be matched against the pre-authorization transaction. From the decision step 1058, if the transferred transaction matches the pre-approved transaction (including any the limitations and filtrations such as time, geography, and the like), the transaction can be approved in step 1060 and the results can be sent back to the vendor 1002. Otherwise, in step 1062, the order or transaction can be rejected and the client 1006 can be given an opportunity to repeat the process.
  • FIGS. 11A and 11B are flow diagrams illustrating a transaction 1100 using an automated pre-authorization process for the identity management system 100 using a one-time card number, in accordance with an exemplary embodiment of the present invention. As illustrated in FIGS. 11A and 11B, the flow of the transaction 1100 can follow the steps 1012-1044 of FIGS. 10A and 10B. However, after step 1044 in FIG. 11B, in step 1105, the identity management system 100 can generate a one-time use credit card number or the like. In other words, in step 1042, the client 1006 can choose which card to charge the transaction to, and the client 1006 can also select to have a one-time temporary credit card number to be generated. In step 1105, the identity management system 100 can then generate a one-time use, temporary credit card number (including, for example, expiration and CVV numbers) or other suitable payment information for the client 1006. The flow of transaction 1100 can continue with steps 1046 and 1048 as discussed previously with respect to FIG. 10B. However, in step 1110 after step 1048, the client 1006 can copy or otherwise enter the generated one-time use credit card number in the credit card number field of the vendor 1006 site (or it can be entered automatically by the system). The transaction 1100 can then be completed in steps 1052-1062 in the manner discussed previously with respect to FIG. 10B. Once the transaction 1100 is completed, the one-time use credit card number becomes invalid and no longer usable in future transactions.
  • For Point-of-Sale (POS) transactions, assume that a user goes to the POS to purchase an item. If the user uses the identity card 145, the user can receive a request in the form of, for example, a call on his/her mobile phone (PDA, or any other electronic device) from the identity management system 100. The request can provide the user with a choice of approving or not approving the transaction. For example, in the case of the request going through a mobile phone, the user can enter “1” for approving transaction and “2” for declining transaction. If the user chooses to approve the transaction, the transaction request can then transferred through the network to the identity management system 100. If the transferred transaction matches the pre-approved transaction (including any limitations and filtrations such as time, geography, and the like), the transaction can be approved and the results can be sent back to the merchant.
  • The identity management system 100 can be used as a commerce or e-commerce platform that can provide users and/or merchants per transaction insurance coverage. FIG. 14 is a diagram illustrating insurance coverage using the identity management system 100, in accordance with an exemplary embodiment of the present invention. The per transaction insurance coverage can include a suitable insurance underwriter 1405, the identity management system 100, a vendor 1410 and a consumer 1415. In step 1420, the identity management system 100 in conjunction with the insurance underwriter 1405 can underwrite the per transaction activity. A per transaction insurance coverage can be calculated in many different ways. For example, the coverage and rates can be based on the number of transactions the consumer 1415 makes, the number of transactions a vendor 1410 receives, the dollar amount of the transaction, the fraud risk associated with the purchased item, the fraud risk associated with the consumer 1415 habits, and other like information. The purpose of the insurance can be for, for example, identity theft fraud, credit card fraud, damaged merchandise, or the like. For example, the identity management system 100 can be underwritten by an insurance company to provide per transaction insurance to consumers 1415 and/or vendors 1410. If the consumer 1415 uses the identity card 145 for identity verification and/or for another transaction at or with the vendor 1410, the given transaction can be insured by the identity management system 100. For being insured, a suitable fee can be charged to every transaction. Such a fee can be paid by the vendor 1410 and/or the consumer 1415. Alternatively, neither party pays such a fee and the cost can be offset by other income, charges, fees, or the like.
  • For example, in step 1425, the consumer 1415 can purchase an item (e.g., on-line or POS) from the vendor 1425. In step 1430, the vendor 1410 can submit the transaction to the identity management system 100. In step 1435, the identity management system 100 can authorize and/or insure the transaction, based suitable criteria. In step 1440, the vendor 1410 can receive the response to the transaction submission, along with, for example, an authorization number. In step 1445, the consumer 1415 can be provided with a receipt (e.g., a paper receipt or electronic notification). In step 1450, if the transaction was insured, a deposit can be made to the insurance underwriter 1405 for the transaction. In step 1455, the insurance underwriter can reimburse the identity management system 100 for the cost of the insurance coverage. In step 1460, the identity management system 100 can reimburse the vendor 1410 against back charges, such as, for example, for the insurance coverage if paid by the vendor 1410.
  • At any of steps 1435, 1440 or 1445, a fraud can be declared in step 1470. For example, either the consumer 1415, the vendor 1410 or the identity management system 100 can determine that a fraud has occurred (e.g., an unauthorized charge made on a credit card) in any suitable manner. If a fraud has occurred, then the identity management system 100 can be appropriately notified in step 1475. The identity management system 100 can reimburse the vendor against any, all or none of the back charges in step 1460. In step 1465, the identity management system 100 can suitably cover any, all or none of the costs associated with the theft or fraud associated with the consumer 1415.
  • Certain business sectors can benefit greatly from the identity management system 100, especially from the commerce and the e-commerce platforms according to exemplary and alternative exemplary embodiments thereof. For example, on-line gambling and on-line adult entertainment sites are presently being sanctioned by many credit card issuing entities because of, for example, general negative public opinion regarding these industries and increased risk of fraud. For these reasons and others, many credit card issuing companies can block the Merchant Category Codes (MCCs) of these businesses. FIG. 15 is a diagram illustrating on-line gambling transactions with the identity management system 100, in accordance with an exemplary embodiment of the present invention. As illustrated in FIG. 15, if a consumer 1505 attempts to use a non-GID credit card (e.g., a credit card not associated with the identity management system 100) for an on-line gambling company 1510 (see flow 1525), the MCC of the on-line gambling company 1510 would be passed to the credit card issuing entity 1515 (see flow 1530). However, the credit card issuing company 1515 can deny the transaction, because the MCC of the on-line gambling company 1510 is blocked (see flow 1535).
  • However, according to exemplary embodiments, when a transaction passes through the identity management system 100, the MCC of the identity management system 100 can be used instead of that of the vendors. Therefore, consumers 1505 can use their credit cards without unwanted restrictions. For example, assume that the consumer 1505 visits an on-line merchant (e.g., on-line gambling company 1510) whose MCC is blocked by the consumer 1505 credit card issuing entity 1515. If the consumer 1505 uses their Global Identity Credit Card (e.g., identity card 145) (see flow 1540) to, for example, subscribe to an on-line gambling site, the MCC that will be presented to the credit card issuing entity 1515 will be the MCC of the identity management system 100. For example, the on-line gambling company 1510 can communicate the transaction information with the identity management system 100 (see flow 1545). The identity management system 100 can then pass the transaction information and the MCC of the identity management system 100 to the credit card issuing entity 1515 (see flow 1550). Approval for the transaction can then be passed back from the credit card issuing entity 1515 to the identity management system 100 (see flow 1555), and from the identity management system 100 to the on-line gambling company 1510 (see flow 1545) to complete the transaction. Because the MCC of the identity management system 100 would not be blocked, the transaction can occur and be processed. Additionally and as described above, by using the identity management system 100, the user can enjoy a high level of security. Because users can manage, control and set restrictions on their stored accounts, the users can substantially reduce the incidence of credit card and/or identity fraud.
  • A further example of Automated Pre-Authorization can occur when there are no system registration requirements and each financial entity can provide the Automated Pre-Authorization to their clients. FIGS. 12A and 12B are flow diagrams illustrating a transaction 1200 using an automated pre-authorization process for the identity management system 100 without registration and without using a one-time card number, in accordance with an exemplary embodiment of the present invention. In such a scenario, vendors 1002 can download and integrate the appropriate e-commerce APIs into their commerce websites, as discussed with respect steps 1012-1016 of FIGS. 10A and 11A. In addition, in step 1215, a credit card issuing entity 1210 can become a member of the identity management system 100. In step 1220, the credit card issuing entity 1210 can integrate the identity management system 100 into their systems.
  • For purposes of illustration and not limitation, assume that the client 1006 of the member credit card issuing entity 1210 shops on-line. The transaction can continue in the manner discussed in steps 1022-1034 with respect to FIGS. 10A and 11A. In other words, at the check-out page, client 1006 can enter their GID card number (this time issued by the credit card issuing entity 1210) to use the transaction Pre-Authorization. The vendor 1002 can recognize the GID card number and can send the information to the GID API. The GID API can send the vendor a unique URL to present the Pre-Authorization link to the client 1006 (the link can be either pre-stored in the API or the API can be configured to request the link from a secure connection to the identity management system 100). Once the client 1006 clicks on the Pre-Authorization link, in a new or separate window, the client 1006 can follow a secure login protocol to reach the identity management system 100 (through the credit card online management system of the credit card issuing entity 1210). In other words, in step 1225, the client 1006 can securely log into the credit card online management system of the credit card issuing entity 1210. The transaction information can be retrieved and verified from the presented link, as discussed with respect to step 1038 illustrated in FIGS. 10B and 11A. In step 1230, the pre-authorization can be presented to the client from the credit card online management system of the credit card issuing entity 1210. In decision step 1235, a determination can be made as to whether the credit card issuing entity 1210 has the capability to handle multiple credit cards for each client 1006. If so, then in step 1042, the client 1006 can choose the card to which they would like the transaction charged.
  • In FIG. 12B, the flow continues to step 1044 if either the credit card issuing entity has no multi-card capability or if step 1042 is successfully completed. The process can then continue in steps 1046-1062 in the manner discussed previously with respect to FIGS. 10B and 11B. Thus, the submitted order can be cross referenced with the information stored at the identity management system 100 to verify the pre-authorization. The order or transaction can then be verified or rejected based on whether there is a match with the pre-authorization information stored at the identity management system 100.
  • FIGS. 13A and 13B are flow diagrams illustrating a transaction 1300 using an automated pre-authorization process for the identity management system 100 without registration but using a one-time card number, in accordance with an exemplary embodiment of the present invention. The transaction 1300 proceeds with steps 1012-1034 in the manner discussed previously with respect to FIGS. 10A, 11A and 12A. However, steps 1215 and 1220 are not executed for transaction 1300, as no registration takes place by the credit card issuing entity 1210. The flow of transaction 1300 then proceeds through step 1225, 1038, 1230, 1235 and 1042, in the manner discussed with respect to FIG. 12A. In FIG. 13B, the flow of transaction 1300 continues through steps 1044, 1105 and 1046, in the manner discussed with respect to FIG. 11B. However, in step 1310, the one-time use credit card is shown or otherwise presented to the client 1006 through, for example, the credit card online management system of the credit card issuing entity 1210. In other words, after the client 1006 chooses a credit card to be applied to the transaction, the credit card issuing entity 1210 of the client 1006 can provide the client 1006 with a one-time use temporary credit card number that the client 1006 can use to apply to the transaction. The client can take the temporary credit card number and enter it in the appropriate space on the vendor 1006 check-out page (or it can be entered automatically by the system) and click on the submit link to finalize the transaction. The flow of transaction 1300 can then proceed through steps 1048, 1110 and 1052-1062, as discussed with respect to FIG. 11B, so that the order or transaction can then be verified or rejected based on whether there is a match with the pre-authorization information stored at the identity management system 100.
  • According to an alternative exemplary embodiment, although purchase transactions submitted to the identity management system 100 can be automatically processed by the system based on one or more predetermined rules, purchase transactions can be submitted to the identity management system 100 for queuing and manual processing. For purposes of illustration and not limitation, assume a user purchases audio compact discs (CDs) through a catalog, where the company selling the CDs requires that the user buy an additional five CDs every month for six months. According to the alternative exemplary embodiment, the user can put a manual hold on this purchase transaction and review the transaction manually through the identity management system 100 before allowing the merchant to charge the credit card or other form of payment. Thus, the user can be assured that the correct amount for the transaction is being deducted at the correct time. However, such a process can also be automated through an appropriate rule set, such as, for example, where any transactions conducted by this merchant can be restricted to a certain amount per month per charge for a maximum of six months.
  • The identity management system 100 of the present invention can also be used to combat mail fraud to which the user may fail prey. Referring to FIG. 1, according to exemplary embodiments, the identity management system 100 can include an address identification code generation module 155 in communication with, for example, the total identification score generation module 115. The address identification code generation module 155 is configured to generate an address identification code associated with an address of the user. For example, a user of the identity management system 100 can establish an address (e.g., the user's home address) and the identity management system 100 will generate a unique address identification code associated with that address. The address identification code can be any suitable number (e.g., a random number, code or the like) that uniquely identifies a user and the user's associated address. For example, if the user's home address is 123 Street, Smith City, Va. 12345, the address identification code generation module 155 can generate a unique address identification code such as, for example, 187653 that represents the user's address. The address identification code and an address of a communication reception center (e.g., a generic mail processing center) can be given to a third party. For example, the address information could be 123 Processing Street, Box 187653, New City, Utah 54321, in which the address identification code forms the box number of the address of the communication reception center. Any communications sent to the user at that address by the third party are received at the communications reception center.
  • Once the communications or other mail are received by the communication reception center, the communications can be scanned or otherwise entered into the identity management system 100 and made available to the user associated with the address identification code. For example, the identity management system 100 can include a communication display module 160 in communication with, for example, the total identification score generation module 115. The communication display module 160 is configured to format the communications for display to the user associated with the address identification code (e.g., through the graphical user interface 170). Thus, the user can be notified of incoming mail (e.g., through electronic notification, such as e-mail) and access its mail, for example, remotely over the Internet by logging into the identity management system 100 and retrieve any and all communications received at the communication reception center.
  • Furthermore, instead of sending confidential material to the user through the mail (e.g., credit card statements, bank statements and other the like confidential material), the respective financial or other like institutions can access the identity management system 100 and enter such information into the system. Consequently, the user can access its financial statements and other confidential information directly from the identity management system 100, without the need to generate postal mail. In this manner, confidential communications can be sent to the user in a secure manner, without fear that such mail could be stolen from, for example, the user's mailbox. Such an advantage is particularly important where an identity thief could steal a credit card statement from a user's mailbox and use the information contained within the credit card statement to create another credit card for illegal use by the identity thief.
  • Identity theft threatens every societal and economical sector. Healthcare is not immune from this threat. According to an exemplary embodiment of the present invention, the identity management system 100 can also be used to prevent healthcare identity theft. For example, a patient can go to the healthcare provider. To register the patient for the first time, the administrator can enter the patient's drivers license or other unique identifying documentation into the identity management system 100, as well as any other required patient's personal information, billing information, scheduling and the like. For healthcare providers, access to identity management system 100 can be granted to authorized administrators. Each authorized administrator can have a unique PIN for accessing identity information in the identity management system 100. However, all accesses can be recorded and logged for security purposes. The identity management system 100 can be integrated with other suitable systems to retrieve, for example, other healthcare-related information and the like.
  • If the patient does not have a drivers license or other identifying documentation, a unique identifying number can be assigned to the patient that is maintained by the identity management system 100. The identifying number can be associated with an appropriate barcode. The identifying number and barcode can be placed on a card for the patient to maintain. During future visits, the patient can present the card to sign-in with the healthcare provider. The patient's identification information and healthcare information can be maintained securely in the identity management system 100. Consequently, secure identity information will not have to be included in the patient's physical or electronic files. The patient's physical file can be assigned a barcode that correlates to the patient's unique identifying number to allow for easy retrieval from the healthcare provider's file room. The healthcare provider can then store patient files without concerns for information theft. Such a system can also place the healthcare providers in compliance with HIPAA regulations, because the patient's secure identity information has been removed from the files, thereby preserving patient identity privacy.
  • The identity management system 100 can include an identity risk factor generation module 165 in communication with, for example, the total identification score generation module 115. The identity risk factor generation module 165 is configured to generate an identity risk factor associated with the user. According to exemplary embodiments, the identity risk factor is associated with a level of risk of theft of the identity of the user by identity thieves. For example, the identity risk factor generation module 165 is configured to determine the exposure of a user's identity by analyzing such factors as, for example, the number and types of uses of the user's identity. For example, if a user uses its identity to perform numerous online purchases with companies located in certain third world countries, the identity risk factor generation module 165 can determine that the level of risk of theft of the user's identity is high, and can generate a correspondingly high identity risk factor. However, if a user uses its identity only sporadically to apply for credit with reputable financial institutions, the identity risk factor generation module 165 can determine that the level of risk of theft of the user's identity is low, and generate a correspondingly low identity risk factor. Thus, by analyzing the pattern and types of uses of a user's identity (e.g., as maintained by the log module 135), the identity risk factor generation module 165 can generate an appropriate identity risk factor. The user can then use the identity risk factor to reduce its exposure to potential identity theft by, for example, modifying the manner and types of uses of the user's identity.
  • The identity management system 100 can also include any suitable type of graphical user interface 170 configured to provide access to, either locally or remotely, and management of identification information associated with the user. Thus, the graphical user interface 170 can be, for example, any suitable Web browser that can support secure connections and remote access to the identity management system 100. The graphical user interface 170 can be displayed on any suitable computer display or monitor capable of displaying graphical and/or textual information to a user and which allows a user to enter information (e.g., commands, information and the like) through, for example, a keyboard, a touch-screen, any type of pointing device, electronic pen, and the like. The graphical user interface 170 can be used by the user to access, control and manage any and all of the functionality of the identity management system 100, including viewing and managing the user's identity profile, viewing identity reports, and the like.
  • Each of modules of identity management system 100, including identification score assignment module 105, total identification score generation module 115, access code generation module 125, data transmission module 130, log module 135, report generation module 140, transaction order generation module 150, address identification code generation module 155, communication display module 160 and identity risk factor generation module 165, or any combination thereof, can be comprised of any suitable type of electrical or electronic component or device that is capable of performing the functions associated with the respective element. According to such an exemplary embodiment, each component or device can be in communication with another component or device using any appropriate type of electrical connection that is capable of carrying electrical information. Alternatively, each of the modules of identity management system 100 can be comprised of any combination of hardware, firmware and software that is capable of performing the function associated with the respective module. In addition, communication link 133 can be comprised of any suitable type of communication medium or channel capable of transmitting and receiving electrical information.
  • Alternatively, the identity management system 100 can be comprised of a microprocessor and associated memory that stores the steps of a computer program to perform the functions of the modules of the identity management system 100. The microprocessor can be any suitable type of processor, such as, for example, any type of general purpose microprocessor or microcontroller, a digital signal processing (DSP) processor, an application-specific integrated circuit (ASIC), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically-erasable programmable read-only memory (EEPROM), a computer-readable medium, or the like. The memory can be any suitable type of computer memory or any other type of electronic storage medium, such as, for example, read-only memory (ROM), random access memory (RAM), cache memory, compact disc read-only memory (CDROM), electro-optical memory, magneto-optical memory, or the like. As will be appreciated based on the foregoing description, the memory can be programmed using conventional techniques known to those having ordinary skill in the art of computer programming. For example, the actual source code or object code of the computer program can be stored in the memory.
  • FIGS. 2A-2C are flowcharts illustrating steps for verifying an identity of a user, in accordance with an exemplary embodiment of the present invention. In step 201 of FIG. 2A, at least one source of identification of the user is received. According to exemplary embodiments, the at least one source of identification can comprise a driver's license of the user, a birth certificate of the user or the like. The identification score assigned to each of the at least one source of identification is based upon a reliability of the at least one source of identification. In step 204, an identification score is assigned to each of the at least one source of identification. In step 207, a total identification score of the user is generated from the identification scores of each of the at least one source of identification and a predetermined function. The predetermined function can comprise a summing function, a weighted summing function or the like. The total identification score of the user is associated with a level of verification of the identity of the user. The total identification score of the user is compared to a minimum identification score associated with a transaction. The transaction can comprise an application for credit, a purchase transaction or the like. The transaction is performed when the total identification score of the user is one of greater than and equal to the minimum identification score. Additional sources of identification of the user are received before performing the transaction when the total identification score is less than the minimum identification score.
  • In step 210, at least one of personal information and financial information of the user can be supplied to a third party. The total identification score can be associated with the at least one of personal information and financial information of the user. In step 213, a unique identity access authorization code associated with the user can be generated for use by a third party in the transaction. In step 216, at least the total identification score of the user can be transmitted to the third party upon verification of the identity access authorization code. At least the total identification score of the user can be transmitted to the third party upon further verification of a user identification code of the user. The user identification code can comprise a social security number of the user or the like. In step 219, accesses associated with the total identification score of the user by the third party can be recorded. In step 222, the record of accesses associated with the total identification score of the user can be reviewed. In step 225, at least one of personal information and financial information associated with the user can be transmitted to the third party upon verification of the identity access authorization code of the user. The at least one of personal information and financial information associated with the user can be transmitted to the third party upon further verification of a user identification code of the user. The user identification code can comprise a social security number of the user or the like.
  • In step 228 of FIG. 2B, an identity card securely containing identification information associated with the user can be issued. The identity card can comprise a smart card or the like. The identification information associated with the user can be encrypted on the identity card. In step 231, uses of the identification information securely contained on the identity card can be restricted. The uses of the identification information can be restricted in many ways. For example, FIG. 3 is a flowchart illustrating steps for restricting uses of identification information securely contained on an identity card, in accordance with an exemplary embodiment of the present invention. In step 305 of FIG. 3, locations of where the identification information is used can be restricted. In step 310, times of when the identification information is used can be restricted. In step 315, types of transactions for which the identification information is used can be restricted.
  • Returning to FIG. 2B, in step 234, a determination can be made as to whether use of the identification information is restricted by the user for the transaction. If so, then in step 237, use of the identification information can be prohibited for the transaction. If not, then in step 240, the identification information can be used for the transaction. In either case, in step 243, a transaction order can be generated using the total identification score of the user. In step 246, the transaction order can be submitted to perform the transaction. In step 249, at least one of personal information and financial information of the user can be transmitted, upon verification of the transaction order, to complete the transaction.
  • In FIG. 2C, in step 252, an address identification code can be associated with an address of the user. In step 255, the address identification code and an address of a communication reception center can be supplied to a third party. In step 258, communications for the user can be received from the third party at the communication reception center. The communications can include the address identification code, for example, as part of the address on the communications. In step 261, the communications can be supplied to the user associated with the address identification code. In step 264, an identity risk factor associated with the user can be supplied. The identity risk factor is associated with a level of risk of theft of the identity of the user by identity thieves.
  • FIG. 4 is a flowchart illustrating steps for verifying an identity of a user, in accordance with an alternative exemplary embodiment of the present invention. In step 405, at least one source of identification of the user is received. In step 410, an identification score is assigned to each of the at least one source of identification. In step 415, a total identification score of the user is generated from the identification scores of each of the at least one source of identification and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user. In step 420, the total identification score of the user is compared to a minimum identification score associated with a transaction. In step 425, the transaction is approved when the total identification score of the user is one of greater than and equal to the minimum identification score. In step 430, additional sources of identification of the user are requested before approving the transaction when the total identification score is less than the minimum identification score.
  • FIG. 5 is a flowchart illustrating steps for verifying an identity of a user, in accordance with an alternative exemplary embodiment of the present invention. In step 505, at least one source of identification of the user is received. In step 510, an identification score is assigned to each of the at least one source of identification. In step 515, a total identification score of the user is generated from the identification scores of each of the at least one source of identification and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user. In step 520, approval of the transaction is received when the total identification score of the user is one of greater than and equal to a minimum identification score. In step 525, a request for additional sources of identification of the user is received before receiving approval of the transaction when the total identification score is less than the minimum identification score.
  • FIG. 6 is a flowchart illustrating steps for verifying an identity of a user, in accordance with an alternative exemplary embodiment of the present invention. In step 605, a total identification score of the user is received. The total identification score is generated from identification scores assigned to each of at least one source of identification of the user and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user. In step 610, the total identification score of the user is compared to a minimum identification score associated with a transaction. In step 615, the transaction is approved when the total identification score of the user is one of greater than and equal to the minimum identification score. In step 620, additional sources of identification of the user are requested before approving the transaction when the total identification score is less than the minimum identification score.
  • Any or all of the steps of a computer program as illustrated in FIGS. 2A, 2B, 2C and 3-6 for identity verification and management can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. As used herein, a “computer-readable medium” can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. The computer readable medium can be, for example but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device, or propagation medium. More specific examples (a non-exhaustive list) of the computer-readable medium can include the following: an electrical connection having one or more wires, a portable computer diskette, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, and a portable compact disc read-only memory (CDROM).
  • Exemplary embodiments of the present invention can be used in conjunction with any device, system, process or transaction in which the reliability and authenticity of the identification information associated with a user is needed. For example, exemplary embodiments can be used by financial institutions as part of various types of financial transactions (e.g., applications for credit), by retail establishments as part of various types of purchase transactions (e.g., online or in-person merchandise purchases using credit cards), by credit reporting agencies to maintain, manage and verify the identity of users in conjunction with the maintenance of the credit history of a user, and the like.
  • It will be appreciated by those of ordinary skill in the art that the present invention can be embodied in various specific forms without departing from the spirit or essential characteristics thereof. The presently disclosed embodiments are considered in all respects to be illustrative and not restrictive. The scope of the invention is indicated by the appended claims, rather than the foregoing description, and all changes that come within the meaning and range of equivalence thereof are intended to be embraced.
  • All United States patents and applications, foreign patents, and publications discussed above are hereby incorporated herein by reference in their entireties.

Claims (20)

1. A system for verifying an identity of a user during a transaction, the system comprising:
an identity card, the identity card comprising a computer readable medium;
wherein the computer readable medium has information associated with the user stored thereon;
an identification server operatively coupled to a processor and configured to generate an identification score for the user;
wherein the identification score is associated with a level of verification of the identity of the user;
wherein the identification score is stored to an information database;
an identity management server communicatively coupled with a computer network and the information database;
wherein the identity management system receives a query from a third party via the computer network for identification information;
wherein the identity management system receives the information from the identity card via the computer network;
wherein the identity management system processes the information from the identity card and queries the information database for the identification information and an identification score associated with the information from the identity card;
wherein the identity management system communicates the identification information and the identification score to the third party;
wherein the transaction is performed when
(i) the identification score of the user is greater than or equal to a minimum threshold value, and
(ii) the transaction does not fall within a user-specified restriction.
2. The system of claim 1, wherein said readable media comprises at least one of: (i) smart chip; (ii) magnetic strip; and (iii) RFID.
3. The system of claim 1, wherein the identity card is a mobile phone or a PDA.
4. The system of claim 1, wherein the information contained on the identity card includes at least one user-specified restriction.
5. The system of claim 1, wherein the information stored on the card is encrypted.
6. The system of claim 5, wherein the third party decrypts the information stored on the card as part of a transaction.
7. The system of claim 1, wherein the information stored on the card includes an identity access authorization code.
8. The system of claim 1, wherein the identification information comprises at least one of: (i) an identity risk factor; (ii) biometric data associated with the user; (iii) financial information associated with the user; and (iv) a total identification score for the user.
9. The system of claim 8, wherein the financial information includes account information for one or more credit cards.
10. The system of claim 1, wherein the one or more user-specified restrictions limit the transaction based at least one of: (i) geographic location; (ii) time of day; (iii) date; (iv) type of transaction; (v) value of transaction; and (vi) payment method.
11. A method for reducing fraud in financial transactions, the method comprising:
receiving a request from a point-of-sale for authorization of a transaction associated with an account;
communicating a message to a mobile device associated with the account soliciting authorization from the account holder, wherein the message provides the account holder with a option of approving or denying the transaction; and
authorizing the transaction when an approval response is communicated by the account holder and denying the transaction when a denial response is communicated by the account holder.
12. The method of claim 11, wherein the transaction is denied when a response is not communicated by the account holder.
13. The method of claim 11, wherein the transaction is approved without communicating a message to the account holder when the transaction is preapproved by the account holder.
14. A system for facilitating transactions using a universal credit card, the system comprising:
an identity card, the identity card comprising a computer readable medium;
wherein the computer readable medium has account information associated with two or more credit cards stored thereon;
wherein each of said one or more credit cards is associated with a unique PIN;
an identity management server communicatively coupled with a computer network and a credit card processing server;
wherein the identity management system receives a transaction authorization request from a third party through the computer network, the transaction authorization request including at least one of
(i) the unique PIN selected by the user, and
(ii) account information associated with a selected credit card;
wherein the identity management system queries an information database for an issuing bank associated with the
(i) the unique PIN selected by the user, or
(ii) account information associated with a selected credit card;
wherein the identity management system determines an availability of funds by communicating with the issuing bank through the card processing server;
wherein the identity management system transmits an authorization message to the third party when funds are available, and transmits an authorization declined message to the third party when funds are not available
15. The system of claim 14, wherein a default credit card is automatically selected when the user does not select a unique PIN.
16. The system of claim 14, wherein said readable media comprises as least one of: (i) smart chip; (ii) magnetic strip; and (iii) RFID.
17. The system of claim 14, wherein the identity card is a mobile phone or a PDA.
18. The system of claim 14, wherein the information stored on the card is encrypted.
19. The system of claim 14, wherein the identity management system transmits an authorization declined message to the third party when the transaction fall within one or more user-specified restrictions.
20. The system of claim 19, wherein the one or more user-specified restrictions limit the transaction based at least one of: (i) geographic location; (ii) time of day; (iii) date; (iv) type of transaction; (v) value of transaction; and (vi) payment method.
US13/524,312 2004-12-07 2012-06-15 System and method for identity verification and management Abandoned US20120290482A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/524,312 US20120290482A1 (en) 2004-12-07 2012-06-15 System and method for identity verification and management

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US63341904P 2004-12-07 2004-12-07
US69799105P 2005-07-12 2005-07-12
US11/295,516 US8224753B2 (en) 2004-12-07 2005-12-07 System and method for identity verification and management
US13/524,312 US20120290482A1 (en) 2004-12-07 2012-06-15 System and method for identity verification and management

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US11/295,516 Continuation US8224753B2 (en) 2004-12-07 2005-12-07 System and method for identity verification and management

Publications (1)

Publication Number Publication Date
US20120290482A1 true US20120290482A1 (en) 2012-11-15

Family

ID=36578498

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/295,516 Active 2029-03-05 US8224753B2 (en) 2004-12-07 2005-12-07 System and method for identity verification and management
US13/524,312 Abandoned US20120290482A1 (en) 2004-12-07 2012-06-15 System and method for identity verification and management

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US11/295,516 Active 2029-03-05 US8224753B2 (en) 2004-12-07 2005-12-07 System and method for identity verification and management

Country Status (4)

Country Link
US (2) US8224753B2 (en)
GB (1) GB0712870D0 (en)
TW (1) TW200642408A (en)
WO (1) WO2006062998A2 (en)

Cited By (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120254017A1 (en) * 2011-03-30 2012-10-04 Fusco Douglas D System and Method for Credit Information Acquisition, Aggregation, and Maintenance
US20130066767A1 (en) * 2011-03-30 2013-03-14 Douglas D. Fusco System and Method for Credit Information Acquisition, Aggregation, and Funding
US20140040130A1 (en) * 2012-07-31 2014-02-06 Google Inc. Merchant category codes in a proxy card transaction
US20140172690A1 (en) * 2012-12-17 2014-06-19 Sas Institute Inc. Systems and Methods For Matching Domain Specific Transactions
US20140297435A1 (en) * 2013-03-28 2014-10-02 Hoiling Angel WONG Bank card secured payment system and method using real-time communication technology
WO2014182785A1 (en) * 2013-05-07 2014-11-13 Ramalingam Krishnamurthi Anand Fraud prevention for transactions
US9020859B2 (en) 2013-05-13 2015-04-28 Ramalingam Krishnamurthi Anand Fraud prevention for transactions
WO2015191741A1 (en) * 2014-06-10 2015-12-17 Board Of Trustees Of The Leland Stanford Junior University Office Of The General Counsel Systems and methods for conducting relationship dependent online transactions
US20160203531A1 (en) * 2013-10-01 2016-07-14 Amadellas Corporation Devices and methods for information processing and access control
US9406065B2 (en) 2014-03-04 2016-08-02 Bank Of America Corporation Customer token preferences interface
US9424572B2 (en) 2014-03-04 2016-08-23 Bank Of America Corporation Online banking digital wallet management
US9525685B2 (en) 2014-02-07 2016-12-20 Bank Of America Corporation User authentication based on other applications
US9600844B2 (en) 2014-03-04 2017-03-21 Bank Of America Corporation Foreign cross-issued token
US9600817B2 (en) 2014-03-04 2017-03-21 Bank Of America Corporation Foreign exchange token
US9628495B2 (en) 2014-02-07 2017-04-18 Bank Of America Corporation Self-selected user access based on specific authentication types
US9647999B2 (en) 2014-02-07 2017-05-09 Bank Of America Corporation Authentication level of function bucket based on circumstances
US9721268B2 (en) 2014-03-04 2017-08-01 Bank Of America Corporation Providing offers associated with payment credentials authenticated in a specific digital wallet
US9721248B2 (en) 2014-03-04 2017-08-01 Bank Of America Corporation ATM token cash withdrawal
US9729536B2 (en) 2015-10-30 2017-08-08 Bank Of America Corporation Tiered identification federated authentication network system
US9819680B2 (en) 2014-02-07 2017-11-14 Bank Of America Corporation Determining user authentication requirements based on the current location of the user in comparison to the users's normal boundary of location
US9830597B2 (en) 2014-03-04 2017-11-28 Bank Of America Corporation Formation and funding of a shared token
WO2017213719A1 (en) 2016-06-06 2017-12-14 Thomson Reuters Global Resources Systems and methods for providing identity scores
US9965606B2 (en) 2014-02-07 2018-05-08 Bank Of America Corporation Determining user authentication based on user/device interaction
US10002352B2 (en) 2014-03-04 2018-06-19 Bank Of America Corporation Digital wallet exposure reduction
US10026119B2 (en) * 2012-09-10 2018-07-17 Google Llc Efficient transfer of funds between accounts
US20180276652A1 (en) * 2015-09-03 2018-09-27 Dionisios A. Sofronas Contactless mobile payment system
US10176542B2 (en) * 2014-03-24 2019-01-08 Mastercard International Incorporated Systems and methods for identity validation and verification
US10268635B2 (en) 2016-06-17 2019-04-23 Bank Of America Corporation System for data rotation through tokenization
US10313480B2 (en) 2017-06-22 2019-06-04 Bank Of America Corporation Data transmission between networked resources
US10402817B1 (en) * 2018-10-12 2019-09-03 Capital One Services, Llc Relaxed fraud detection for transactions using virtual transaction cards
US10460367B2 (en) 2016-04-29 2019-10-29 Bank Of America Corporation System for user authentication based on linking a randomly generated number to the user and a physical item
US10469504B1 (en) 2017-09-08 2019-11-05 Stripe, Inc. Systems and methods for using one or more networks to assess a metric about an entity
US10496998B1 (en) * 2018-05-15 2019-12-03 Capital One Services, Llc Generating a random verification code for a transaction
US10511692B2 (en) 2017-06-22 2019-12-17 Bank Of America Corporation Data transmission to a networked resource based on contextual information
US10524165B2 (en) 2017-06-22 2019-12-31 Bank Of America Corporation Dynamic utilization of alternative resources based on token association
US10574643B2 (en) 2016-09-09 2020-02-25 Trusona, Inc. Systems and methods for distribution of selected authentication information for a network of devices
US10614452B2 (en) 2014-09-16 2020-04-07 Mastercard International Incorporated Systems and methods for providing risk based decisioning service to a merchant
US10678898B2 (en) * 2013-05-13 2020-06-09 Veridium Ip Limited System and method for authorizing access to access-controlled environments
US11210380B2 (en) * 2013-05-13 2021-12-28 Veridium Ip Limited System and method for authorizing access to access-controlled environments
US11323420B2 (en) * 2017-11-16 2022-05-03 Visa International Service Association Providing assertions regarding entities
US11321716B2 (en) 2019-02-15 2022-05-03 Visa International Service Association Identity-based transaction processing
TWI767254B (en) * 2020-06-17 2022-06-11 玉山商業銀行股份有限公司 Authorization system and method thereof
US11423758B2 (en) 2018-04-09 2022-08-23 State Farm Mutual Automobile Insurance Company Sensing peripheral heuristic evidence, reinforcement, and engagement system
US11423754B1 (en) 2014-10-07 2022-08-23 State Farm Mutual Automobile Insurance Company Systems and methods for improved assisted or independent living environments
US11706225B1 (en) 2022-05-02 2023-07-18 Bank Of America Corporation System for source independent but source value dependent transfer monitoring

Families Citing this family (461)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9400589B1 (en) 2002-05-30 2016-07-26 Consumerinfo.Com, Inc. Circular rotational interface for display of consumer credit information
US9710852B1 (en) 2002-05-30 2017-07-18 Consumerinfo.Com, Inc. Credit report timeline user interface
US7792715B1 (en) 2002-09-21 2010-09-07 Mighty Net, Incorporated Method of on-line credit information monitoring and control
CA2724292C (en) 2003-05-30 2014-09-30 Privaris, Inc. An in-circuit security system and methods for controlling access to and use of sensitive data
US7617501B2 (en) 2004-07-09 2009-11-10 Quest Software, Inc. Apparatus, system, and method for managing policies on a computer having a foreign operating system
WO2006039003A2 (en) * 2004-08-20 2006-04-13 Viisage Technology, Inc. Method and system to authenticate an object
US8732004B1 (en) 2004-09-22 2014-05-20 Experian Information Solutions, Inc. Automated analysis of data to generate prospect notifications based on trigger events
US7431207B1 (en) * 2005-01-05 2008-10-07 American Express Travel Related Services Co., Inc. System and method for two-step payment transaction authorizations
US7566002B2 (en) * 2005-01-06 2009-07-28 Early Warning Services, Llc Identity verification systems and methods
US8226001B1 (en) 2010-06-23 2012-07-24 Fiteq, Inc. Method for broadcasting a magnetic stripe data packet from an electronic smart card
KR20070119051A (en) 2005-03-26 2007-12-18 프라이베이시스, 인크. Electronic financial transaction cards and methods
US8684267B2 (en) 2005-03-26 2014-04-01 Privasys Method for broadcasting a magnetic stripe data packet from an electronic smart card
US8175889B1 (en) 2005-04-06 2012-05-08 Experian Information Solutions, Inc. Systems and methods for tracking changes of address based on service disconnect/connect data
US20070280436A1 (en) * 2006-04-14 2007-12-06 Anthony Rajakumar Method and System to Seed a Voice Database
US9571652B1 (en) 2005-04-21 2017-02-14 Verint Americas Inc. Enhanced diarization systems, media and methods of use
US9113001B2 (en) 2005-04-21 2015-08-18 Verint Americas Inc. Systems, methods, and media for disambiguating call data to determine fraud
US20120253805A1 (en) 2005-04-21 2012-10-04 Anthony Rajakumar Systems, methods, and media for determining fraud risk from audio signals
US8073691B2 (en) * 2005-04-21 2011-12-06 Victrio, Inc. Method and system for screening using voice data and metadata
US8924285B2 (en) * 2005-04-21 2014-12-30 Verint Americas Inc. Building whitelists comprising voiceprints not associated with fraud and screening calls using a combination of a whitelist and blacklist
US8793131B2 (en) 2005-04-21 2014-07-29 Verint Americas Inc. Systems, methods, and media for determining fraud patterns and creating fraud behavioral models
US8639757B1 (en) 2011-08-12 2014-01-28 Sprint Communications Company L.P. User localization using friend location information
US20120053939A9 (en) * 2005-04-21 2012-03-01 Victrio Speaker verification-based fraud system for combined automated risk score with agent review and associated user interface
US8930261B2 (en) * 2005-04-21 2015-01-06 Verint Americas Inc. Method and system for generating a fraud risk score using telephony channel based audio and non-audio data
US8510215B2 (en) * 2005-04-21 2013-08-13 Victrio, Inc. Method and system for enrolling a voiceprint in a fraudster database
US20060248019A1 (en) * 2005-04-21 2006-11-02 Anthony Rajakumar Method and system to detect fraud using voice data
WO2006116772A2 (en) 2005-04-27 2006-11-02 Privasys, Inc. Electronic cards and methods for making same
US7793851B2 (en) * 2005-05-09 2010-09-14 Dynamics Inc. Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card
US20070094152A1 (en) * 2005-10-20 2007-04-26 Bauman Brian D Secure electronic transaction authentication enhanced with RFID
US7904949B2 (en) 2005-12-19 2011-03-08 Quest Software, Inc. Apparatus, systems and methods to provide authentication services to a legacy application
US8087075B2 (en) 2006-02-13 2011-12-27 Quest Software, Inc. Disconnected credential validation using pre-fetched service tickets
CN100556042C (en) * 2006-03-10 2009-10-28 腾讯科技(深圳)有限公司 A kind of accounts security management system and method based on instant messaging
US7912762B2 (en) 2006-03-31 2011-03-22 Amazon Technologies, Inc. Customizable sign-on service
US7874005B2 (en) * 2006-04-11 2011-01-18 Gold Type Business Machines System and method for non-law enforcement entities to conduct checks using law enforcement restricted databases
US8738921B2 (en) 2006-05-16 2014-05-27 Transactionsecure Llc System and method for authenticating a person's identity using a trusted entity
US8429712B2 (en) 2006-06-08 2013-04-23 Quest Software, Inc. Centralized user authentication system apparatus and method
US7725128B2 (en) * 2006-09-06 2010-05-25 Genmobi Technologies, Inc. Integrated instant messaging and web browsing client and related methods
US8424061B2 (en) * 2006-09-12 2013-04-16 International Business Machines Corporation Method, system and program product for authenticating a user seeking to perform an electronic service request
US8118223B2 (en) 2006-09-28 2012-02-21 Visa U.S.A. Inc. Smart sign mobile transit fare payment
US8346639B2 (en) * 2007-02-28 2013-01-01 Visa U.S.A. Inc. Authentication of a data card using a transit verification value
US20080203170A1 (en) * 2007-02-28 2008-08-28 Visa U.S.A. Inc. Fraud prevention for transit fare collection
US8523069B2 (en) 2006-09-28 2013-09-03 Visa U.S.A. Inc. Mobile transit fare payment
US8738485B2 (en) 2007-12-28 2014-05-27 Visa U.S.A. Inc. Contactless prepaid product for transit fare collection
US8386349B2 (en) * 2007-02-28 2013-02-26 Visa U.S.A. Inc. Verification of a portable consumer device in an offline environment
US7527208B2 (en) * 2006-12-04 2009-05-05 Visa U.S.A. Inc. Bank issued contactless payment card used in transit fare collection
US8036979B1 (en) 2006-10-05 2011-10-11 Experian Information Solutions, Inc. System and method for generating a finance attribute from tradeline data
US8239677B2 (en) * 2006-10-10 2012-08-07 Equifax Inc. Verification and authentication systems and methods
US8086710B2 (en) 2006-10-30 2011-12-27 Quest Software, Inc. Identity migration apparatus and method
US7895332B2 (en) 2006-10-30 2011-02-22 Quest Software, Inc. Identity migration system apparatus and method
US20080288299A1 (en) * 2006-10-31 2008-11-20 Genmobi Technologies, Inc. System and method for user identity validation for online transactions
US8515847B2 (en) * 2006-10-31 2013-08-20 Microfolio Data, Llc System and method for password-free access for validated users
US20080114987A1 (en) * 2006-10-31 2008-05-15 Novell, Inc. Multiple security access mechanisms for a single identifier
US20080120558A1 (en) 2006-11-16 2008-05-22 Paco Xander Nathan Systems and methods for managing a persistent virtual avatar with migrational ability
US9253183B2 (en) * 2006-11-16 2016-02-02 Mark Stephen Meadows Systems and methods for authenticating an avatar
US7657569B1 (en) 2006-11-28 2010-02-02 Lower My Bills, Inc. System and method of removing duplicate leads
US7778885B1 (en) 2006-12-04 2010-08-17 Lower My Bills, Inc. System and method of enhancing leads
CN101197131B (en) * 2006-12-07 2011-03-30 积体数位股份有限公司 Accidental vocal print password validation system, accidental vocal print cipher lock and its generation method
US7786935B2 (en) * 2007-01-07 2010-08-31 Connectsoft, Inc. Method and system for inferring a location of a mobile computing device
US8606666B1 (en) 2007-01-31 2013-12-10 Experian Information Solutions, Inc. System and method for providing an aggregation tool
US8606626B1 (en) 2007-01-31 2013-12-10 Experian Information Solutions, Inc. Systems and methods for providing a direct marketing campaign planning environment
TWI464699B (en) * 2007-03-29 2014-12-11 Alibaba Group Holding Ltd And a payment system and a method for trading with an ID card containing an IC card
US8285656B1 (en) 2007-03-30 2012-10-09 Consumerinfo.Com, Inc. Systems and methods for data verification
US20080261698A1 (en) * 2007-04-18 2008-10-23 Technology Assurance Laboratory, Inc. Automated method and system for a gaming opportunity
US20080270154A1 (en) * 2007-04-25 2008-10-30 Boris Klots System for scoring click traffic
US11257080B2 (en) 2007-05-04 2022-02-22 Michael Sasha John Fraud deterrence for secure transactions
US10853855B2 (en) * 2007-05-20 2020-12-01 Michael Sasha John Systems and methods for automatic and transparent client authentication and online transaction verification
US20080294540A1 (en) 2007-05-25 2008-11-27 Celka Christopher J System and method for automated detection of never-pay data sets
US20090006230A1 (en) * 2007-06-27 2009-01-01 Checkfree Corporation Identity Risk Scoring
US8271285B2 (en) * 2007-08-02 2012-09-18 International Business Machines Corporation Using speaker identification and verification speech processing technologies to activate and deactivate a payment card
US20090076959A1 (en) * 2007-09-11 2009-03-19 Patrick Devaney System and method for brokering ad hoc personal identification transactions between two consenting parties
EP2947592B1 (en) 2007-09-24 2021-10-27 Apple Inc. Embedded authentication systems in an electronic device
US8792118B2 (en) 2007-09-26 2014-07-29 Ringcentral Inc. User interfaces and methods to provision electronic facsimiles
US8275110B2 (en) 2007-09-28 2012-09-25 Ringcentral, Inc. Active call filtering, screening and dispatching
US8670545B2 (en) 2007-09-28 2014-03-11 Ringcentral, Inc. Inbound call identification and management
US8600391B2 (en) 2008-11-24 2013-12-03 Ringcentral, Inc. Call management for location-aware mobile devices
US9098844B2 (en) 2007-11-20 2015-08-04 Wells Fargo Bank, N.A. Mobile electronic wallet
US8127986B1 (en) 2007-12-14 2012-03-06 Consumerinfo.Com, Inc. Card registry systems and methods
US9990674B1 (en) 2007-12-14 2018-06-05 Consumerinfo.Com, Inc. Card registry systems and methods
US8020775B2 (en) 2007-12-24 2011-09-20 Dynamics Inc. Payment cards and devices with enhanced magnetic emulators
US8600120B2 (en) 2008-01-03 2013-12-03 Apple Inc. Personal computing device control using face detection and recognition
US10373198B1 (en) 2008-06-13 2019-08-06 Lmb Mortgage Services, Inc. System and method of generating existing customer leads
EP3054408A1 (en) * 2008-06-24 2016-08-10 HSBC Technology & Services (USA) Inc. Methods and systems for verifying customer supplied financial account information using debit and credit transactions
US8478692B2 (en) 2008-06-26 2013-07-02 Visa International Service Association Systems and methods for geographic location notifications of payment transactions
US8312033B1 (en) 2008-06-26 2012-11-13 Experian Marketing Solutions, Inc. Systems and methods for providing an integrated identifier
US9542687B2 (en) 2008-06-26 2017-01-10 Visa International Service Association Systems and methods for visual representation of offers
US9256904B1 (en) 2008-08-14 2016-02-09 Experian Information Solutions, Inc. Multi-bureau credit file freeze and unfreeze
RU2011116158A (en) 2008-09-25 2012-10-27 Виза Интернэшнл Сервис Ассосиэйшн (Us) METHOD AND SYSTEM FOR SORTING WARNING MESSAGES AND OFFERS ON MOBILE DEVICE
US20100082490A1 (en) * 2008-09-30 2010-04-01 Apple Inc. Systems and methods for secure wireless transactions
US8307412B2 (en) * 2008-10-20 2012-11-06 Microsoft Corporation User authentication management
US20100114573A1 (en) * 2008-10-30 2010-05-06 Motorola, Inc. Method and Device for Verifying a User
US8060424B2 (en) 2008-11-05 2011-11-15 Consumerinfo.Com, Inc. On-line method and system for monitoring and reporting unused available credit
US20100122347A1 (en) * 2008-11-13 2010-05-13 International Business Machines Corporation Authenticity ratings based at least in part upon input from a community of raters
US8621642B2 (en) * 2008-11-17 2013-12-31 Digitalpersona, Inc. Method and apparatus for an end user identity protection suite
US8780383B2 (en) 2008-11-25 2014-07-15 Ringcentral, Inc. Authenticated facsimile transmission from mobile devices
WO2010062981A2 (en) 2008-11-26 2010-06-03 Ringcentral, Inc. Centralized status server for call management of location-aware mobile devices
US20100153278A1 (en) * 2008-12-16 2010-06-17 Farsedakis Lewis E Web sites that introduce a seller to a universe of buyers, web sites that receive a buyer's listing of what he wants to buy, other introduction web sites, systems using introduction web sites and internet-based introductions
US8579203B1 (en) 2008-12-19 2013-11-12 Dynamics Inc. Electronic magnetic recorded media emulators in magnetic card devices
US8931703B1 (en) 2009-03-16 2015-01-13 Dynamics Inc. Payment cards and devices for displaying barcodes
US20100241498A1 (en) * 2009-03-19 2010-09-23 Microsoft Corporation Dynamic advertising platform
US9886693B2 (en) * 2009-03-30 2018-02-06 Yuh-Shen Song Privacy protected anti identity theft and payment network
US20110225045A1 (en) * 2009-03-30 2011-09-15 Yuh-Shen Song Paperless Coupon Transactions System
US9329619B1 (en) 2009-04-06 2016-05-03 Dynamics Inc. Cards with power management
US10176419B1 (en) 2009-04-06 2019-01-08 Dynamics Inc. Cards and assemblies with user interfaces
US8622309B1 (en) 2009-04-06 2014-01-07 Dynamics Inc. Payment cards and devices with budgets, parental controls, and virtual accounts
US8762288B2 (en) 2009-04-22 2014-06-24 The Western Union Company Methods and systems for establishing an identity confidence database
US20100280955A1 (en) * 2009-04-30 2010-11-04 General Electric Company Systems and methods for verifying identity
US10140598B2 (en) 2009-05-20 2018-11-27 Visa International Service Association Device including encrypted data for expiration date and verification value creation
US8393545B1 (en) 2009-06-23 2013-03-12 Dynamics Inc. Cards deployed with inactivated products for activation
JP2011008701A (en) * 2009-06-29 2011-01-13 Sony Corp Information processing server, information processing apparatus, and information processing method
US8255984B1 (en) 2009-07-01 2012-08-28 Quest Software, Inc. Single sign-on system for shared resource environments
US11797997B2 (en) * 2009-07-07 2023-10-24 Visa International Service Association Data verification in transactions in distributed network
CA2804455C (en) * 2009-07-07 2018-05-29 Finsphere Corporation Mobile directory number and email verification of financial transactions
US8752142B2 (en) 2009-07-17 2014-06-10 American Express Travel Related Services Company, Inc. Systems, methods, and computer program products for adapting the security measures of a communication network based on feedback
US8511574B1 (en) 2009-08-17 2013-08-20 Dynamics Inc. Advanced loyalty applications for powered cards and devices
US9306666B1 (en) 2009-10-08 2016-04-05 Dynamics Inc. Programming protocols for powered cards and devices
US8727219B1 (en) 2009-10-12 2014-05-20 Dynamics Inc. Magnetic stripe track signal having multiple communications channels
US8523059B1 (en) 2009-10-20 2013-09-03 Dynamics Inc. Advanced payment options for powered cards and devices
US8393546B1 (en) 2009-10-25 2013-03-12 Dynamics Inc. Games, prizes, and entertainment for powered cards and devices
US9922167B2 (en) * 2009-11-20 2018-03-20 Versus Technology, Inc. Context-aware method and system for facilitating the delivery of healthcare to patients within a clinical environment monitored by real-time locating apparatus
US9756076B2 (en) * 2009-12-17 2017-09-05 American Express Travel Related Services Company, Inc. Dynamically reacting policies and protections for securing mobile financial transactions
US8621636B2 (en) * 2009-12-17 2013-12-31 American Express Travel Related Services Company, Inc. Systems, methods, and computer program products for collecting and reporting sensor data in a communication network
US8650129B2 (en) 2010-01-20 2014-02-11 American Express Travel Related Services Company, Inc. Dynamically reacting policies and protections for securing mobile financial transaction data in transit
US8602312B2 (en) 2010-02-16 2013-12-10 Dynamics Inc. Systems and methods for drive circuits for dynamic magnetic stripe communications devices
US8348172B1 (en) 2010-03-02 2013-01-08 Dynamics Inc. Systems and methods for detection mechanisms for magnetic cards and devices
US10693263B1 (en) 2010-03-16 2020-06-23 Dynamics Inc. Systems and methods for audio connectors for powered cards and devices
US9189601B2 (en) * 2010-03-16 2015-11-17 Jireh Health, Llc Apparatus, system, and method for accurate dispensing of prescription medications
NL1037813C2 (en) * 2010-03-18 2011-09-20 Stichting Bioxs System and method for checking the authenticity of the identity of a person logging into a computer network.
US9652802B1 (en) 2010-03-24 2017-05-16 Consumerinfo.Com, Inc. Indirect monitoring and reporting of a user's credit data
US10453093B1 (en) 2010-04-30 2019-10-22 Lmb Mortgage Services, Inc. System and method of optimizing matching of leads
US20110270761A1 (en) * 2010-04-30 2011-11-03 Tobsc Inc. Methods and apparatus for a financial document clearinghouse and secure delivery network
US10504105B2 (en) 2010-05-18 2019-12-10 Dynamics Inc. Systems and methods for cards and devices operable to communicate to touch sensitive displays
US8850539B2 (en) 2010-06-22 2014-09-30 American Express Travel Related Services Company, Inc. Adaptive policies and protections for securing financial transaction data at rest
US10360625B2 (en) 2010-06-22 2019-07-23 American Express Travel Related Services Company, Inc. Dynamically adaptive policy management for securing mobile financial transactions
US8924296B2 (en) * 2010-06-22 2014-12-30 American Express Travel Related Services Company, Inc. Dynamic pairing system for securing a trusted communication channel
US8317103B1 (en) 2010-06-23 2012-11-27 FiTeq Method for broadcasting a magnetic stripe data packet from an electronic smart card
US8700895B1 (en) 2010-06-30 2014-04-15 Google Inc. System and method for operating a computing device in a secure mode
US9118666B2 (en) 2010-06-30 2015-08-25 Google Inc. Computing device integrity verification
US8931058B2 (en) 2010-07-01 2015-01-06 Experian Information Solutions, Inc. Systems and methods for permission arbitrated transaction services
US8744956B1 (en) 2010-07-01 2014-06-03 Experian Information Solutions, Inc. Systems and methods for permission arbitrated transaction services
USD652448S1 (en) 2010-07-02 2012-01-17 Dynamics Inc. Multiple button interactive electronic card
USD670759S1 (en) 2010-07-02 2012-11-13 Dynamics Inc. Multiple button interactive electronic card with light sources
USD652449S1 (en) 2010-07-02 2012-01-17 Dynamics Inc. Multiple button interactive electronic card
USD672389S1 (en) 2010-07-02 2012-12-11 Dynamics Inc. Multiple button interactive electronic card with light sources
USD652867S1 (en) 2010-07-02 2012-01-24 Dynamics Inc. Multiple button interactive electronic card
USD652075S1 (en) 2010-07-02 2012-01-10 Dynamics Inc. Multiple button interactive electronic card
USD687094S1 (en) 2010-07-02 2013-07-30 Dynamics Inc. Multiple button interactive electronic card with light sources
USD674013S1 (en) 2010-07-02 2013-01-08 Dynamics Inc. Multiple button interactive electronic card with light sources
USD652450S1 (en) 2010-07-09 2012-01-17 Dynamics Inc. Multiple button interactive electronic card
USD651644S1 (en) 2010-07-09 2012-01-03 Dynamics Inc. Interactive electronic card with display
USD666241S1 (en) 2010-07-09 2012-08-28 Dynamics Inc. Multiple button interactive electronic card with light source
USD652076S1 (en) 2010-07-09 2012-01-10 Dynamics Inc. Multiple button interactive electronic card with display
USD651237S1 (en) 2010-07-09 2011-12-27 Dynamics Inc. Interactive electronic card with display
USD665447S1 (en) 2010-07-09 2012-08-14 Dynamics Inc. Multiple button interactive electronic card with light source and display
USD651238S1 (en) 2010-07-09 2011-12-27 Dynamics Inc. Interactive electronic card with display
USD653288S1 (en) 2010-07-09 2012-01-31 Dynamics Inc. Multiple button interactive electronic card
USD792511S1 (en) 2010-07-09 2017-07-18 Dynamics Inc. Display with font
USD643063S1 (en) 2010-07-09 2011-08-09 Dynamics Inc. Interactive electronic card with display
USD665022S1 (en) 2010-07-09 2012-08-07 Dynamics Inc. Multiple button interactive electronic card with light source
USD792513S1 (en) 2010-07-09 2017-07-18 Dynamics Inc. Display with font
USD792512S1 (en) 2010-07-09 2017-07-18 Dynamics Inc. Display with font
US8322623B1 (en) 2010-07-26 2012-12-04 Dynamics Inc. Systems and methods for advanced card printing
US9818125B2 (en) 2011-02-16 2017-11-14 Dynamics Inc. Systems and methods for information exchange mechanisms for powered cards and devices
US10055614B1 (en) 2010-08-12 2018-08-21 Dynamics Inc. Systems and methods for advanced detection mechanisms for magnetic cards and devices
US9053398B1 (en) 2010-08-12 2015-06-09 Dynamics Inc. Passive detection mechanisms for magnetic cards and devices
GB2483515B (en) * 2010-09-13 2018-01-24 Barclays Bank Plc Online user authentication
US10022884B1 (en) 2010-10-15 2018-07-17 Dynamics Inc. Systems and methods for alignment techniques for magnetic cards and devices
US8561894B1 (en) 2010-10-20 2013-10-22 Dynamics Inc. Powered cards and devices designed, programmed, and deployed from a kiosk
US9646240B1 (en) 2010-11-05 2017-05-09 Dynamics Inc. Locking features for powered cards and devices
US8782217B1 (en) 2010-11-10 2014-07-15 Safetyweb, Inc. Online identity management
US8484186B1 (en) 2010-11-12 2013-07-09 Consumerinfo.Com, Inc. Personalized people finder
US9147042B1 (en) 2010-11-22 2015-09-29 Experian Information Solutions, Inc. Systems and methods for data verification
US8359631B2 (en) 2010-12-08 2013-01-22 Lewis Farsedakis Portable identity rating
US8464358B2 (en) 2010-12-08 2013-06-11 Lewis Farsedakis Portable identity rating
US20120173335A1 (en) * 2010-12-29 2012-07-05 Meir Amzallag System and Methods for Enhancing Sales of Online Transactions
US8567679B1 (en) 2011-01-23 2013-10-29 Dynamics Inc. Cards and devices with embedded holograms
US10095970B1 (en) 2011-01-31 2018-10-09 Dynamics Inc. Cards including anti-skimming devices
EP2676197B1 (en) 2011-02-18 2018-11-28 CSidentity Corporation System and methods for identifying compromised personally identifiable information on the internet
US9836680B1 (en) 2011-03-03 2017-12-05 Dynamics Inc. Systems and methods for advanced communication mechanisms for magnetic cards and devices
US8485446B1 (en) 2011-03-28 2013-07-16 Dynamics Inc. Shielded magnetic stripe for magnetic cards and devices
EP2707847A4 (en) 2011-05-10 2015-04-01 Dynamics Inc Systems, devices, and methods for mobile payment acceptance, mobile authorizations, mobile wallets, and contactless communication mechanisms
USD670330S1 (en) 2011-05-12 2012-11-06 Dynamics Inc. Interactive card
USD676904S1 (en) 2011-05-12 2013-02-26 Dynamics Inc. Interactive display card
USD670331S1 (en) 2011-05-12 2012-11-06 Dynamics Inc. Interactive display card
USD670332S1 (en) 2011-05-12 2012-11-06 Dynamics Inc. Interactive card
USD670329S1 (en) 2011-05-12 2012-11-06 Dynamics Inc. Interactive display card
US8628022B1 (en) 2011-05-23 2014-01-14 Dynamics Inc. Systems and methods for sensor mechanisms for magnetic cards and devices
US20120303534A1 (en) * 2011-05-27 2012-11-29 Tomaxx Gmbh System and method for a secure transaction
US9607336B1 (en) 2011-06-16 2017-03-28 Consumerinfo.Com, Inc. Providing credit inquiry alerts
US20120331557A1 (en) * 2011-06-21 2012-12-27 Keith Anthony Washington Global identity protector E-commerce payment code certified processing system
US9483606B1 (en) 2011-07-08 2016-11-01 Consumerinfo.Com, Inc. Lifescore
US9824198B2 (en) * 2011-07-14 2017-11-21 Docusign, Inc. System and method for identity and reputation score based on transaction history
US8827153B1 (en) 2011-07-18 2014-09-09 Dynamics Inc. Systems and methods for waveform generation for dynamic magnetic stripe communications devices
US8850536B2 (en) 2011-08-05 2014-09-30 Safefaces LLC Methods and systems for identity verification in a social network using ratings
US8850535B2 (en) 2011-08-05 2014-09-30 Safefaces LLC Methods and systems for identity verification in a social network using ratings
US9148447B2 (en) * 2011-08-31 2015-09-29 Bank Of America Corporation Safe services framework
US9106691B1 (en) 2011-09-16 2015-08-11 Consumerinfo.Com, Inc. Systems and methods of identity protection and management
US20130073445A1 (en) * 2011-09-21 2013-03-21 Moneygram International, Inc. Real-Time Approval of Bank Draft Payments for Money Transfer Transactions
US9002322B2 (en) 2011-09-29 2015-04-07 Apple Inc. Authentication with secondary approver
US8769624B2 (en) 2011-09-29 2014-07-01 Apple Inc. Access control utilizing indirect authentication
US20130091052A1 (en) * 2011-10-07 2013-04-11 Paal Kaperdal Systems and methods for generating new accounts with a financial institution
US8738516B1 (en) 2011-10-13 2014-05-27 Consumerinfo.Com, Inc. Debt services candidate locator
US11551046B1 (en) 2011-10-19 2023-01-10 Dynamics Inc. Stacked dynamic magnetic stripe commmunications device for magnetic cards and devices
US11409971B1 (en) 2011-10-23 2022-08-09 Dynamics Inc. Programming and test modes for powered cards and devices
US11030562B1 (en) 2011-10-31 2021-06-08 Consumerinfo.Com, Inc. Pre-data breach monitoring
US8966602B2 (en) * 2011-11-07 2015-02-24 Facebook, Inc. Identity verification and authentication
US9619741B1 (en) 2011-11-21 2017-04-11 Dynamics Inc. Systems and methods for synchronization mechanisms for magnetic cards and devices
US8960545B1 (en) 2011-11-21 2015-02-24 Dynamics Inc. Data modification for magnetic cards and devices
US9064194B1 (en) 2012-02-03 2015-06-23 Dynamics Inc. Systems and methods for spike suppression for dynamic magnetic stripe communications devices
US9710745B1 (en) 2012-02-09 2017-07-18 Dynamics Inc. Systems and methods for automated assembly of dynamic magnetic stripe communications devices
US8888009B1 (en) 2012-02-14 2014-11-18 Dynamics Inc. Systems and methods for extended stripe mechanisms for magnetic cards and devices
US9916992B2 (en) 2012-02-20 2018-03-13 Dynamics Inc. Systems and methods for flexible components for powered cards and devices
US9734669B1 (en) 2012-04-02 2017-08-15 Dynamics Inc. Cards, devices, systems, and methods for advanced payment game of skill and game of chance functionality
US11418483B1 (en) 2012-04-19 2022-08-16 Dynamics Inc. Cards, devices, systems, and methods for zone-based network management
US8924292B1 (en) * 2012-04-25 2014-12-30 Wells Fargo Bank, N.A. System and method for a mobile wallet
US9853959B1 (en) 2012-05-07 2017-12-26 Consumerinfo.Com, Inc. Storage and maintenance of personal data
US9033218B1 (en) 2012-05-15 2015-05-19 Dynamics Inc. Cards, devices, systems, methods and dynamic security codes
BR112014028774B1 (en) 2012-05-18 2022-05-10 Apple Inc Method, electronic device, computer readable storage medium and information processing apparatus
US9251792B2 (en) * 2012-06-15 2016-02-02 Sri International Multi-sample conversational voice verification
TWI462604B (en) * 2012-06-18 2014-11-21 Wistron Corp Wireless network client-authentication system and wireless network connection method thereof
US9064195B2 (en) 2012-06-29 2015-06-23 Dynamics Inc. Multiple layer card circuit boards
USD687095S1 (en) 2012-08-27 2013-07-30 Dynamics Inc. Interactive electronic card with buttons
USD729871S1 (en) 2012-08-27 2015-05-19 Dynamics Inc. Interactive electronic card with display and buttons
USD729869S1 (en) 2012-08-27 2015-05-19 Dynamics Inc. Interactive electronic card with display and button
USD730438S1 (en) 2012-08-27 2015-05-26 Dynamics Inc. Interactive electronic card with display and button
USD687488S1 (en) 2012-08-27 2013-08-06 Dynamics Inc. Interactive electronic card with buttons
USD687489S1 (en) 2012-08-27 2013-08-06 Dynamics Inc. Interactive electronic card with buttons
USD687490S1 (en) 2012-08-27 2013-08-06 Dynamics Inc. Interactive electronic card with display and button
USD828870S1 (en) 2012-08-27 2018-09-18 Dynamics Inc. Display card
USD688744S1 (en) 2012-08-27 2013-08-27 Dynamics Inc. Interactive electronic card with display and button
USD673606S1 (en) 2012-08-27 2013-01-01 Dynamics Inc. Interactive electronic card with display and buttons
USD687487S1 (en) 2012-08-27 2013-08-06 Dynamics Inc. Interactive electronic card with display and button
USD676487S1 (en) 2012-08-27 2013-02-19 Dynamics Inc. Interactive electronic card with display and buttons
USD675256S1 (en) 2012-08-27 2013-01-29 Dynamics Inc. Interactive electronic card with display and button
USD694322S1 (en) 2012-08-27 2013-11-26 Dynamics Inc. Interactive electronic card with display buttons
USD692053S1 (en) 2012-08-27 2013-10-22 Dynamics Inc. Interactive electronic card with display and button
USD695636S1 (en) 2012-08-27 2013-12-17 Dynamics Inc. Interactive electronic card with display and buttons
USD730439S1 (en) 2012-08-27 2015-05-26 Dynamics Inc. Interactive electronic card with buttons
USD729870S1 (en) 2012-08-27 2015-05-19 Dynamics Inc. Interactive electronic card with display and button
USD687887S1 (en) 2012-08-27 2013-08-13 Dynamics Inc. Interactive electronic card with buttons
US9368116B2 (en) 2012-09-07 2016-06-14 Verint Systems Ltd. Speaker separation in diarization
US11126997B1 (en) 2012-10-02 2021-09-21 Dynamics Inc. Cards, devices, systems, and methods for a fulfillment system
US9010647B2 (en) 2012-10-29 2015-04-21 Dynamics Inc. Multiple sensor detector systems and detection methods of magnetic cards and devices
US9659246B1 (en) 2012-11-05 2017-05-23 Dynamics Inc. Dynamic magnetic stripe communications device with beveled magnetic material for magnetic cards and devices
US20140129670A1 (en) * 2012-11-07 2014-05-08 Nokia Corporation Method and apparatus for modifying unique identifiers associated with a web browser
US9654541B1 (en) 2012-11-12 2017-05-16 Consumerinfo.Com, Inc. Aggregating user web browsing data
US10134400B2 (en) 2012-11-21 2018-11-20 Verint Systems Ltd. Diarization using acoustic labeling
IL223225A (en) * 2012-11-25 2013-11-28 Eliahu Antopolsky System for meetings documentation that enables access to the documentation only by the consent of the participants
US8856894B1 (en) 2012-11-28 2014-10-07 Consumerinfo.Com, Inc. Always on authentication
US9916621B1 (en) 2012-11-30 2018-03-13 Consumerinfo.Com, Inc. Presentation of credit score factors
US9010644B1 (en) 2012-11-30 2015-04-21 Dynamics Inc. Dynamic magnetic stripe communications device with stepped magnetic material for magnetic cards and devices
US10255598B1 (en) 2012-12-06 2019-04-09 Consumerinfo.Com, Inc. Credit card account data extraction
US10949627B2 (en) 2012-12-20 2021-03-16 Dynamics Inc. Systems and methods for non-time smearing detection mechanisms for magnetic cards and devices
US20140188717A1 (en) * 2013-01-02 2014-07-03 David Gillman Method and Apparatus for Payment of Invoices
USD750166S1 (en) 2013-03-04 2016-02-23 Dynamics Inc. Interactive electronic card with display and buttons
USD750168S1 (en) 2013-03-04 2016-02-23 Dynamics Inc. Interactive electronic card with display and button
USD750167S1 (en) 2013-03-04 2016-02-23 Dynamics Inc. Interactive electronic card with buttons
USD751639S1 (en) 2013-03-04 2016-03-15 Dynamics Inc. Interactive electronic card with display and button
USD765174S1 (en) 2013-03-04 2016-08-30 Dynamics Inc. Interactive electronic card with button
USD764584S1 (en) 2013-03-04 2016-08-23 Dynamics Inc. Interactive electronic card with buttons
USD777252S1 (en) 2013-03-04 2017-01-24 Dynamics Inc. Interactive electronic card with buttons
USD765173S1 (en) 2013-03-04 2016-08-30 Dynamics Inc. Interactive electronic card with display and button
USD751640S1 (en) 2013-03-04 2016-03-15 Dynamics Inc. Interactive electronic card with display and button
US8972400B1 (en) 2013-03-11 2015-03-03 Consumerinfo.Com, Inc. Profile data management
US9870589B1 (en) 2013-03-14 2018-01-16 Consumerinfo.Com, Inc. Credit utilization tracking and reporting
US10102570B1 (en) 2013-03-14 2018-10-16 Consumerinfo.Com, Inc. Account vulnerability alerts
US8812387B1 (en) 2013-03-14 2014-08-19 Csidentity Corporation System and method for identifying related credit inquiries
US9406085B1 (en) 2013-03-14 2016-08-02 Consumerinfo.Com, Inc. System and methods for credit dispute processing, resolution, and reporting
US9633322B1 (en) 2013-03-15 2017-04-25 Consumerinfo.Com, Inc. Adjustment of knowledge-based authentication
US10664936B2 (en) 2013-03-15 2020-05-26 Csidentity Corporation Authentication systems and methods for on-demand products
US9396320B2 (en) 2013-03-22 2016-07-19 Nok Nok Labs, Inc. System and method for non-intrusive, privacy-preserving authentication
US10270748B2 (en) 2013-03-22 2019-04-23 Nok Nok Labs, Inc. Advanced authentication techniques and applications
US9887983B2 (en) 2013-10-29 2018-02-06 Nok Nok Labs, Inc. Apparatus and method for implementing composite authenticators
US9818165B2 (en) 2013-04-04 2017-11-14 Conduent Business Services, Llc Birth registration
US10685398B1 (en) 2013-04-23 2020-06-16 Consumerinfo.Com, Inc. Presenting credit score information
US9721147B1 (en) 2013-05-23 2017-08-01 Consumerinfo.Com, Inc. Digital identity
US9961077B2 (en) 2013-05-30 2018-05-01 Nok Nok Labs, Inc. System and method for biometric authentication with device attestation
US9460722B2 (en) 2013-07-17 2016-10-04 Verint Systems Ltd. Blind diarization of recorded calls with arbitrary number of speakers
CN105580038A (en) 2013-07-24 2016-05-11 维萨国际服务协会 Systems and methods for interoperable network token processing
US9984706B2 (en) 2013-08-01 2018-05-29 Verint Systems Ltd. Voice activity detection using a soft decision mechanism
US9443268B1 (en) 2013-08-16 2016-09-13 Consumerinfo.Com, Inc. Bill payment and reporting
JP5485484B1 (en) 2013-08-22 2014-05-07 楽天株式会社 Information processing apparatus, information processing method, program, and storage medium
US9898642B2 (en) 2013-09-09 2018-02-20 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
USD767024S1 (en) 2013-09-10 2016-09-20 Dynamics Inc. Interactive electronic card with contact connector
USD737373S1 (en) 2013-09-10 2015-08-25 Dynamics Inc. Interactive electronic card with contact connector
US9380041B2 (en) * 2013-09-30 2016-06-28 Bank Of America Corporation Identification, verification, and authentication scoring
RU2691843C2 (en) * 2013-10-11 2019-06-18 Виза Интернэшнл Сервис Ассосиэйшн Network token system
US10325314B1 (en) 2013-11-15 2019-06-18 Consumerinfo.Com, Inc. Payment reporting systems
US9477737B1 (en) 2013-11-20 2016-10-25 Consumerinfo.Com, Inc. Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules
US9219723B1 (en) 2013-12-20 2015-12-22 Certify Global Inc. Source device for systems and methods of verifying an authentication using dynamic scoring
US10262362B1 (en) 2014-02-14 2019-04-16 Experian Information Solutions, Inc. Automatic generation of code for attributes
US10929858B1 (en) * 2014-03-14 2021-02-23 Walmart Apollo, Llc Systems and methods for managing customer data
US10108891B1 (en) 2014-03-21 2018-10-23 Dynamics Inc. Exchange coupled amorphous ribbons for electronic stripes
USD760256S1 (en) 2014-03-25 2016-06-28 Consumerinfo.Com, Inc. Display screen or portion thereof with graphical user interface
USD759690S1 (en) 2014-03-25 2016-06-21 Consumerinfo.Com, Inc. Display screen or portion thereof with graphical user interface
USD759689S1 (en) 2014-03-25 2016-06-21 Consumerinfo.Com, Inc. Display screen or portion thereof with graphical user interface
US9892457B1 (en) 2014-04-16 2018-02-13 Consumerinfo.Com, Inc. Providing credit data in search results
US10373240B1 (en) 2014-04-25 2019-08-06 Csidentity Corporation Systems, methods and computer-program products for eligibility verification
US9654469B1 (en) 2014-05-02 2017-05-16 Nok Nok Labs, Inc. Web-based user authentication techniques and applications
US20170109751A1 (en) * 2014-05-02 2017-04-20 Nok Nok Labs, Inc. System and method for carrying strong authentication events over different channels
US9483763B2 (en) 2014-05-29 2016-11-01 Apple Inc. User interface for payments
US9882891B2 (en) 2014-06-04 2018-01-30 Token One Pty. Ltd. Identity verification
US10592900B2 (en) 2014-06-13 2020-03-17 Sungard Avantgard Llc Systems and methods for authenticating and providing payment to a supplier
US9875347B2 (en) 2014-07-31 2018-01-23 Nok Nok Labs, Inc. System and method for performing authentication using data analytics
US10148630B2 (en) 2014-07-31 2018-12-04 Nok Nok Labs, Inc. System and method for implementing a hosted authentication service
CN105634771B (en) * 2014-10-31 2020-04-14 索尼公司 User side device and network side device in communication system and wireless communication method
US10339527B1 (en) 2014-10-31 2019-07-02 Experian Information Solutions, Inc. System and architecture for electronic fraud detection
US10581843B2 (en) 2014-11-25 2020-03-03 Certify Global Inc. Systems and methods of verifying an authenticated document biosignature encoding restricted access information
US10726113B2 (en) 2014-11-25 2020-07-28 Certify Global Inc. Systems and methods of verifying an authenticated document biosignature glyph containing a selected image
US9652633B2 (en) 2014-11-25 2017-05-16 Certify Global Inc. Systems and methods of verifying an authenticated document biosignature
US10445152B1 (en) 2014-12-19 2019-10-15 Experian Information Solutions, Inc. Systems and methods for dynamic report generation based on automatic modeling of complex data structures
US9875743B2 (en) 2015-01-26 2018-01-23 Verint Systems Ltd. Acoustic signature building for a speaker from multiple sessions
US10853592B2 (en) 2015-02-13 2020-12-01 Yoti Holding Limited Digital identity system
US10692085B2 (en) 2015-02-13 2020-06-23 Yoti Holding Limited Secure electronic payment
US9858408B2 (en) 2015-02-13 2018-01-02 Yoti Holding Limited Digital identity system
US9953318B1 (en) 2015-05-22 2018-04-24 Intuit Inc. Automatic transaction-based verification of account ownership
US11151468B1 (en) 2015-07-02 2021-10-19 Experian Information Solutions, Inc. Behavior analysis using distributed representations of event data
US10853359B1 (en) 2015-12-21 2020-12-01 Amazon Technologies, Inc. Data log stream processing using probabilistic data structures
US10032049B2 (en) 2016-02-23 2018-07-24 Dynamics Inc. Magnetic cards and devices for motorized readers
EP3455998B1 (en) * 2016-05-12 2021-09-01 Boland, Michael, J. Identity authentication and information exchange system and method
DK179186B1 (en) 2016-05-19 2018-01-15 Apple Inc REMOTE AUTHORIZATION TO CONTINUE WITH AN ACTION
US10366389B2 (en) * 2016-07-28 2019-07-30 Visa International Service Association Connected device transaction code system
US10637853B2 (en) 2016-08-05 2020-04-28 Nok Nok Labs, Inc. Authentication techniques including speech and/or lip movement analysis
US10769635B2 (en) 2016-08-05 2020-09-08 Nok Nok Labs, Inc. Authentication techniques including speech and/or lip movement analysis
US20180089680A1 (en) * 2016-09-28 2018-03-29 Bank Of America Corporation Partially completed resource geographic triggering and remediation system
US10237070B2 (en) 2016-12-31 2019-03-19 Nok Nok Labs, Inc. System and method for sharing keys across authenticators
US10091195B2 (en) 2016-12-31 2018-10-02 Nok Nok Labs, Inc. System and method for bootstrapping a user binding
US10516754B1 (en) * 2017-01-09 2019-12-24 Sprint Communications Company L.P. Systems and methods for identity confirmation and rapid response to third party identity queries
US20180374151A1 (en) * 2017-06-27 2018-12-27 Intuit Inc. Dynamic reputation score for a digital identity
US20190042961A1 (en) * 2017-08-07 2019-02-07 Securiport Llc Multi-mode data collection and traveler processing
KR102143148B1 (en) 2017-09-09 2020-08-10 애플 인크. Implementation of biometric authentication
KR102185854B1 (en) 2017-09-09 2020-12-02 애플 인크. Implementation of biometric authentication
US10699028B1 (en) 2017-09-28 2020-06-30 Csidentity Corporation Identity security architecture systems and methods
US11276022B2 (en) * 2017-10-20 2022-03-15 Acuant, Inc. Enhanced system and method for identity evaluation using a global score value
US10896472B1 (en) 2017-11-14 2021-01-19 Csidentity Corporation Security and identity verification system and architecture
US11868995B2 (en) 2017-11-27 2024-01-09 Nok Nok Labs, Inc. Extending a secure key storage for transaction confirmation and cryptocurrency
US11068896B2 (en) * 2017-11-30 2021-07-20 International Business Machines Corporation Granting requests for authorization using data of devices associated with requestors
US11831409B2 (en) * 2018-01-12 2023-11-28 Nok Nok Labs, Inc. System and method for binding verifiable claims
US11146546B2 (en) 2018-01-16 2021-10-12 Acuant, Inc. Identity proofing and portability on blockchain
US11416863B2 (en) * 2018-04-11 2022-08-16 Wells Fargo Bank, N.A. System and methods for assessing risk of fraud in an electronic transaction
US11538128B2 (en) 2018-05-14 2022-12-27 Verint Americas Inc. User interface for fraud alert management
US11107157B1 (en) * 2018-05-31 2021-08-31 Square, Inc. Intelligent modification of capital loan offerings at point-of-sale
US11170085B2 (en) 2018-06-03 2021-11-09 Apple Inc. Implementation of biometric authentication
US10546444B2 (en) 2018-06-21 2020-01-28 Capital One Services, Llc Systems and methods for secure read-only authentication
US10911234B2 (en) 2018-06-22 2021-02-02 Experian Information Solutions, Inc. System and method for a token gateway environment
CN112508568A (en) * 2018-08-15 2021-03-16 创新先进技术有限公司 Core product pushing and core method and system
US10880313B2 (en) 2018-09-05 2020-12-29 Consumerinfo.Com, Inc. Database platform for realtime updating of user data from third party sources
US11100349B2 (en) 2018-09-28 2021-08-24 Apple Inc. Audio assisted enrollment
US10860096B2 (en) 2018-09-28 2020-12-08 Apple Inc. Device control using gaze information
US10505738B1 (en) 2018-10-02 2019-12-10 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
WO2020072670A1 (en) 2018-10-02 2020-04-09 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10771254B2 (en) 2018-10-02 2020-09-08 Capital One Services, Llc Systems and methods for email-based card activation
WO2020072552A1 (en) 2018-10-02 2020-04-09 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11210664B2 (en) 2018-10-02 2021-12-28 Capital One Services, Llc Systems and methods for amplifying the strength of cryptographic algorithms
US10607214B1 (en) 2018-10-02 2020-03-31 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10554411B1 (en) 2018-10-02 2020-02-04 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
KR20210068391A (en) 2018-10-02 2021-06-09 캐피탈 원 서비시즈, 엘엘씨 System and method for cryptographic authentication of contactless card
US10511443B1 (en) 2018-10-02 2019-12-17 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10909527B2 (en) 2018-10-02 2021-02-02 Capital One Services, Llc Systems and methods for performing a reissue of a contactless card
US10733645B2 (en) 2018-10-02 2020-08-04 Capital One Services, Llc Systems and methods for establishing identity for order pick up
US10581611B1 (en) 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11368446B2 (en) * 2018-10-02 2022-06-21 International Business Machines Corporation Trusted account revocation in federated identity management
US10542036B1 (en) 2018-10-02 2020-01-21 Capital One Services, Llc Systems and methods for signaling an attack on contactless cards
WO2020072537A1 (en) 2018-10-02 2020-04-09 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10565587B1 (en) 2018-10-02 2020-02-18 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10582386B1 (en) 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10579998B1 (en) 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
JP2022508026A (en) 2018-10-02 2022-01-19 キャピタル・ワン・サービシーズ・リミテッド・ライアビリティ・カンパニー Systems and methods for cryptographic authentication of non-contact cards
US10748138B2 (en) 2018-10-02 2020-08-18 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
JP2022511281A (en) 2018-10-02 2022-01-31 キャピタル・ワン・サービシーズ・リミテッド・ライアビリティ・カンパニー Systems and methods for cryptographic authentication of non-contact cards
US10592710B1 (en) 2018-10-02 2020-03-17 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10771253B2 (en) 2018-10-02 2020-09-08 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
WO2020072690A1 (en) 2018-10-02 2020-04-09 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10949520B2 (en) 2018-10-02 2021-03-16 Capital One Services, Llc Systems and methods for cross coupling risk analytics and one-time-passcodes
US10841091B2 (en) 2018-10-02 2020-11-17 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10992477B2 (en) 2018-10-02 2021-04-27 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
SG11202101221WA (en) 2018-10-02 2021-03-30 Capital One Services Llc Systems and methods for cryptographic authentication of contactless cards
US10860814B2 (en) 2018-10-02 2020-12-08 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10623393B1 (en) 2018-10-02 2020-04-14 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10489781B1 (en) 2018-10-02 2019-11-26 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10887452B2 (en) 2018-10-25 2021-01-05 Verint Americas Inc. System architecture for fraud detection
US11315179B1 (en) 2018-11-16 2022-04-26 Consumerinfo.Com, Inc. Methods and apparatuses for customized card recommendations
CN109800593B (en) * 2018-12-07 2023-05-30 上海益政网络科技发展有限公司 Information matching method and system
US20200226581A1 (en) 2019-01-11 2020-07-16 Capital One Services, Llc Systems and methods for touch screen interface interaction using a card overlay
US11037136B2 (en) 2019-01-24 2021-06-15 Capital One Services, Llc Tap to autofill card data
US10467622B1 (en) 2019-02-01 2019-11-05 Capital One Services, Llc Using on-demand applications to generate virtual numbers for a contactless card to securely autofill forms
US10510074B1 (en) 2019-02-01 2019-12-17 Capital One Services, Llc One-tap payment using a contactless card
US11120453B2 (en) 2019-02-01 2021-09-14 Capital One Services, Llc Tap card to securely generate card data to copy to clipboard
US10672005B1 (en) * 2019-02-19 2020-06-02 Capital One Services, Llc Updating a machine learning fraud model based on third party transaction information
US11238656B1 (en) 2019-02-22 2022-02-01 Consumerinfo.Com, Inc. System and method for an augmented reality experience via an artificial intelligence bot
US10425129B1 (en) 2019-02-27 2019-09-24 Capital One Services, Llc Techniques to reduce power consumption in near field communication systems
US10523708B1 (en) 2019-03-18 2019-12-31 Capital One Services, Llc System and method for second factor authentication of customer support calls
US10535062B1 (en) 2019-03-20 2020-01-14 Capital One Services, Llc Using a contactless card to securely share personal data stored in a blockchain
US10643420B1 (en) 2019-03-20 2020-05-05 Capital One Services, Llc Contextual tapping engine
US10438437B1 (en) 2019-03-20 2019-10-08 Capital One Services, Llc Tap to copy data to clipboard via NFC
US10984416B2 (en) 2019-03-20 2021-04-20 Capital One Services, Llc NFC mobile currency transfer
US10970712B2 (en) 2019-03-21 2021-04-06 Capital One Services, Llc Delegated administration of permissions using a contactless card
US10467445B1 (en) 2019-03-28 2019-11-05 Capital One Services, Llc Devices and methods for contactless card alignment with a foldable mobile device
US11792024B2 (en) 2019-03-29 2023-10-17 Nok Nok Labs, Inc. System and method for efficient challenge-response authentication
US11521262B2 (en) 2019-05-28 2022-12-06 Capital One Services, Llc NFC enhanced augmented reality information overlays
US10516447B1 (en) 2019-06-17 2019-12-24 Capital One Services, Llc Dynamic power levels in NFC card communications
EP3987743A1 (en) 2019-06-20 2022-04-27 Verint Americas Inc. Systems and methods for authentication and fraud detection
US10871958B1 (en) 2019-07-03 2020-12-22 Capital One Services, Llc Techniques to perform applet programming
US11392933B2 (en) 2019-07-03 2022-07-19 Capital One Services, Llc Systems and methods for providing online and hybridcard interactions
US11694187B2 (en) 2019-07-03 2023-07-04 Capital One Services, Llc Constraining transactional capabilities for contactless cards
US10713649B1 (en) 2019-07-09 2020-07-14 Capital One Services, Llc System and method enabling mobile near-field communication to update display on a payment card
US10498401B1 (en) 2019-07-15 2019-12-03 Capital One Services, Llc System and method for guiding card positioning using phone sensors
US10885514B1 (en) 2019-07-15 2021-01-05 Capital One Services, Llc System and method for using image data to trigger contactless card transactions
US10733601B1 (en) 2019-07-17 2020-08-04 Capital One Services, Llc Body area network facilitated authentication or payment authorization
US10832271B1 (en) 2019-07-17 2020-11-10 Capital One Services, Llc Verified reviews using a contactless card
US11182771B2 (en) 2019-07-17 2021-11-23 Capital One Services, Llc System for value loading onto in-vehicle device
US11521213B2 (en) 2019-07-18 2022-12-06 Capital One Services, Llc Continuous authentication for digital services based on contactless card positioning
US10506426B1 (en) 2019-07-19 2019-12-10 Capital One Services, Llc Techniques for call authentication
US10541995B1 (en) 2019-07-23 2020-01-21 Capital One Services, Llc First factor contactless card authentication system and method
WO2021026736A1 (en) * 2019-08-12 2021-02-18 Advanced New Technologies Co., Ltd. Blockchain-based judgment execution
US11941065B1 (en) 2019-09-13 2024-03-26 Experian Information Solutions, Inc. Single identifier platform for storing entity data
AU2019469080A1 (en) 2019-10-02 2022-04-21 Capital One Services, Llc Client device authentication using contactless legacy magnetic stripe data
US11488214B2 (en) * 2019-10-03 2022-11-01 Capital One Services, Llc High authentication layer to determine a person's location when considering sending a secure object
US11144619B2 (en) * 2019-10-11 2021-10-12 East West Bank Systems and methods for remotely verifying identity of non-resident aliens
US11868453B2 (en) 2019-11-07 2024-01-09 Verint Americas Inc. Systems and methods for customer authentication based on audio-of-interest
US11651361B2 (en) 2019-12-23 2023-05-16 Capital One Services, Llc Secure authentication based on passport data stored in a contactless card
US10657754B1 (en) 2019-12-23 2020-05-19 Capital One Services, Llc Contactless card and personal identification system
US11113685B2 (en) 2019-12-23 2021-09-07 Capital One Services, Llc Card issuing with restricted virtual numbers
US10862540B1 (en) 2019-12-23 2020-12-08 Capital One Services, Llc Method for mapping NFC field strength and location on mobile devices
US10885410B1 (en) 2019-12-23 2021-01-05 Capital One Services, Llc Generating barcodes utilizing cryptographic techniques
US11615395B2 (en) 2019-12-23 2023-03-28 Capital One Services, Llc Authentication for third party digital wallet provisioning
US10733283B1 (en) 2019-12-23 2020-08-04 Capital One Services, Llc Secure password generation and management using NFC and contactless smart cards
US11200563B2 (en) 2019-12-24 2021-12-14 Capital One Services, Llc Account registration using a contactless card
US10853795B1 (en) 2019-12-24 2020-12-01 Capital One Services, Llc Secure authentication based on identity data stored in a contactless card
US10664941B1 (en) 2019-12-24 2020-05-26 Capital One Services, Llc Steganographic image encoding of biometric template information on a card
US10909544B1 (en) 2019-12-26 2021-02-02 Capital One Services, Llc Accessing and utilizing multiple loyalty point accounts
US10757574B1 (en) 2019-12-26 2020-08-25 Capital One Services, Llc Multi-factor authentication providing a credential via a contactless card for secure messaging
US11038688B1 (en) 2019-12-30 2021-06-15 Capital One Services, Llc Techniques to control applets for contactless cards
US10860914B1 (en) 2019-12-31 2020-12-08 Capital One Services, Llc Contactless card and method of assembly
US11455620B2 (en) 2019-12-31 2022-09-27 Capital One Services, Llc Tapping a contactless card to a computing device to provision a virtual number
US11210656B2 (en) 2020-04-13 2021-12-28 Capital One Services, Llc Determining specific terms for contactless card activation
US10861006B1 (en) 2020-04-30 2020-12-08 Capital One Services, Llc Systems and methods for data access control using a short-range transceiver
US11030339B1 (en) 2020-04-30 2021-06-08 Capital One Services, Llc Systems and methods for data access control of personal user data using a short-range transceiver
US11222342B2 (en) 2020-04-30 2022-01-11 Capital One Services, Llc Accurate images in graphical user interfaces to enable data transfer
US11455606B2 (en) * 2020-04-30 2022-09-27 Capital One Services, Llc Tap to pay a credit bill via a computing device
US10915888B1 (en) 2020-04-30 2021-02-09 Capital One Services, Llc Contactless card with multiple rotating security keys
US11823175B2 (en) 2020-04-30 2023-11-21 Capital One Services, Llc Intelligent card unlock
US10963865B1 (en) 2020-05-12 2021-03-30 Capital One Services, Llc Augmented reality card activation experience
US11100511B1 (en) 2020-05-18 2021-08-24 Capital One Services, Llc Application-based point of sale system in mobile operating systems
US11063979B1 (en) 2020-05-18 2021-07-13 Capital One Services, Llc Enabling communications between applications in a mobile operating system
US11062098B1 (en) 2020-08-11 2021-07-13 Capital One Services, Llc Augmented reality information display and interaction via NFC based authentication
US11165586B1 (en) 2020-10-30 2021-11-02 Capital One Services, Llc Call center web-based authentication using a contactless card
US11482312B2 (en) 2020-10-30 2022-10-25 Capital One Services, Llc Secure verification of medical status using a contactless card
US11373169B2 (en) 2020-11-03 2022-06-28 Capital One Services, Llc Web-based activation of contactless cards
TWI770676B (en) * 2020-11-17 2022-07-11 玉山商業銀行股份有限公司 System and method for online transaction processing
US11216799B1 (en) 2021-01-04 2022-01-04 Capital One Services, Llc Secure generation of one-time passcodes using a contactless card
US11682012B2 (en) 2021-01-27 2023-06-20 Capital One Services, Llc Contactless delivery systems and methods
US11562358B2 (en) 2021-01-28 2023-01-24 Capital One Services, Llc Systems and methods for near field contactless card communication and cryptographic authentication
US11792001B2 (en) 2021-01-28 2023-10-17 Capital One Services, Llc Systems and methods for secure reprovisioning
US11687930B2 (en) 2021-01-28 2023-06-27 Capital One Services, Llc Systems and methods for authentication of access tokens
US11438329B2 (en) 2021-01-29 2022-09-06 Capital One Services, Llc Systems and methods for authenticated peer-to-peer data transfer using resource locators
US11777933B2 (en) 2021-02-03 2023-10-03 Capital One Services, Llc URL-based authentication for payment cards
US11637826B2 (en) 2021-02-24 2023-04-25 Capital One Services, Llc Establishing authentication persistence
US11245438B1 (en) 2021-03-26 2022-02-08 Capital One Services, Llc Network-enabled smart apparatus and systems and methods for activating and provisioning same
US11935035B2 (en) 2021-04-20 2024-03-19 Capital One Services, Llc Techniques to utilize resource locators by a contactless card to perform a sequence of operations
US11902442B2 (en) 2021-04-22 2024-02-13 Capital One Services, Llc Secure management of accounts on display devices using a contactless card
US11354555B1 (en) 2021-05-04 2022-06-07 Capital One Services, Llc Methods, mediums, and systems for applying a display to a transaction card
US20230214822A1 (en) * 2022-01-05 2023-07-06 Mastercard International Incorporated Computer-implemented methods and systems for authentic user-merchant association and services

Citations (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5826245A (en) * 1995-03-20 1998-10-20 Sandberg-Diment; Erik Providing verification information for a transaction
US6018724A (en) * 1997-06-30 2000-01-25 Sun Micorsystems, Inc. Method and apparatus for authenticating on-line transaction data
US20020040346A1 (en) * 2000-09-27 2002-04-04 Kwan Khai Hee Computer system and method for on-line generating a password protected and barcode prepaid instrument of entitlement and activating said instrument on presentation over a computer network
US20020099667A1 (en) * 2001-01-23 2002-07-25 Diamandis Peter H. Mehtod and apparatus for making purchases over the internet using pre-paid cards
US20020190124A1 (en) * 2001-06-15 2002-12-19 Koninklijke Philips Electronics N.V. Point-of-sale (POS) voice authentication transaction system
US20040185830A1 (en) * 1996-08-08 2004-09-23 Joao Raymond Anthony Apparatus and method for providing account security
US20040260615A1 (en) * 2003-06-18 2004-12-23 Phillips Brian A. Method and system for facilitating shipping via third-party payment service
US20050015332A1 (en) * 2003-07-18 2005-01-20 Grace Chen Cashless payment system
US20050071244A1 (en) * 2003-06-18 2005-03-31 Phillips Brian Andrew Method and system for facilitating shipping via a third-party payment service
US6925565B2 (en) * 2001-05-25 2005-08-02 Pen-One, Inc Pen-based transponder identity verification system
US20050199706A1 (en) * 2004-03-12 2005-09-15 American Express Travel Related Services Company, Systems, methods, and devices for selling transaction instruments via web-based tool
US20060018450A1 (en) * 2004-07-26 2006-01-26 Erik Sandberg-Diment Mobile telephone transaction system employing electronic account card
US20060026108A1 (en) * 2004-07-30 2006-02-02 Paul Wilson Voice/data financial transaction monitoring methods and systems
US20070100751A1 (en) * 2005-11-01 2007-05-03 Lorenzo Carver Method and system for processing and preventing credit card fraud in simultaneous remote wholesale exchange and local fullfillment of retail transactions by third party retailers
US20070124211A1 (en) * 2000-03-27 2007-05-31 Smith Steven B Methods and apparatus for wireless point-of-sale transactions
US7379920B2 (en) * 2001-12-04 2008-05-27 Gary Leung System and method for facilitating electronic financial transactions using a mobile telecommunication device
US20080141033A1 (en) * 1995-02-13 2008-06-12 Intertrust Technologies Corporation Trusted and secure techniques, systems and methods for item delivery and execution
US7437330B1 (en) * 2002-09-20 2008-10-14 Yt Acquisition Corp. System and method for categorizing transactions
US7502760B1 (en) * 2004-07-19 2009-03-10 Amazon Technologies, Inc. Providing payments automatically in accordance with predefined instructions
US7500606B2 (en) * 2006-04-14 2009-03-10 Harexinfotech, Inc. Method of settling signatureless payment of bank card sales slip in mobile terminal, and system therefor
US7810720B2 (en) * 2005-06-13 2010-10-12 Robert Lovett Account payment using barcode information exchange
US7907896B2 (en) * 2006-04-28 2011-03-15 Motorola Mobility, Inc. Mobile commerce method and device
USRE45409E1 (en) * 2004-03-12 2015-03-10 Sharecomm Limited Liability Company Systems, methods and devices for selling transaction instruments

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US38707A (en) 1863-05-26 Improvement in water-wheels
IL135150A0 (en) * 2000-03-17 2001-05-20 Avner Geller A method and a system for secured identification of user's identity
EP1316171A4 (en) * 2000-08-04 2006-05-03 First Data Corp Person-centric account-based digital signature system
US7558965B2 (en) * 2000-08-04 2009-07-07 First Data Corporation Entity authentication in electronic communications by providing verification status of device
US7337144B1 (en) * 2000-09-28 2008-02-26 Microsoft Corporation Method and system for restricting the usage of payment accounts
US20020087460A1 (en) * 2001-01-04 2002-07-04 Hornung Katharine A. Method for identity theft protection
US7801828B2 (en) * 2001-07-06 2010-09-21 Candella George J Method and system for detecting identity theft in non-personal and personal transactions
US20030061163A1 (en) * 2001-09-27 2003-03-27 Durfield Richard C. Method and apparatus for verification/authorization by credit or debit card owner of use of card concurrently with merchant transaction
US20030070101A1 (en) * 2001-10-09 2003-04-10 Buscemi James S. Method and apparatus for protecting personal information and for verifying identities
US8255978B2 (en) * 2003-03-11 2012-08-28 Innovatrend, Inc. Verified personal information database
US20050027983A1 (en) * 2003-08-01 2005-02-03 Klawon Kevin T. Integrated verification system
JP2005079926A (en) * 2003-08-29 2005-03-24 Brother Ind Ltd Image reader and copying machine equipped with the same
WO2005048145A1 (en) * 2003-10-13 2005-05-26 Starbucks Corporation D/B/A Starbucks Coffee Company Dual card
US8321946B2 (en) * 2003-12-05 2012-11-27 Hewlett-Packard Development Company, L.P. Method and system for preventing identity theft in electronic communications
US20050154671A1 (en) * 2004-01-08 2005-07-14 International Business Machines Corporation Systems and methods for mitigating identity theft associated with use of credit and debit cards
US20050165797A1 (en) * 2004-01-16 2005-07-28 Girish Nair Profile verification system
US7590232B2 (en) * 2004-07-21 2009-09-15 Carter John A System and method for tracking individuals
US8065525B2 (en) * 2004-09-22 2011-11-22 Bekad Mgmt. Ii, Llc Device with built-in user authentication and method for user authentication and identity theft protection
US20060282270A1 (en) * 2005-06-09 2006-12-14 First Data Corporation Identity verification noise filter systems and methods

Patent Citations (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080141033A1 (en) * 1995-02-13 2008-06-12 Intertrust Technologies Corporation Trusted and secure techniques, systems and methods for item delivery and execution
US5826245A (en) * 1995-03-20 1998-10-20 Sandberg-Diment; Erik Providing verification information for a transaction
US20040185830A1 (en) * 1996-08-08 2004-09-23 Joao Raymond Anthony Apparatus and method for providing account security
US6018724A (en) * 1997-06-30 2000-01-25 Sun Micorsystems, Inc. Method and apparatus for authenticating on-line transaction data
US20070124211A1 (en) * 2000-03-27 2007-05-31 Smith Steven B Methods and apparatus for wireless point-of-sale transactions
US20020040346A1 (en) * 2000-09-27 2002-04-04 Kwan Khai Hee Computer system and method for on-line generating a password protected and barcode prepaid instrument of entitlement and activating said instrument on presentation over a computer network
US20020099667A1 (en) * 2001-01-23 2002-07-25 Diamandis Peter H. Mehtod and apparatus for making purchases over the internet using pre-paid cards
US6925565B2 (en) * 2001-05-25 2005-08-02 Pen-One, Inc Pen-based transponder identity verification system
US20020190124A1 (en) * 2001-06-15 2002-12-19 Koninklijke Philips Electronics N.V. Point-of-sale (POS) voice authentication transaction system
US7379920B2 (en) * 2001-12-04 2008-05-27 Gary Leung System and method for facilitating electronic financial transactions using a mobile telecommunication device
US7437330B1 (en) * 2002-09-20 2008-10-14 Yt Acquisition Corp. System and method for categorizing transactions
US20050071244A1 (en) * 2003-06-18 2005-03-31 Phillips Brian Andrew Method and system for facilitating shipping via a third-party payment service
US20040260615A1 (en) * 2003-06-18 2004-12-23 Phillips Brian A. Method and system for facilitating shipping via third-party payment service
US20050015332A1 (en) * 2003-07-18 2005-01-20 Grace Chen Cashless payment system
US20050199706A1 (en) * 2004-03-12 2005-09-15 American Express Travel Related Services Company, Systems, methods, and devices for selling transaction instruments via web-based tool
USRE45409E1 (en) * 2004-03-12 2015-03-10 Sharecomm Limited Liability Company Systems, methods and devices for selling transaction instruments
US7502760B1 (en) * 2004-07-19 2009-03-10 Amazon Technologies, Inc. Providing payments automatically in accordance with predefined instructions
US20060018450A1 (en) * 2004-07-26 2006-01-26 Erik Sandberg-Diment Mobile telephone transaction system employing electronic account card
US20060026108A1 (en) * 2004-07-30 2006-02-02 Paul Wilson Voice/data financial transaction monitoring methods and systems
US7810720B2 (en) * 2005-06-13 2010-10-12 Robert Lovett Account payment using barcode information exchange
US20070100751A1 (en) * 2005-11-01 2007-05-03 Lorenzo Carver Method and system for processing and preventing credit card fraud in simultaneous remote wholesale exchange and local fullfillment of retail transactions by third party retailers
US7500606B2 (en) * 2006-04-14 2009-03-10 Harexinfotech, Inc. Method of settling signatureless payment of bank card sales slip in mobile terminal, and system therefor
US7907896B2 (en) * 2006-04-28 2011-03-15 Motorola Mobility, Inc. Mobile commerce method and device

Cited By (80)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130066767A1 (en) * 2011-03-30 2013-03-14 Douglas D. Fusco System and Method for Credit Information Acquisition, Aggregation, and Funding
US20120254017A1 (en) * 2011-03-30 2012-10-04 Fusco Douglas D System and Method for Credit Information Acquisition, Aggregation, and Maintenance
US8972298B2 (en) * 2012-07-31 2015-03-03 Google Inc. Merchant category codes in a proxy card transaction
US20140040130A1 (en) * 2012-07-31 2014-02-06 Google Inc. Merchant category codes in a proxy card transaction
US8676709B2 (en) * 2012-07-31 2014-03-18 Google Inc. Merchant category codes in a proxy card transaction
US20140149292A1 (en) * 2012-07-31 2014-05-29 Google Inc. Merchant category codes in a proxy card transaction
US10026119B2 (en) * 2012-09-10 2018-07-17 Google Llc Efficient transfer of funds between accounts
US20140172690A1 (en) * 2012-12-17 2014-06-19 Sas Institute Inc. Systems and Methods For Matching Domain Specific Transactions
US20140297435A1 (en) * 2013-03-28 2014-10-02 Hoiling Angel WONG Bank card secured payment system and method using real-time communication technology
WO2014182785A1 (en) * 2013-05-07 2014-11-13 Ramalingam Krishnamurthi Anand Fraud prevention for transactions
US9020859B2 (en) 2013-05-13 2015-04-28 Ramalingam Krishnamurthi Anand Fraud prevention for transactions
US10678898B2 (en) * 2013-05-13 2020-06-09 Veridium Ip Limited System and method for authorizing access to access-controlled environments
US11210380B2 (en) * 2013-05-13 2021-12-28 Veridium Ip Limited System and method for authorizing access to access-controlled environments
US20160203531A1 (en) * 2013-10-01 2016-07-14 Amadellas Corporation Devices and methods for information processing and access control
US10762541B2 (en) * 2013-10-01 2020-09-01 Amadellas Corporation Devices and methods for information processing and access control
US9525685B2 (en) 2014-02-07 2016-12-20 Bank Of America Corporation User authentication based on other applications
US10050962B2 (en) 2014-02-07 2018-08-14 Bank Of America Corporation Determining user authentication requirements along a continuum based on a current state of the user and/or the attributes related to the function requiring authentication
US9628495B2 (en) 2014-02-07 2017-04-18 Bank Of America Corporation Self-selected user access based on specific authentication types
US9819680B2 (en) 2014-02-07 2017-11-14 Bank Of America Corporation Determining user authentication requirements based on the current location of the user in comparison to the users's normal boundary of location
US9647999B2 (en) 2014-02-07 2017-05-09 Bank Of America Corporation Authentication level of function bucket based on circumstances
US9965606B2 (en) 2014-02-07 2018-05-08 Bank Of America Corporation Determining user authentication based on user/device interaction
US9721248B2 (en) 2014-03-04 2017-08-01 Bank Of America Corporation ATM token cash withdrawal
US10140610B2 (en) 2014-03-04 2018-11-27 Bank Of America Corporation Customer token preferences interface
US10762483B2 (en) 2014-03-04 2020-09-01 Bank Of America Corporation ATM token cash withdrawal
US9721268B2 (en) 2014-03-04 2017-08-01 Bank Of America Corporation Providing offers associated with payment credentials authenticated in a specific digital wallet
US9830597B2 (en) 2014-03-04 2017-11-28 Bank Of America Corporation Formation and funding of a shared token
US9406065B2 (en) 2014-03-04 2016-08-02 Bank Of America Corporation Customer token preferences interface
US9424572B2 (en) 2014-03-04 2016-08-23 Bank Of America Corporation Online banking digital wallet management
US9652764B2 (en) 2014-03-04 2017-05-16 Bank Of America Corporation Online banking digital wallet management
US10002352B2 (en) 2014-03-04 2018-06-19 Bank Of America Corporation Digital wallet exposure reduction
US9639836B2 (en) 2014-03-04 2017-05-02 Bank Of America Corporation Online banking digital wallet management
US9600817B2 (en) 2014-03-04 2017-03-21 Bank Of America Corporation Foreign exchange token
US9600844B2 (en) 2014-03-04 2017-03-21 Bank Of America Corporation Foreign cross-issued token
US10134030B2 (en) 2014-03-04 2018-11-20 Bank Of America Corporation Customer token preferences interface
US10176542B2 (en) * 2014-03-24 2019-01-08 Mastercard International Incorporated Systems and methods for identity validation and verification
WO2015191741A1 (en) * 2014-06-10 2015-12-17 Board Of Trustees Of The Leland Stanford Junior University Office Of The General Counsel Systems and methods for conducting relationship dependent online transactions
US10614452B2 (en) 2014-09-16 2020-04-07 Mastercard International Incorporated Systems and methods for providing risk based decisioning service to a merchant
US10657521B2 (en) 2014-09-16 2020-05-19 Mastercard International Incorporated Systems and methods for determining fraudulent transactions using digital wallet data
US11501286B2 (en) 2014-09-16 2022-11-15 Mastercard International Incorporated Systems and methods for providing fraud indicator data within an authentication protocol
US11815864B2 (en) 2014-10-07 2023-11-14 State Farm Mutual Automobile Insurance Company Systems and methods for managing building code compliance for a property
US11423754B1 (en) 2014-10-07 2022-08-23 State Farm Mutual Automobile Insurance Company Systems and methods for improved assisted or independent living environments
US11551235B1 (en) * 2014-10-07 2023-01-10 State Farm Mutual Automobile Insurance Company Systems and methods for managing building code compliance for a property
US10872329B2 (en) * 2015-09-03 2020-12-22 Mobile Elements Corp Contactless mobile payment system
US20180276652A1 (en) * 2015-09-03 2018-09-27 Dionisios A. Sofronas Contactless mobile payment system
US9965523B2 (en) 2015-10-30 2018-05-08 Bank Of America Corporation Tiered identification federated authentication network system
US9729536B2 (en) 2015-10-30 2017-08-08 Bank Of America Corporation Tiered identification federated authentication network system
US10460367B2 (en) 2016-04-29 2019-10-29 Bank Of America Corporation System for user authentication based on linking a randomly generated number to the user and a physical item
EP3465418A4 (en) * 2016-06-06 2019-09-25 Financial & Risk Organisation Limited Systems and methods for providing identity scores
US11063765B2 (en) 2016-06-06 2021-07-13 Refinitiv Us Organization Llc Systems and methods for providing identity scores
WO2017213719A1 (en) 2016-06-06 2017-12-14 Thomson Reuters Global Resources Systems and methods for providing identity scores
US10469263B2 (en) 2016-06-06 2019-11-05 Refinitiv Us Organization Llc Systems and methods for providing identity scores
AU2020200880B2 (en) * 2016-06-06 2021-11-04 Financial & Risk Organisation Limited Systems and methods for providing identity scores
US10268635B2 (en) 2016-06-17 2019-04-23 Bank Of America Corporation System for data rotation through tokenization
US10574643B2 (en) 2016-09-09 2020-02-25 Trusona, Inc. Systems and methods for distribution of selected authentication information for a network of devices
US10313480B2 (en) 2017-06-22 2019-06-04 Bank Of America Corporation Data transmission between networked resources
US10986541B2 (en) 2017-06-22 2021-04-20 Bank Of America Corporation Dynamic utilization of alternative resources based on token association
US10511692B2 (en) 2017-06-22 2019-12-17 Bank Of America Corporation Data transmission to a networked resource based on contextual information
US11190617B2 (en) 2017-06-22 2021-11-30 Bank Of America Corporation Data transmission to a networked resource based on contextual information
US10524165B2 (en) 2017-06-22 2019-12-31 Bank Of America Corporation Dynamic utilization of alternative resources based on token association
US10469504B1 (en) 2017-09-08 2019-11-05 Stripe, Inc. Systems and methods for using one or more networks to assess a metric about an entity
US11503033B2 (en) 2017-09-08 2022-11-15 Stripe, Inc. Using one or more networks to assess one or more metrics about an entity
US11323420B2 (en) * 2017-11-16 2022-05-03 Visa International Service Association Providing assertions regarding entities
US11824838B2 (en) * 2017-11-16 2023-11-21 Visa International Service Association Providing assertions regarding entities
US20220303248A1 (en) * 2017-11-16 2022-09-22 Visa International Service Association Providing assertions regarding entities
US11869328B2 (en) 2018-04-09 2024-01-09 State Farm Mutual Automobile Insurance Company Sensing peripheral heuristic evidence, reinforcement, and engagement system
US11670153B2 (en) 2018-04-09 2023-06-06 State Farm Mutual Automobile Insurance Company Sensing peripheral heuristic evidence, reinforcement, and engagement system
US11462094B2 (en) 2018-04-09 2022-10-04 State Farm Mutual Automobile Insurance Company Sensing peripheral heuristic evidence, reinforcement, and engagement system
US11423758B2 (en) 2018-04-09 2022-08-23 State Farm Mutual Automobile Insurance Company Sensing peripheral heuristic evidence, reinforcement, and engagement system
US11887461B2 (en) 2018-04-09 2024-01-30 State Farm Mutual Automobile Insurance Company Sensing peripheral heuristic evidence, reinforcement, and engagement system
US11222340B2 (en) * 2018-05-15 2022-01-11 Capital One Services, Llc Generating a random verification code for a transaction
US20200104853A1 (en) * 2018-05-15 2020-04-02 Capital One Services, Llc Generating a random verification code for a transaction
US20220129902A1 (en) * 2018-05-15 2022-04-28 Capital One Services, Llc Generating a random verification code for a transaction
US10496998B1 (en) * 2018-05-15 2019-12-03 Capital One Services, Llc Generating a random verification code for a transaction
US10402817B1 (en) * 2018-10-12 2019-09-03 Capital One Services, Llc Relaxed fraud detection for transactions using virtual transaction cards
US20220237589A1 (en) * 2018-10-12 2022-07-28 Capital One Services, Llc Relaxed fraud detection for transactions using virtual transaction cards
US11836707B2 (en) * 2018-10-12 2023-12-05 Capital One Services, Llc Relaxed fraud detection for transactions using virtual transaction cards
US11315106B2 (en) * 2018-10-12 2022-04-26 Capital One Services, Llc Relaxed fraud detection for transactions using virtual transaction cards
US11321716B2 (en) 2019-02-15 2022-05-03 Visa International Service Association Identity-based transaction processing
TWI767254B (en) * 2020-06-17 2022-06-11 玉山商業銀行股份有限公司 Authorization system and method thereof
US11706225B1 (en) 2022-05-02 2023-07-18 Bank Of America Corporation System for source independent but source value dependent transfer monitoring

Also Published As

Publication number Publication date
GB0712870D0 (en) 2007-08-08
WO2006062998A3 (en) 2007-03-29
US8224753B2 (en) 2012-07-17
WO2006062998A9 (en) 2006-07-20
WO2006062998A2 (en) 2006-06-15
US20060161435A1 (en) 2006-07-20
TW200642408A (en) 2006-12-01

Similar Documents

Publication Publication Date Title
US8224753B2 (en) System and method for identity verification and management
US20220180361A1 (en) Transactional approval system
RU2438172C2 (en) Method and system for performing two-factor authentication in mail order and telephone order transactions
US9582802B2 (en) Identity theft and fraud protection system and method
JP5663487B2 (en) System and method for processing transactions with online merchants
US8239677B2 (en) Verification and authentication systems and methods
US8719106B2 (en) Identity theft and fraud protection system and method
US7376628B2 (en) Methods and systems for carrying out contingency-dependent payments via secure electronic bank drafts supported by online letters of credit and/or online performance bonds
AU2004319618B2 (en) Multiple party benefit from an online authentication service
US20060273155A1 (en) System and method for on-line commerce operations
US20020099648A1 (en) Method of reducing fraud in credit card and other E-business
US20100179906A1 (en) Payment authorization method and apparatus
US20060173776A1 (en) A Method of Authentication
US20080114670A1 (en) Systems and methods for a transaction vetting service
US20100100482A1 (en) Intermediate Data Generation For Transaction Processing
US20080015988A1 (en) Proxy card authorization system
US6941282B1 (en) Methods and systems for carrying out directory-authenticated electronic transactions including contingency-dependent payments via secure electronic bank drafts
KR20080067641A (en) Identity theft and fraud protection system and method
JP2005517252A (en) Method and system for verifying authority of holder of digital certificate issued by certificate authority
KR20030019466A (en) Method and system of securely collecting, storing, and transmitting information
US20080071674A1 (en) System and method for on-line commerce operations including payment transactions
EP1134707A1 (en) Payment authorisation method and apparatus
KR20180029227A (en) Security and user authentication for electronic transactions
GB2360383A (en) Payment authorisation
Mazitova Consumer liability in case of fraud with electronic payment instruments: an analysis of European and Russian rules

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION