US20120290482A1 - System and method for identity verification and management - Google Patents
System and method for identity verification and management Download PDFInfo
- Publication number
- US20120290482A1 US20120290482A1 US13/524,312 US201213524312A US2012290482A1 US 20120290482 A1 US20120290482 A1 US 20120290482A1 US 201213524312 A US201213524312 A US 201213524312A US 2012290482 A1 US2012290482 A1 US 2012290482A1
- Authority
- US
- United States
- Prior art keywords
- user
- identity
- identification
- transaction
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4015—Transaction verification using location information
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification
- G10L17/06—Decision making techniques; Pattern matching strategies
- G10L17/10—Multimodal systems, i.e. based on the integration of multiple recognition engines or fusion of expert systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2113—Multi-level security, e.g. mandatory access control
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2115—Third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2119—Authenticating web pages, e.g. with suspicious links
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/23—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a password
Definitions
- the present invention relates to identity theft protection systems. More particularly, the present invention relates to a system and method for identity verification and management.
- Identity theft is considered one of the fastest growing crimes in the United States. For example, between 2002 and 2003, the number of reported cases of identity theft grew 80 percent. In 2002 alone, nearly ten million cases of identify theft were reported. Nearly one in 8 United States adults have fallen victim to identity theft in the last five years. On average, identify theft will cost a victim approximately $1,000 in expenses to rectify the damage caused to their financial accounts and reputations. The yearly costs of identity theft are enormous, costing business approximately $48 billion and individuals approximately $5 billion.
- Identity thieves can operate in a number of ways. With the spread of the Internet and the increases in computer processing technology, access to personal and financial information of individuals (through both legal and illegal means) has become far easier and more prevalent. Other more conventional techniques include stealing credit card numbers and using those numbers to create new credit cards under false names. Job applications, personnel records and employment data that should be confidential can instead be stolen by thieves who use the information to steal workers' identities. A person's social security number can be stolen and used by the criminal to apply for credit. Once the identification is stolen and credit is issued, the identity thief can use the credit in an unrestricted manner. Typically, the victim of the identity theft may not learn of the theft until many weeks or months after the crime has occurred, for example, not until the next credit card statement is received.
- Much of identity theft occurs because an individual cannot control how and who uses their identity and, consequently, their credit.
- the problem of identity theft also applies to companies and other like entities whose identities are also at risk, such as financial institutions, retail stores and the like.
- a criminal company can pretend to represent a reputable company and use the reputable company's stolen identity for financial gain.
- a fraudulent mortgage company could pretend to represent a reputable and established Bank to steal money from unsuspecting individuals, to the financial and reputational detriment of both the individuals and the Bank.
- a system for verifying an identity of a user includes an identification score assignment module.
- the identification score assignment module is configured to receive at least one source of identification of the user.
- the identification score assignment module is configured to assign an identification score to each of the at least one source of identification.
- the system includes a total identification score generation module in communication with the identification score assignment module.
- the total identification score generation module is configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function.
- the total identification score of the user is associated with a level of verification of the identity of the user.
- the total identification score of the user is compared to a minimum identification score associated with a transaction.
- the transaction is performed when the total identification score of the user is one of greater than and equal to the minimum identification score. Additional sources of identification of the user are received before performing the transaction when the total identification score is less than the minimum identification score.
- the at least one source of identification can comprise a driver's license of the user.
- the at least one source of identification can comprise a birth certificate of the user.
- the identification score assigned to each of the at least one source of identification can be based upon a reliability of the at least one source of identification.
- the predetermined function can comprise, for example, a summing function, a weighted summing function or the like.
- the system can include a data storage device. Personal information and/or financial information of the user can be stored in the data storage device. The total identification score can be associated with the personal information and/or financial information of the user.
- the system can include an access code generation module.
- the access code generation module can be configured to generate a unique identity access authorization code associated with the user for use by a third party to access information associated with the user.
- the system can include a data transmission module.
- the data transmission module can be configured to transmit at least the total identification score of the user to the third party upon verification of the identity access authorization code.
- the data transmission module can be configured to transmit at least the total identification score of the user to the third party upon further verification of a user identification code of the user.
- the user identification code can comprise a social security number of the user.
- the system can include a log module.
- the log module can be configured to record accesses associated with the total identification score of the user by the third party.
- the system can include a report generation module.
- the report generation module can be configured to generate reports for displaying the record of accesses associated with the total identification score of the user.
- Personal information and/or financial information associated with the user can be transmitted to the third party upon verification of the identity access authorization code.
- the personal information and/or financial information associated with the user can be transmitted to the third party upon further verification of a user identification code of the user.
- the user identification code can comprise a social security number of the user.
- the system can include an identity card.
- the identity card can be configured to securely contain identification information associated with the user.
- the identity card can comprise, for example, a smart card.
- the identification information associated with the user can be encrypted on the identity card. Uses of the identification information securely contained on the identity card can be restricted by the user. Locations of where the identification information is used can be restricted by the user. Times of when the identification information is used can be restricted by the user. Types of transactions for which the identification information is used can be restricted by the user. Use of the identification information for the transaction can be prohibited when the identification information is restricted by the user for the transaction. The identification information for the transaction can be used when the identification information is not prohibited by the user for the transaction.
- the system can include a transaction order generation module.
- the transaction order generation module can be configured to generate a transaction order using the total identification score of the user.
- the transaction order can be submitted by the user to perform the transaction.
- Personal information and/or financial information of the user can be accessed, using the transaction order, to complete the transaction.
- the system can include an address identification code generation module.
- the address identification code generation module can be configured to generate an address identification code associated with an address of the user.
- the address identification code and an address of a communication reception center can be supplied to a third party. Communications for the user from the third party can be received at the communication reception center.
- the communications can include the address identification code.
- the system can include a communication display module.
- the communication display module can be configured to display the communications to the user associated with the address identification code.
- the system can include an identity risk factor generation module.
- the identity risk factor generation module can be configured to generate an identity risk factor associated with the user.
- the identity risk factor can be associated with a level of risk of theft of the identity of the user by identity thieves.
- the transaction can comprise, for example, an application for credit, a purchase transaction or the like.
- the system can include a graphical user interface.
- the graphical user interface can be configured to provide access to and management of identification information associated with the user.
- a system for verifying an identity of a user includes a receiver module configured to receive at least one source of identification of the user.
- the system includes an identification score assignment module configured to assign an identification score to each of the at least one source of identification.
- the system includes an identification score generation module configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user.
- the system includes a comparator module configured to compare the total identification score of the user to a minimum identification score associated with a transaction.
- the system also includes a transaction approval module.
- the transaction approval module is configured to generate an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score.
- the transaction approval module is configured to generate a request for additional sources of identification of the user before generating the approval of the transaction when the total identification score is less than the minimum identification score.
- a system for verifying an identity of a user includes an identification score assignment module configured to receive at least one source of identification of the user, and configured to assign an identification score to each of the at least one source of identification.
- the system includes a total identification score generation module configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user.
- the system also includes an approval receiver module.
- the approval receiver module is configured to receive an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score.
- the approval receiver module is configured to receive a request for additional sources of identification of the user before receiving the approval of the transaction when the total identification score is less than the minimum identification score.
- a system for verifying an identity of a user includes a receiver module configured to receive a total identification score of the user.
- the total identification score is generated from identification scores assigned to each of at least one source of identification of the user and a predetermined function.
- the total identification score of the user is associated with a level of verification of the identity of the user.
- the system includes a comparator module configured to compare the total identification score of the user to a minimum identification score associated with a transaction.
- the system includes a transaction approval module.
- the transaction approval module is configured to generate an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score.
- the transaction approval module is configured to generate a request for additional sources of identification of the user before generating the approval of the transaction when the total identification score is less than the minimum identification score.
- a method of verifying an identity of a user includes the steps of: a.) receiving at least one source of identification of the user; b.) assigning an identification score to each of the at least one source of identification; and c.) generating a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function.
- the total identification score of the user is associated with a level of verification of the identity of the user.
- the total identification score of the user is compared to a minimum identification score associated with a transaction. The transaction is performed when the total identification score of the user is one of greater than and equal to the minimum identification score. Additional sources of identification of the user are received before performing the transaction when the total identification score is less than the minimum identification score.
- the at least one source of identification can comprise a driver's license of the user.
- the at least one source of identification can comprise a birth certificate of the user.
- the identification score assigned to each of the at least one source of identification can be based upon a reliability of the at least one source of identification.
- the predetermined function can comprise, for example, a summing function, a weighted summing function or the like.
- the method can include the steps of: d.) supplying at least one of personal information and financial information of the user, wherein the total identification score can be associated with the at least one of personal information and financial information of the user; e.) generating a unique identity access authorization code associated with the user for use by a third party in the transaction; and f.) transmitting, to the third party, at least the total identification score of the user upon verification of the identity access authorization code. At least the total identification score of the user can be transmitted to the third party upon further verification of a user identification code of the user.
- the user identification code can comprise, for example, a social security number of the user.
- the method can include the steps of: g.) recording accesses associated with the total identification score of the user by the third party; h.) reviewing the record of accesses associated with the total identification score of the user; and i.) transmitting, to the third party, personal information and/or financial information associated with the user upon verification of the identity access authorization code of the user.
- the personal information and/or financial information associated with the user can be transmitted to the third party upon further verification of a user identification code of the user.
- the user identification code can comprise, for example, a social security number of the user.
- the method can include the step of: j.) issuing an identity card securely containing identification information associated with the user.
- the identity card can comprise, for example, a smart card.
- the identification information associated with the user can be encrypted on the identity card.
- the method can include the step of: k.) restricting uses of the identification information securely contained on the identity card.
- step (k) can comprise the steps of: l.) restricting locations of where the identification information is used; m.) restricting times of when the identification information is used; and n.) restricting types of transactions for which the identification information is used.
- the method can include the steps of: o.) prohibiting use of the identification information for the transaction when the identification information is restricted by the user for the transaction; p.) using the identification information for the transaction when the identification information is not prohibited by the user for the transaction; q.) generating a transaction order using the total identification score of the user; r.) submitting the transaction order to perform the transaction; s.) transmitting at least one of personal information and financial information of the user, upon verification of the transaction order, to complete the transaction; t.) associating an address identification code with an address of the user; u.) supplying the address identification code and an address of a communication reception center to a third party; v.) receiving communications for the user from the third party at the communication reception center, wherein the communications include the address identification code; w.) supplying the communications to the user associated with the address identification code; and x.) supplying an identity risk factor associated with the user, wherein the identity risk factor can be associated with a level of risk of theft of the identity of the user by
- a method of verifying an identity of a user includes the steps of: a.) receiving at least one source of identification of the user; b.) assigning an identification score to each of the at least one source of identification; c.) generating a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function, wherein the total identification score of the user is associated with a level of verification of the identity of the user; d.) comparing the total identification score of the user to a minimum identification score associated with a transaction; e.) approving the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score; and f.) requesting additional sources of identification of the user before approving the transaction when the total identification score is less than the minimum identification score.
- a method of verifying an identity of a user includes the steps of: a.) receiving at least one source of identification of the user; b.) assigning an identification score to each of the at least one source of identification; c.) generating a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function, wherein the total identification score of the user is associated with a level of verification of the identity of the user; d.) receiving approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score; and e.) receiving a request for additional sources of identification of the user before receiving approval of the transaction when the total identification score is less than the minimum identification score.
- a method of verifying an identity of a user includes the steps of: a.) receiving a total identification score of the user, wherein the total identification score is generated from identification scores assigned to each of at least one source of identification of the user and a predetermined function, and wherein the total identification score of the user is associated with a level of verification of the identity of the user; b.) comparing the total identification score of the user to a minimum identification score associated with a transaction; c.) approving the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score; and d.) requesting additional sources of identification of the user before approving the transaction when the total identification score is less than the minimum identification score.
- a system for verifying an identity of a user includes means for assigning an identity score.
- the identity score assigning means is configured to receive at least one source of identification of the user.
- the identity score assigning means is configured to assign an identification score to each of the at least one source of identification.
- the system includes means for generating a total identity score in communication with the identity score assigning means.
- the total identity score generating means is configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function.
- the total identification score of the user is associated with a level of verification of the identity of the user.
- the total identification score of the user is compared to a minimum identification score associated with a transaction. The transaction is performed when the total identification score of the user is one of greater than and equal to the minimum identification score. Additional sources of identification of the user are received before performing the transaction when the total identification score is less than the minimum identification score.
- the at least one source of identification can comprise a driver's license of the user.
- the at least one source of identification can comprise a birth certificate of the user.
- the identification score assigned to each of the at least one source of identification can be based upon a reliability of the at least one source of identification.
- the predetermined function can comprise, for example, a summing function, a weighted summing function or the like.
- the system can include means for storing data. Personal information and/or financial information of the user can be stored in the data storing means.
- the total identification score can be associated with the personal information and/or financial information of the user.
- the system can include means for generating an access code.
- the access code generating means can be configured to generate a unique identity access authorization code associated with the user for use by a third party to access information associated with the user.
- the system can include means for transmitting data.
- the data transmitting means can be configured to transmit at least the total identification score of the user to the third party upon verification of the identity access authorization code.
- the data transmitting means can be configured to transmit at least the total identification score of the user to the third party upon further verification of a user identification code of the user.
- the user identification code can comprise, for example, a social security number of the user.
- the system can include means for logging.
- the logging means can be configured to record accesses associated with the total identification score of the user by the third party.
- the system can include means for generating a report.
- the report generating means can be configured to generate reports for displaying the record of accesses associated with the total identification score of the user.
- personal information and/or financial information associated with the user can be transmitted to the third party upon verification of the identity access authorization code.
- the personal information and/or financial information associated with the user can be transmitted to the third party upon further verification of a user identification code of the user.
- the user identification code can comprise, for example, a social security number of the user.
- the system can include an identity card means.
- the identity card means can be configured to securely contain identification information associated with the user.
- the identity card can comprise, for example, a smart card means.
- the identification information associated with the user can be encrypted on the identity card means. Uses of the identification information securely contained on the identity card means can be restricted by the user. For example, locations of where the identification information is used can be restricted by the user. Times of when the identification information is used can be restricted by the user. Types of transactions for which the identification information is used can be restricted by the user. Use of the identification information for the transaction can be prohibited when the identification information is restricted by the user for the transaction. The identification information for the transaction can be used when the identification information is not prohibited by the user for the transaction.
- the system can include means for generating a transaction order.
- the transaction order generating means can be configured to generate a transaction order using the total identification score of the user.
- the transaction order can be submitted by the user to perform the transaction.
- Personal information and/or financial information of the user can be accessed, using the transaction order, to complete the transaction.
- the system can include means for generating an address identification code.
- the address identification code generating means can be configured to generate an address identification code associated with an address of the user.
- the address identification code and an address of a communication reception center can be supplied to a third party. Communications for the user from the third party can be received at the communication reception center.
- the communications can include, for example, the address identification code.
- the system can include means for displaying a communication.
- the communication displaying means can be configured to display communications to the user associated with the address identification code.
- the system can include means for generating an identity risk factor.
- the identity risk factor generating means can be configured to generate an identity risk factor associated with the user.
- the identity risk factor can be associated with a level of risk of theft of the identity of the user by identity thieves.
- the transaction can comprise an application for credit, a purchase transaction or the like.
- the system can also include a graphical user interface means.
- the graphical user interface means can be configured to provide access to and management of identification information associated with the user.
- a system for verifying an identity of a user includes means for receiving configured to receive at least one source of identification of the user.
- the system includes means for assigning an identification score configured to assign an identification score to each of the at least one source of identification.
- the system includes means for generating an identification score configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function.
- the total identification score of the user is associated with a level of verification of the identity of the user.
- the system includes means for comparing configured to compare the total identification score of the user to a minimum identification score associated with a transaction.
- the system includes means for approving a transaction.
- the transaction approving means is configured to generate an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score.
- the transaction approving means is configured to generate a request for additional sources of identification of the user before generating the approval of the transaction when the total identification score is less than the minimum identification score.
- a system for verifying an identity of a user includes means for assigning an identification score configured to receive at least one source of identification of the user and configured to assign an identification score to each of the at least one source of identification.
- the system includes means for generating a total identification score configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function.
- the total identification score of the user is associated with a level of verification of the identity of the user.
- the system includes means for receiving an approval.
- the approval receiving means is configured to receive an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score.
- the approval receiving means is configured to receive a request for additional sources of identification of the user before receiving the approval of the transaction when the total identification score is less than the minimum identification score.
- a system for verifying an identity of a user includes means for receiving configured to receive a total identification score of the user.
- the total identification score is generated from identification scores assigned to each of at least one source of identification of the user and a predetermined function.
- the total identification score of the user is associated with a level of verification of the identity of the user.
- the system includes means for comparing configured to compare the total identification score of the user to a minimum identification score associated with a transaction.
- the system includes means for approving a transaction.
- the transaction approving means is configured to generate an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score.
- the transaction approving means is configured to generate a request for additional sources of identification of the user before generating the approval of the transaction when the total identification score is less than the minimum identification score.
- a computer-readable medium contains a computer program for verifying an identity of a user.
- the computer program performs the steps of: a.) receiving at least one source of identification of the user; b.) assigning an identification score to each of the at least one source of identification; and c.) generating a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function, wherein the total identification score of the user is associated with a level of verification of the identity of the user, wherein the total identification score of the user is compared to a minimum identification score associated with a transaction, wherein the transaction is performed when the total identification score of the user is one of greater than and equal to the minimum identification score, and wherein additional sources of identification of the user are received before performing the transaction when the total identification score is less than the minimum identification score.
- the at least one source of identification can comprise a driver's license of the user.
- the at least one source of identification can comprise a birth certificate of the user.
- the identification score assigned to each of the at least one source of identification can be based upon a reliability of the at least one source of identification.
- the predetermined function can comprise, for example, a summing function, a weighted summing function or the like.
- the computer program can perform the steps of: d.) retrieving at least one of personal information and financial information of the user, wherein the total identification score is associated with the at least one of personal information and financial information of the user; e.) generating a unique identity access authorization code associated with the user for use by a third party in the transaction; and f.) initiating transmission, to the third party, of at least the total identification score of the user upon verification of the identity access authorization code. At least the total identification score of the user can be transmitted to the third party upon further verification of a user identification code of the user.
- the user identification code can comprise, for example, a social security number of the user.
- the computer program can perform the steps of: g.) recording accesses associated with the total identification score of the user by the third party; h.) providing a review of the record of accesses associated with the total identification score of the user; and i.) initiating transmission, to the third party, of personal information and/or financial information associated with the user upon verification of the identity access authorization code of the user.
- the personal information and/or financial information associated with the user can be transmitted to the third party upon further verification of a user identification code of the user.
- the user identification code can comprise, for example, a social security number of the user.
- the computer program can perform the step of: j.) generating authorization for issuance of an identity card securely containing identification information associated with the user.
- the identity card can comprise, for example, a smart card or the like.
- the identification information associated with the user can be encrypted on the identity card.
- the computer program can perform the step of k.) generating use restrictions for the identification information securely contained on the identity card.
- the computer program can perform the steps of: l.) generating location restrictions for where the identification information is used; m.) generating temporal restrictions for when the identification information is used; and n.) generating type restrictions for transactions for which the identification information is used.
- the computer program can perform the steps of: o.) generating use prohibitions for the identification information for the transaction when the identification information is restricted by the user for the transaction; p.) generating authorization to use the identification information for the transaction when the identification information is not prohibited by the user for the transaction; q.) generating a transaction order using the total identification score of the user; r.) forwarding the transaction order to perform the transaction; s.) initiating transmission of at least one of personal information and financial information of the user, upon verification of the transaction order, to complete the transaction; t.) associating an address identification code with an address of the user; u.) providing the address identification code and an address of a communication reception center to a third party; v.) receiving communications for the user from the third party at the communication reception center, wherein the communications can include, for example, the address identification code; w.) forwarding the communications to the user associated with the address identification code; and x.) generating an identity risk factor associated with the user, wherein the identity risk factor can be associated with
- a computer-readable medium contains a computer program for verifying an identity of a user, wherein the computer program performs the step of: a.) receiving at least one source of identification of the user; b.) assigning an identification score to each of the at least one source of identification; c.) generating a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function, wherein the total identification score of the user is associated with a level of verification of the identity of the user; d.) comparing the total identification score of the user to a minimum identification score associated with a transaction; e.) generating an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score; and f.) initiating a request for additional sources of identification of the user before generating the approval of the transaction when the total identification score is less than the minimum identification score.
- a computer-readable medium contains a computer program for verifying an identity of a user, wherein the computer program performs the step of: a.) receiving at least one source of identification of the user; b.) assigning an identification score to each of the at least one source of identification; c.) generating a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function, wherein the total identification score of the user is associated with a level of verification of the identity of the user; d.) receiving an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score; and e.) receiving a request for additional sources of identification of the user before receiving the approval of the transaction when the total identification score is less than the minimum identification score.
- a computer-readable medium contains a computer program for verifying an identity of a user, wherein the computer program performs the step of a.) receiving a total identification score of the user, wherein the total identification score is generated from identification scores assigned to each of at least one source of identification of the user and a predetermined function, and wherein the total identification score of the user is associated with a level of verification of the identity of the user; b.) comparing the total identification score of the user to a minimum identification score associated with a transaction; c.) generating an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score; and d.) initiating a request for additional sources of identification of the user before generating the approval of the transaction when the total identification score is less than the minimum identification score.
- a system for verifying an identity of a user includes an identification score assignment module.
- the identification score assignment module is configured to receive at least one source of identification of the user.
- the identification score assignment module is configured to assign an identification score to each of the at least one source of identification.
- the system includes a total identification score generation module in communication with the identification score assignment module.
- the total identification score generation module is configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function.
- the total identification score of the user is associated with a level of verification of the identity of the user.
- the total identification score of the user is compared to a minimum identification score associated with a transaction.
- the system includes an identity confidence factor generation module in communication with the total identification score generation module.
- the identity confidence factor generation module is configured to generate an identity confidence factor associated with the user in accordance with a validity of the identity of the user.
- the transaction is performed when at least one of i.) the total identification score of the user is one of greater than and equal to the minimum identification score, and ii.) the identity confidence factor of the user is greater than a predetermined identity threshold value. Additional sources of identification of the user are received before performing the transaction when at least one of: i.) the total identification score is less than the minimum identification score, and ii.) the identify confidence factor of the user is less than the predetermined identity threshold value.
- the validity of the identity of the user can be based on a time factor.
- the time factor can comprise a length of time in which the identity of the user is used legitimately.
- the identity confidence factor of the user can be increased as the length of time in which the identity of the user is legitimately used increases.
- the system can include a healthcare identity card.
- the healthcare identity card can be configured to securely contain identification information associated with the user.
- the healthcare identity card can be configured to be used by a healthcare provider to retrieve healthcare information associated with the user.
- FIG. 1 is a block diagram illustrating a system for verifying an identity of a user, in accordance with an exemplary embodiment of the present invention.
- FIGS. 2A-2C are flowcharts illustrating steps for verifying an identity of a user, in accordance with an exemplary embodiment of the present invention.
- FIG. 3 is a flowchart illustrating steps for restricting uses of identification information securely contained on an identity card, in accordance with an exemplary embodiment of the present invention.
- FIG. 4 is a flowchart illustrating steps for verifying an identity of a user, in accordance with an alternative exemplary embodiment of the present invention.
- FIG. 5 is a flowchart illustrating steps for verifying an identity of a user, in accordance with an alternative exemplary embodiment of the present invention.
- FIG. 6 is a flowchart illustrating steps for verifying an identity of a user, in accordance with an alternative exemplary embodiment of the present invention.
- FIG. 7 is a diagram illustrating information routing for GIS, in accordance with an exemplary embodiment of the present invention.
- FIG. 8 is a diagram illustrating the identity management system distributed platform model, in accordance with an exemplary embodiment of the present invention.
- FIG. 9 is a diagram illustrating an exemplary architecture for the identity management system 100 platform, in accordance with an exemplary embodiment of the present invention.
- FIGS. 10A and 10B are flow diagrams illustrating a transaction using an automated pre-authorization process for the identity management system without using a one-time card number, in accordance with an exemplary embodiment of the present invention.
- FIGS. 11A and 11B are flow diagrams illustrating a transaction using an automated pre-authorization process for the identity management system using a one-time card number, in accordance with an exemplary embodiment of the present invention.
- FIGS. 12A and 12B are flow diagrams illustrating a transaction using an automated pre-authorization process for the identity management system without registration and without using a one-time card number, in accordance with an exemplary embodiment of the present invention.
- FIGS. 13A and 13B are flow diagrams illustrating a transaction using an automated pre-authorization process for the identity management system without registration but using a one-time card number, in accordance with an exemplary embodiment of the present invention.
- FIG. 14 is a diagram illustrating insurance coverage using the identity management system, in accordance with an exemplary embodiment of the present invention.
- FIG. 15 is a diagram illustrating on-line gambling transactions with the identity management system, in accordance with an exemplary embodiment of the present invention.
- FIG. 16 is a diagram illustrating a commerce platform for the identity management system, in accordance with an exemplary embodiment of the present invention.
- Exemplary embodiments of the present invention are directed to a system and method for identity verification and management.
- the identity of an individual or entity (collectively, a “user”) is first verified.
- One or more sources of identification are supplied by the user, with each source of identification being verified and given an individual identity value or score based on, for example, the level of reliability or authenticity of the identification source.
- the identity of the user is then evaluated based on the total of the identity scores. A total identification score is assigned to the user. Once the identity of the user is verified, the user can manage its identity using the identity management system of the present invention.
- the identity management system can, for example, provide authorization to certain organizations to supply services to the user for a period of time. For example, each time the user authorizes an organization to provide a service to the user using the user's identity, the identity management system can provide the user with an identity authorization code to pass to the organization. Once a user sends the identity authorization code, along with its identity information, such as, for example, a social security number, the organization can further verify the identity of the user by using an additional aspect of the identity management system of the present invention. According to exemplary embodiments, the identity management system can be used by vendors wishing to provide a service to the user.
- the identity management system can allow the vendor to input the client's identity information (e.g., social security number) along with the provided identity authorization code to determine if the user has verified the vendor to use the user's identity information based on the criteria the user has inputted into the identity management system.
- client's identity information e.g., social security number
- the user can also restrict the use of its identity information and credit information based on, for example, an identification card issued to the user by the system.
- the identification card can also restrict uses of the user's identity and/or credit based on specified restrictions.
- the user can specify a restriction such that any credit card issued to the user cannot be used internationally or the like. Such a restriction will allow the user to restrict the user's exposure to identity theft.
- the identity management system can also issue an identity risk factor to the user.
- the identity risk factor can assist both the user and third parties in evaluating the exposure of the user to identity theft.
- Online purchases can also be verified using the identity management system according to exemplary embodiments.
- the identity management system can identify a user by asking the user to provide an identification number and/or an identity code uniquely assigned to the user.
- an online merchant can be certain that the credit card being used has not been stolen and is not being used in a fraudulent manner.
- the user can restrict the use of the credit card based on specified restrictions as part of process of managing the user's identity profile.
- exemplary embodiments of the present invention can establish, maintain and secure the identity of a user through proper identity verification and management, issuance of secure identity cards and unique identity codes to be used along with the identity cards, and the like.
- a “user” can be any person, group of individuals, company, corporation, business, retail establishment, organization or other any suitable type of entity that possesses a unique identity that can be potentially stolen or otherwise compromised, and for which protection against identity theft is desired.
- FIG. 1 is a block diagram illustrating an identity management system 100 for verifying an identity of a user, in accordance with an exemplary embodiment of the present invention.
- the identity management system 100 includes an identification score assignment module 105 .
- the identification score assignment module 105 is configured to receive at least one source of identification 110 of the user. Any suitable number N of sources of identification 110 can be supplied or otherwise transmitted by the user to the identification score assignment module 105 (e.g., source of identification 1 , source of identification 2 , . . . , source of identification N).
- Each source of identification 110 can be any appropriate means for uniquely identifying a user, such as, for example, a driver's license, a social security card, a birth certificate, passport or other like credential(s) of the user.
- the sources of identification 110 can be supplied by the user to the identification score assignment module 105 using any appropriate means, such as any suitable form of electronic transmission (e.g., a scanned copy of the documentation, facsimile, electronic mail and/or the like) or manual delivery.
- the identification score assignment module 105 is configured to assign an identification score to each of the at least one source of identification 110 .
- an identification score is a value that represents the level of verification or veracity of a given source of identification 110 .
- the identification score assigned to each of the at least one source of identification 110 is based upon the reliability of the at least one source of identification 110 .
- identification scores can be based on a scale, such as 0 to 10, 0 to 100 or any suitable scale.
- an identification score below a certain threshold number can represent that the source of identification 110 cannot be considered trusted or reliable and is not (or cannot be) verified
- an identification score at or above the given threshold can represent that the source of identification 110 can be considered trusted, reliable and verified (or verifiable).
- any appropriate identification score can be assigned to a source of information 110 , so long as the identification score is indicative of the level of verification, reliability and/or veracity of the source of identification 110 .
- identification scores for each type of source of identification 110 can pre-assigned and stored in, for example, a look-up table or database.
- driver's licenses can have a score of for example, 60 (or other suitable value)
- birth certificates can have a score of, for example, 85 (or other suitable value)
- each score being retrieved from the look-up table or database based on the type of source of identification 110 provided by the user.
- identification scores for each source of identification 110 can be assigned dynamically, i.e., the identification scores can be generated based on one or more factors, for example, the type of source of identification 110 , personal information of the user, and the like.
- the identification score assigned to this source of identification 110 can be high, otherwise it can be assigned a lower score.
- Those of ordinary skill in the art will recognize that other methods of assigning identification scores to sources of identification 110 can be used.
- the identity management system 100 includes a total identification score generation module 115 in communication with the identification score assignment module 105 .
- the total identification score generation module 115 is configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification 110 using a predetermined function.
- a total identification score of a user is a value that represents the level of verification of the identity of the user.
- the total identification score can be considered akin to, for example, a credit score that is given to a user based on the user's credit history.
- total identification scores can be based on a scale, such as 0 to 10, 0 to 100 or any suitable scale.
- a total identification score below a certain threshold number can represent that the identity of the user cannot be considered reliable and is not (or cannot be) verified
- a total identification score at or above the given threshold can represent that the identity of the user can be considered trusted, reliable and verified (or verifiable).
- any appropriate threshold can be used as the demarcation for the total identification score, so long as any total identification score at or above such a threshold is indicative of the level of verification, reliability and/or veracity of the identity of the user.
- the total identification score generation module 115 generates a total identification score by combining the identification scores of each source of identification 110 .
- the total identification score generation module 115 can use a summing function to sum the individual scores to create the total identification score.
- the total identification score generation module 115 can use a weighted summing function to add the individuals identification scores of each of the sources of identification 110 , while giving greater weight to those sources of identification 110 that are more reliable (e.g., assigning greater weight to a birth certificate than to a social security card).
- the total identification score generation module 115 can use an averaging function to average the identification scores of the sources of identification 110 .
- any suitable method for generating the total identification score from the identification scores of each of the sources of identification 110 can be used, so long as the resulting total identification score is indicative of the level of verification or reliability of the identity of the user.
- the identification score assignment module 105 can then attempt to verify each source of identification 110 .
- the identification score assignment module 105 can be configured to access public record databases (e.g., via the Internet), state department of motor vehicle databases (e.g., to verify the driver's license) or other databases of other state agencies (e.g., to verify the birth certificate), federal record databases (e.g., to verify the social security card) and the like.
- public record databases e.g., via the Internet
- state department of motor vehicle databases e.g., to verify the driver's license
- other databases of other state agencies e.g., to verify the birth certificate
- federal record databases e.g., to verify the social security card
- the identification score assignment module 105 assigns an identification score of 54 to the social security card, an identification score of 68 to the driver's license, and an identification score of 85 to the birth certificate.
- each of the identification scores can be either a pre-assigned number based on the type of source of identification 110 , or dynamically generated based on one or more factors.
- the total identification score assigned to the user can be used as part of a transaction.
- the transaction can include an application for credit, a purchase transaction, or any suitable transaction for which verification of a user's identity is required.
- the credit card company can receive the total identification score of the user (as discussed below) as part of the application process.
- the total identification score of the user can be compared to a minimum identification score associated with the transaction.
- the total identification score generation module 115 can alternatively perform the comparison on behalf of the credit card company.
- the total identification score generation module 115 can include or be in communication with a comparator module configured to compare the total identification score of the user to the minimum identification score associated with the transaction.
- the credit card company requires a minimum total identification score of 50 (using an averaging function) to issue the user a credit card. Since the total identification score of the user is 70, the credit card company can be assured of the verification of the identity of the user. In other words, the transaction can be performed (e.g., the credit card is issued), since the total identification score of the user (e.g., 70) is greater than or equal to the minimum identification score (e.g., 50) required to perform the transaction. However, if the total identification score was less than the minimum identification score, one or more additional sources of identification 110 of the user can be requested, received and verified (e.g., until the total identification score is above the minimum identification score) before the transaction can be performed.
- the minimum identification score e.g., 50
- the total identification score generation module 115 can include or be in communication with a transaction approval module.
- the transaction approval module can be configured to generate an approval of the transaction when the total identification score of the user is greater than or equal to the minimum identification score, and to generate a request to the user for additional sources of identification 110 before generating the approval of the transaction when the total identification score is less than the minimum identification score.
- the total identification score generation module 115 can include or be in communication with an approval receiver module.
- the approval receiver module can be configured to receive an approval of the transaction when the total identification score of the user is greater than or equal to the minimum identification score, and to receive a request for additional sources of identification 110 of the user before receiving the approval of the transaction when the total identification score is less than the minimum identification score.
- the identification scores assigned to each of the sources of identification 110 , the total identification score of the user, and the minimum identification score required to perform the transaction will depend on such factors as the types of documents submitted by the user, the predetermined function used to generate the total identification score, the level of verification desired by the third party to perform the transaction, the type of transaction to be performed, and other like factors.
- a CONFIDENCE FACTORTM (which can also be referred to as an “identity confidence factor”) can be used to evaluate and measure the validity of a user's identity, additionally or alternatively to the total identification score of the user.
- the CONFIDENCE FACTORTM can be used by the total identification score generation module 115 as part of the generation of the total identification score of the user.
- the CONFIDENCE FACTORTM is a value represents the validity of a user's identity.
- the CONFIDENCE FACTORTM can be a base value (e.g., 0 or any suitable value) that can be increased or otherwise altered based on one or more factors, including, for example, time.
- the CONFIDENCE FACTORTM can be increased (e.g., by suitable increments): i.) as a user's identity is consistently and legitimately used over a period of time; ii.) based on the length of time the user has been a member of the identity verification and management system according to exemplary embodiments; iii.) based on the length of time a user preserves a healthy credit report; and/or other like temporal indications.
- Other appropriate factors or variables can be combined with, for example, time to determine the CONFIDENCE FACTORTM. For example, such factors can include the number of instances that a user accesses their on-line identity account, the lack of criminal records, arrests or other criminal activity, and the like.
- the probability of a false identity decreases.
- the CONFIDENCE FACTORTM can be combined with or used separately from the total identification score to indicate the level of verification or reliability of the identity of the user.
- the CONFIDENCE FACTORTM can represent the validity of a user's identity proven over time and which can be based on information provided by an entity other than the user, such as criminal records later discovered and the like, while the total identification score represents a combination of identity scores that may not be dependent upon factors such as time.
- the CONFIDENCE FACTORTM can be added to the total identification score to improve the level of verification or reliability of the identify of the user.
- the CONFIDENCE FACTORTM can be used as part of the evaluation of the total identification score by a third party.
- a high CONFIDENCE FACTORTM can provide the additional identity verification required by the financial institution to authorize the loan. Additionally, if the user has a high total identification score, then a high CONFIDENCE FACTORTM can be used by the financial institution to authorize an increased loan amount or lower interest rate for the loan.
- the identity management system 100 can include a data storage device 120 in communication with, for example, the total identification score assignment module 115 .
- the data storage device 120 can be used to store personal information and/or financial information of the user, although any suitable information associated with the user can be stored in the data storage device 120 .
- the data storage device 120 can be any suitable type of computer memory or other computer storage medium capable of storing information.
- the total identification score of the user can be associated with the personal and/or financial information stored in the data storage device 120 . By creating such an association, the information associated with the total identification score can be accessed and retrieved as part of a transaction, rather than having the user personally supply such information for each and every transaction.
- the identity management system 100 can include an access code generation module 125 in communication with, for example, the total identification score assignment module 115 .
- the access code generation module 125 is configured to generate a unique identity access authorization code associated with the user for use by a third party to access the personal and/or financial information associated with the user.
- the identity management system 100 also can include a data transmission module 130 in communication with, for example, the access code generation module 125 and, through a communication link 133 , to a third party entity.
- the data transmission module 130 is configured to transmit at least the total identification score of the user to the third party upon verification of the identity access authorization code.
- the data transmission module 130 is also configured to receive information from external (i.e., third party) sources via the communication link 133 .
- the user has a total identification score of 70, which was generated as discussed in the previous illustration.
- the user desires to apply for credit, such as a credit card.
- the user can log into or otherwise gain access to the identity management system 100 of the present invention by, for example, logging into (e.g., via login name and password) a website or through a suitable graphical user interface (e.g., graphical user interface 170 ).
- a suitable graphical user interface e.g., graphical user interface 170
- the user can have a unique identity access authorization code generated for the user by the access code generation module 125 .
- the identity access authorization code can be given to a third party by the user to allow the third party to gain access to the user's personal and/or financial information maintained by the identity management system 100 .
- the identity access authorization code can be any suitable code or number that is unique to the user, such as, for example, a random number, an alphanumeric string of characters, the public key of a public key-private key public key infrastructure (PKI) system, or the like.
- the identity access authorization code can be a one-time use code, although the identity access authorization code can be used any number of times.
- the user when applying for the credit card, instead of inputting its personal and financial information into the application form, the user can supply the identity access authorization code to the bank or other financial institution to whom the user is applying for credit.
- the financial institution can gain access to the identity management system 100 to retrieve information associated with the user (e.g., through the graphical user interface 170 or like interface).
- the personal information and/or financial information associated with the user can be transmitted to the third party (e.g., via data transmission module 130 ) upon verification of the identity access authorization code.
- the financial institution can retrieve the total identification score of the user, as well as any personal and/or financial information associated with the user that is needed for the credit application. The retrieved information can then be used by the financial institution to complete or otherwise fill in, for example, the credit card application on behalf of the user. As discussed previously, the financial institution can compare the total identification score of the user to a minimum identification score to determine whether the application process can continue (e.g., when the total identification score is greater than or equal to the minimum identification score) or whether additional sources of identification 110 are required from the user before continuing (e.g., when the total identification score is less than the minimum identification score).
- a user identification code can be generated by the identity management system 100 (e.g., by the access code generation module 125 ) or supplied by the user to the third party entity, along with the identity access authorization code.
- the third party entity can use the user identification code in connection with the identity access authorization code before access and retrieval of the user's information is granted to the third party entity.
- the data transmission module 130 can be configured to transmit at least the total identification score of the user to the third party upon further verification of the user identification code of the user.
- the user identification code can be any suitable number or code that uniquely identifies the user, such as the user's social security number or the like.
- the identity management system 100 can include a log module 135 in communication with, for example, the access code generation module 125 .
- the log module 135 can be configured to record or otherwise store a list of, for example, accesses associated with the total identification score of the user by the third party. However, the log module 135 can be configured to record accesses to any of the personal and/or financial information associated with the user that is stored and maintained by the identity management system 100 .
- the identity management system 100 can also include a report generation module 140 in communication with, for example, the access code generation module 125 .
- the report generation module 140 can be configured to generate, for example, reports for displaying the record of accesses associated with the total identification score and other information associated with the user.
- the record of accesses can be displayed to the user through, for example, a graphical user interface (e.g., graphical user interface 170 ) or other display device or printed in hard copy for review by the user.
- the log module 135 can be used to maintain a record of each use of a user's identification information by a third party.
- the report generation module 140 can then provide an identity report to the user by which the user can view the activities performed by the third parties with respect to the user's identity, in a manner similar to that which a user reviews a credit report to view credit transactions and credit activity.
- an identity card 145 can be issued by the identity management system 100 at the request of the user (e.g., by logging into the identity management system 100 through the graphical user interface 170 and making such a request).
- the identity card 145 can be configured to securely contain identification information associated with the user.
- the total identification score of the user can be encrypted (e.g., using any suitable encryption technique) and stored on the identity card 145 , although any suitable information can be securely contained on the identity card 145 , such as, for example, the personal and/or financial information associated with the user.
- the identity card 145 can act as a key to access information stored remotely.
- the identity card 145 can comprise a smart card (e.g., containing a “smart chip”), a card with a magnetic stripe, or any suitable storage medium on which encrypted information can be stored.
- the identify card 145 can comprise any suitable form of electronic device capable of storing information, such as, for example, a cell phone or other electrical or electronic devices.
- the identity card 145 can include biometric forms of identification, such as, for example, a fingerprint or the like.
- the identify card 145 can comprise a unique identifying feature of a human, such as an individual's sclera, retina or fingerprint that can be used with or without an accompanying card or other identifying device.
- suitable RFID technology can be used.
- the RFID technology can be used instead of the card (e.g., a suitable RFID chip can be implanted within or on a person or a person's belongings) for use with the identity management system 100 .
- a suitable RFID chip or device can reside on the identity card 145 .
- the user can then provide the identity card 145 to a third party, who can decrypt the identification information stored on the card and use that information as part of a transaction (e.g., applying for credit, a purchase transaction, and the like).
- the identification information contained on the identity card 145 can be used by the third party in addition or alternatively to the information that can be retrieved by the third party using the identity access authorization code.
- the identification information contained on the identity card 145 can comprise, for example, the identity access authorization code by which the third party gains access to the information associated with user that is stored and maintained by the identity management system 100 .
- the user can restrict the uses of the identification information securely contained on the identity card 145 .
- the user can restrict the locations of where the identification information is used (e.g., the identification information can only be used in the United States and Canada, but not in Mexico).
- the user can restrict the times of when the identification information is used (e.g., the identification information can only be used between the hours of 9:00 a.m. and 5:00 p.m.).
- the user can restrict the types of transactions for which the identification information can be used (e.g., the identification information can only be used for purchase transactions, but not applications for credit).
- Other types of restrictions of the identification information securely stored on the identity card 145 are possible.
- the third party can decrypt the identification information stored on the identity card 145 .
- the third party can access the identity management system 100 (e.g., through the graphical user interface 170 using the identity access authorization code, through a secure socket connection using an appropriate network protocol and the like) as part of a transaction.
- the identity management system 100 can prohibit or otherwise deny the use of the identification information when the identification information is restricted by the user for the transaction, or allow or otherwise approve the use of the identification information when the identification information is not prohibited by the user.
- the use of the identification information securely contained on the identity card 145 can be approved or denied in a manner similar to that which a bank either approves or denies the use of a credit card for a purchase transaction.
- the identity card 145 can also be used to restrict the uses of accompanying credit cards, checks, affiliated identification cards (as discussed below) and the like forms of payment or identification that can be used in conjunction with the identity card 145 .
- the user can restrict the use of credit cards by specifying where, when and how the credit cards can be used.
- a merchant or other third party can either allow the accompanying credit card to be used when the use falls within the restriction(s) specified in the identification information, or deny the use of the credit card when the use does not.
- the restriction information can be included in the identification information securely contained on the identity card 145 , which is provided to the third party once the identification information is decrypted.
- the identity management system 100 can automatically inform the third party of the restrictions by allowing or rejecting the use of the identity card 145 .
- the identification information can be used by the third party to gain access to the identity management system 100 , at which time the user-specified restriction(s) for the credit card are provided to the third party.
- the third party can access the user-specified restrictions directly from the identity management system 100 using, for example, a unique third party authorization code (e.g., generated by the identity management system 100 ), regardless of the presence of the identity card 145 .
- a third party can independently access the identity management system 100 remotely (e.g., through the Internet, graphical user interface 170 , telephone or automated customer service, through an appropriate secure network connection, or the like) to check for the user's total identification score, other identification information, and for any user-specified restrictions placed on the form of payment (e.g., a credit card, check or the like) proffered by the user, when the user does not provide the third party with an identity card 145 .
- the form of payment e.g., a credit card, check or the like
- the third party can log into the identity management system 100 (e.g., through the graphical user interface 170 , telephone support, secure network connection or the like), enter the third party's unique vendor authorization code, and enter the account number of the form of payment proffered by the user (e.g., credit card number, checking account number, and the like).
- the identity information and any user-specified restrictions can then be provided to the third party by the identity management system 100 .
- the identity theft protection provided by the use of an identity card 145 can be separate from credit protection that can be associated with one or more credit cards.
- a separate identity card 145 and credit card(s) can be used.
- the identity card 145 can be used in conjunction with any suitable form of payment or identification, the identity card 145 can also serve as both a form of payment (e.g., a credit card or the like) and means of identification simultaneously, without the need for separate forms of payment and identification.
- the identity card 145 can serve as the only form of payment and identification that the user need carry.
- credit card information or other payment information can be entered into the identity management system 100 and be accessible by the identity card 145 , along with the identification information of the user (including, for example, any user-specified restrictions associated with the forms of payment).
- the user can enter a personalized PIN number or suitable pass code into a third party's point-of-sale (POS) system that will allow the use of the information associated with the particular credit card or other form of payment for the transaction.
- POS point-of-sale
- Each form of payment can be associated with a unique pass code, or a single pass code can be associated with all forms of payment, allowing the user to associate a particular form of payment with the pass code as desired.
- the user can log into the identity management system 100 (e.g., using the user's unique name and password) and enter information associated with one or more forms of payment, such as, for example, credit card numbers, expiration dates and authorization codes, although information associated with any suitable form of payment (e.g., check cards, checks and the like) can be entered.
- information associated with a credit card such as the following:
- a single identity card 145 can be used to access any or all identification or credit card information.
- a user can carry the identity card 145 instead of many other cards.
- users can store or otherwise associate any credit card information with the identity card 145 using the identity management system 100 .
- the user can access the identity management system 100 via, for example, the Internet or World Wide Web via a suitable graphical user interface (e.g., graphical user interface 170 ) and an appropriate Internet or network connection.
- the merchant or third party can process the charge through conventional credit card network.
- the credit card network is a specialized network that is connected to merchants, credit card companies and banks.
- the user or the merchant swipes a credit card through a credit card reading device.
- the device reads the information from the card and sends it to a first processing site (a “first processor” or “acquirer”) for processing by the merchant.
- first processor a first processing site
- second processor a second processing site
- the bank or other financial institution that receives the charge information is the bank or financial institution that issued the credit card to the user.
- An authorization or denial of the charge based on the user's available credit, will be sent to the merchant or third party via the second and first processors.
- the identity management system 100 can review the authorization transactions processed by the merchants or third parties as part of identity theft prevention.
- the existing merchant authorization process can be modified by placing a third processing site (a “third processor”) between the first and second processors.
- a third processor a third processing site
- the third processor can reside in, for example, the identity management system 100 .
- the third processor can compare the identity information associated with the credit card information to verify the identity of the user to ensure that an actual or potential identity theft is not occurring (e.g., the credit card has not been marked as lost or stolen and the like, as discussed below). For example, if the identity of the user making the credit card charge is not the correct identity associated with the credit card authorization, the third processor can issue an identity denial of the credit card transaction based on the failed identity verification. Otherwise, the third processor can issue an identity authorization for the credit card transaction as a result of the verified identity. After the information has been verified by the third processor, the charge information can be sent to the second processor at the bank for financial authorization or denial of the transaction, for example, based on the user's available credit.
- the first processor receives a request for credit card authorization from the point-of-sale (POS) and passes that request to the issuing bank for verification. The first processor then relays the answer to that request from the issuing bank to the merchant.
- POS point-of-sale
- the first processor then relays the answer to that request from the issuing bank to the merchant.
- POS point-of-sale
- the merchant When a merchant wants to establish a connection with a network, the merchant establishes the connection through a gateway.
- the first processor receives the merchant request for credit card authorization and sends it to the network. From the network, the request finds its way to the issuing bank's database for authorization. Some banks act as their own processor and receive and answer any requests. However, many banks register with a second processor, such as Élan Financial Services or the like.
- the second processor has access to the issuing bank's information and can issue authorization. Once the second processor accesses the bank data, it can relay an answer back through the network to the first processor and ultimately
- the third processor can act like the second processor, and, in a manner, replace the second processor.
- the identity management system 100 can issue a global or universal credit card (such as the identity card 145 or a separate credit card), as discussed below.
- the global credit card can be used in several different ways.
- the global credit card can be used to store other credit cards.
- an authorization request can be sent from the merchant through a gateway to the merchant's chosen processor. From the first processor the request can be sent to the network and finally to the identity management system 100 .
- the identity management system 100 can make a connection to the issuing bank and check the user's account for availability of funds.
- the transaction can be performed using an “On-Us” approach to avoid network charges, as discussed below. If funds are available, an authorization message can be sent to the merchant. If funds are not available, a authorization declined messages can be sent instead. If an authorization is provided to the merchant, a settlement can be requested to transfer the funds to, for example, the identity management system 100 as soon as possible. In such a transactional system, the user would have zero credit balance in the identity management system 100 . All balances would be provided by the issuing bank. The identity management system 100 would then be used for management of the transaction.
- the global credit card can be used to store other credit cards and can be used as a credit card itself: If used as a credit card itself, the user can use their global credit card without using an associated PIN.
- the authorization request can be sent from the merchant through a gateway to the merchant's chosen processor. From the first processor, the request can be sent to the network and finally to the identity management system 100 . The transaction can be recorded, and, if the user has sufficient funds in their account, an authorization message can be sent to the merchant. Otherwise an authorization declined message can be sent. Users can use the identity management system 100 to assign each transaction to a bank or credit card of choice. At regular intervals, the identity management system 100 can collect requests and send user's requested transactions to the issuing banks.
- the user's account can be credited and money can be collected from the issuing bank. If sufficient funds are not available, the user's account will not be credited, which will be reflected in the user's account. If the user does not assign the transaction to any of the other banks, the user's account with the identity management system 100 will be affected. In such case, the identity management system 100 can act as a credit card company.
- exemplary embodiments of the present invention can reduce/avoid any extra costs incurred by introducing the identity card 145 into the credit card system.
- exemplary embodiments can use an “On-Us” approach.
- the entity creating the extra charges can partner with banks or other financial institutions to eliminate those extra charges.
- such an approach can eliminate the need for a third processor, as the second processor can be used to perform both the identity authorization and the financial (credit card) authorization.
- negotiations can take place with banks or other financial institutions to lower or eliminate such charges.
- such negotiations can take many shapes and forms, with various incentives, give-backs and concessions made between the parties to reduce or eliminate such charges.
- a third processor would still be used.
- FIG. 16 is a diagram illustrating a commerce platform for the identity management system 100 , in accordance with an exemplary embodiment of the present invention.
- a user 1610 can register with the identity management system 100 (also referred to as a “Global Identity (GID) processor”) (see flow 1650 ).
- the identity management system 100 also referred to as a “Global Identity (GID) processor”
- GID Global Identity
- the bank of the user 1610 is a participating entity 1615 of the commerce platform network 1600
- the user 1610 can be automatically registered by opening, for example, a credit card or the like with the bank and having the bank issue the credit card to the user 1610 .
- the credit card can be, for example, an identity card 145 or the like associated with the identity management system 100 , and can have a suitable PIN number associated with the card to identify the card as an identity card 145 .
- the user 1610 can associate one or more credit cards with an identity card 145 , with each credit card assigned a unique PIN number so that the user 1610 can choose which credit card(s) to use at the time of the transaction.
- the PIN number can be used to identify the card as an identity card 145 and to select the credit card to use for the transaction, while the credit card numbers can be used to identify the correct issuing bank.
- the user 1610 When the user 1610 participates in a transaction at the store 1605 , the user 1610 can enter the PIN or other identifier associated with the identity card 145 .
- the transaction information including, for example, credit card and PIN numbers, can be passed to the identity management system 100 (see flow 1650 ).
- the identity management system 100 can query a suitable database to look up or otherwise retrieve the credit card and PIN number combination (see flow 1655 ). Such information can allow the identity management system 100 to determine the particular bank (e.g., participating entity 1615 ) that issued the credit card. Once such a determination is made, the identity management system 100 can query or otherwise access the account information for the user 1605 from the proper participating entity 1615 (e.g., for no fee since it is a participating entity).
- the transaction information can then be routed to the proper participating entity 1615 from the identity management system 100 to complete the transaction (e.g., an “OnUs” transaction based on the PIN numbers—see flow 1660 ).
- the completed and authorized transaction information can then be passed from the participating entity 1615 through the identity management system 100 using the corresponding network 1625 (e.g., the credit card network or the like) to the store 1605 to finish the transaction.
- the identity management system 100 can perform any suitable type of transaction exchange with participating entities 1615 , such as, for example, ACH-based transactions to transfer money (see flow 1665 ) to settle charges made by the user 1605 or the like.
- non-participating entities 1630 entities that do not participate in the commerce platform according to exemplary embodiments can still use the commerce platform network 1600 to perform transactions.
- the transaction information received by the identity management system 100 from the user 1610 at the initiation of a transaction can be forwarded by the identity management system 100 to the appropriate non-participating entity 1630 , for example, based on the credit card number.
- the identity management system 100 may not be able to access the account information of the user 1610 from the non-participating entity 1630 , the identity management system 100 can still perform appropriate transaction routing functions to route the transaction information to the non-participating entity 1620 via the network 1635 (e.g., a credit card network or the like).
- the identity management system 100 can perform suitable transaction exchanges with the non-participating entities 1630 .
- the identity management system 100 can perform ACH-based transactions or other electronic funds transfer to transfer money to, for example, settle charges made by the user 1605 and other like transactions.
- the user 1605 can have their account debited or otherwise charged by either direct access to bank account of the user (e.g., via a participating entity 1615 ) or by having the identity management system 100 use electronic funds transfer systems, such as an ACH-based transaction system, to interact with non-participating entities 1630 to settle such transactions.
- the user 1610 can participate in a transaction at the store 1605 by entering the PIN number along with the credit card information (e.g., by swiping the card at an appropriate purchase terminal). By using the PIN number, the user 1605 can choose the credit card(s) to which the transaction is to be assigned at the time the transaction is being made. However, according to an alternative exemplary embodiment, the user 1610 can simply enter the credit card information, thereby not assigning the transaction to any particular credit card at the time of the transaction. In such a scenario, the identity management system 100 can hold the transaction, while still authorizing the charge.
- the user 1605 can then log into or otherwise access their account on the identity management system 100 (e.g., through a suitable graphical user interface over, for example, the Internet or World Wide Web) (see flow 1670 ).
- the user 1605 can then use the identity management system 100 to assign the transaction(s) to one or more accounts (e.g., credit card accounts or the like) in block 1640 .
- the identity management system 100 can then perform suitable interactions with either or both of the participating and non-participating entities 1615 and 1630 to settle the transaction (e.g., through proper money transfers, charge reconciliations or the like).
- the identity management system 100 can act as a credit card company.
- the identity management system 100 can perform steps, such as: checking the identity card 145 to ensure that it is valid and not marked as compromised (e.g., lost) by the owner; checking to ensure that the identity card 145 has not been restricted based on the location, type or any other restrictions imposed by the user; verifying that the person meets the minimum identity score requirement of the merchant; checking for any additional restrictions and other like steps.
- the identity management system 100 can automatically send the credit card information (including the financial transaction information, such as amount of purchase and the like) to the appropriate credit card processing company.
- the credit card processing company performs the account processing in the conventional manner and returns an answer (e.g., financial transaction is accepted or denied). The answer can be relayed from the identity management system 100 , either directly or indirectly, to the merchant, thus completing the financial transaction.
- a form of payment can have more than one pass code associated with it.
- each pass code can impose certain restrictions on a transaction.
- a parent can enter the form of payment information under the identity account of their child. Using one pass code, the parent can restrict the transaction to a certain dollar amount. However, using another, different, pass code, the parent can increase this spending limit.
- the child can enter a store and decide to make one or more purchases. During the checkout, the child can use a first pass code to make a purchase which limits the expenditure to only non-alcoholic items under a total of $100.00. However, if the child is stranded and is required to make an emergency transaction that may exceed the $100.00 limit, the child can be provided with an additional emergency pass code, different than the first pass code, that does not impose any limitation on the expenditure.
- the account number of a form of payment (e.g., a credit card number) stored or otherwise located on the identity card 145 can be designated as a default form of payment with certain restrictions.
- the default form of payment can be automatically selected from the identity card 145 for the purchase transaction.
- the user can designate an AMERICAN EXPRESSTM card to be the default form of payment.
- the default form of payment can also be subject to certain rules, with the rules being the set of restrictions and requirements that the user imposes on the use of the form of payment.
- the rules for the default form of payment can include, for example, the maximum amount that can be charged for this form of payment, the venues in which the form of payment can be used, the geographical areas in which the form of payment can be used, or any other suitable rule.
- multiple different default forms of payment can be associated with the identity card 145 , with each default form of payment being used for different purposes.
- the default form of payment can be the aforementioned AMERICAN EXPRESSTM card.
- a Visa card can be default form of payment.
- the rules for the default form of payment associated with an identity card 145 can be establish to use any suitable number of forms of payment (credit cards, debit cards, checks, and the like) for any types of purchases or transactions.
- multiple pass codes can be entered, so that the purchase or other financial transaction can be divided or otherwise split based on the rules associated with each of the multiple forms of payment stored along with a user's identity profile. For example, if a first credit card has a pass code of 12345 and second credit card has a pass code of 98765, entering a code of 1234598765 would cause the purchase transaction to be performed based on the rules imposed on both credit cards associated with these respective pass codes (e.g., a union or other accumulation of the respective rule sets). Consequently, for purposes of illustration and not limitation, a $5000 transaction can be divided between the credit card assigned to pass code 12345 and credit card assigned to pass code 98765.
- the purchase transaction split can be specified in the pass code that is entered by the user. For example, a $5000 transaction can be split by assigning $1000 for the pass code 12345 and $4000 for the pass code 98765. The resulting pass code can be entered as, for example, 123451000987654000 or the like.
- the identity information associated with the identity card 145 can instead be integrated with any other suitable form of payment and/or identification issued by another institution.
- a credit card issued by a financial institution can be configured to include a user's identity number either on the credit card or associated with the credit card number (e.g., in the financial institution's database), thereby allowing an integration with the identity information available from the identity management system 100 .
- a user can use a form of payment, such as a credit card, and still have the form of payment checked for all of the restrictions imposed by the user through the identity management system 100 on the particular form of payment.
- a user applies for a Visa credit card.
- the issuing bank can associate the user's identity information with the credit card being issued.
- the user can then impose restrictions on the use of the credit card account through the identity management system 100 (e.g., the credit card cannot be used outside of the United States).
- the credit card company can check with the identity management system 100 to determine whether there are any restrictions imposed on the purchase transaction for the given credit card. For example, if the credit card cannot be used outside of the United Sates, then an attempt to make a purchase in Taiwan would be rejected.
- Such integration is not limited to credit cards or other similar forms of payment, but can also be used in association with suitable forms of identification, such as, for example, a social security card.
- the social security card can be configured to contain or be associated with the identity information of the user, so that the use of social security card number can also be restricted through the identity management system 100 .
- a user can provide its social security card to a prospective employer without fear of the social security number being stolen or used for fraudulent purposes.
- the social security number can be used for any purpose, such as, for example, reporting a 1099 Form to the Internal Revenue Service (IRS)
- the IRS can first check with the identity management system 100 to verify that the user has allowed the use of the social security number by the given employer, thereby ensuring that the employer is not making fraudulent claims.
- the identity management system 100 can be configured to store the routing number and the bank account number for checks. A user can then assign a rule for use of the check information, and one or more pass codes can be issued to allow use of and access to this check information. For example, during a purchase transaction, a user can enter identification information (e.g., via the identity card 145 ) and the (check) pass code into the merchant's POS system. The identity management system 100 can determine if the purchase transaction satisfies the rule(s) that apply to the use of the check information.
- a new (i.e., the next) check number can be issued and the check can be verified against the bank account (e.g., to determine if there are sufficient funds).
- the merchant can receive a verification code or other unique number that can be used for an electronic deposit or electronic funds transfer from the bank account of the user to the bank account of the merchant.
- a verification code or other unique number can be used for an electronic deposit or electronic funds transfer from the bank account of the user to the bank account of the merchant.
- Other forms of payment can be maintained by and used in accordance with exemplary embodiments of the present invention.
- the same process that is used for identifying a user in the United States can be adapted for identifying a user in a foreign country, such as, for example, Germany, using identification documents native to that country (e.g., German identification documents).
- identification documents native to that country e.g., German identification documents
- a European Union identification card can be used instead of a social security card for purposes a creating a German user's total identification score.
- the meaning of the total identification score and/or the meaning of the CONFIDENCE FACTORTM does not change for different geographical regions. For example, when a total identification score of 70 is assigned to a user in the United States, if the same total identification score is assigned to a user in Germany, these two users are considered to be completely equal in their level of identity.
- the identity card 145 can be used as a type of “global identification card.” As such, a foreign user traveling in the United States and having a total identification score of 70 can be treated equally to a United States citizen with a similar total identification score, regardless of the nationality of the foreign user. For example, providing the user's identity card 145 along with a check as a form of payment can ensure that the transaction is treated equally, regardless of where the user originates from and from which country the check is issued. Since the level of identity of a user can be uniformly ascertainable throughout the world according to exemplary embodiments, any transaction can be performed anywhere as safely as if it were performed in the user's native country.
- the identity card 145 can be associated with any form of identification or financial information
- the usage of the identity card 145 anywhere in the world can be tracked for the user and logged for immediate or later access through the identity management system 100 . Consequently, the user can track the usage of the identity card 145 in different geographical locations, thereby providing the user with a global record of not only the use of the user's identity and identification information, but also the user's financial information. Other characteristics or behavior of the user can be tracked in such a manner.
- the identity card 145 is used for purposes of travel (e.g., as the identity card 145 is swiped or otherwise recorded at identity checkpoints, such as airports or other like points of embarkation and disembarkation), a record of the user's travel can be maintained.
- identity checkpoints such as airports or other like points of embarkation and disembarkation
- a record of the user's travel can be maintained.
- a user's travel both nationally and internationally, can be monitored and logged, thereby allowing the user to track travel with the identity card 145 in different geographical locations. Other such characteristics or behavior can be tracked using the identity card 145 .
- the identity management system 100 can be based on a distributed model that allows users to maintain and host their identity and related information according to a Global Identification Number (GIN).
- the GIN can be any suitable form of alpha-numeric or other identifier that is capable of uniquely identifying a user.
- the distributed model can be implemented through a service called, for example, Global Identity Services (GIS), as discussed below.
- GIS Global Identity Services
- the GIS can allow both authoritative and non-authoritative hosting of data and perform information routing based on the GIN.
- an “authoritative organization” is an entity or other user whose purpose is to securely maintain identity and identity-related data and information that is globally accessible by other entities.
- the data and information maintained by the authoritative organizations is trusted by other users and is accepted by any user that “joins” or otherwise uses the identity management system 100 .
- Each of the authoritative organizations would be required to obtain an organizational GIN (OGIN).
- a “non-authoritative organization” is any other entity or user that chooses to provide limited or no access to identity and identity-related data and information, for example, to maintain the privacy or confidentiality of the data.
- Such non-authoritative organizations do have the ability to obtain data from (authoritative) partners through the GIS. However, the non-authoritative organizations would not be required to obtain an organizational GIN, unless they choose to share their identity and identity-related data and information with another organization.
- a primary function of the GIS is to provide a routing mechanism for data stored in various locations.
- FIG. 7 is a diagram illustrating information routing for GIS, in accordance with an exemplary embodiment of the present invention.
- an entity requests services (e.g., retrieval of identity information or the like) associated with the identity management system 100
- the request is first routed to the Local GIS (LGIS) server 705 . If no LGIS server exists, the request is directly sent to the Primary GIS (PGIS) server(s) 710 . Otherwise, if an LGIS server 705 exists, and this server can satisfy the request (e.g., the identity information resides on that LGIS server 705 ), the request is immediately fulfilled.
- LGIS Local GIS
- PGIS Primary GIS
- the request is forwarded to one of the PGIS servers 710 .
- the PGIS server 710 processing the request finds the Authoritative GIS (AGIS) server 715 associated with the request and sends the request to that server.
- AGIS Authoritative GIS
- the AGIS server 715 satisfies the request by, for example, retrieving and returning the requested information to the requesting entity. If the information is not located at the specified AGIS server 715 , an error or other like indication can be returned to the requesting entity (e.g., to indicate that the identity information cannot be located or otherwise retrieved).
- the LGIS server(s) 705 , PGIS servers 710 and AGIS servers 715 can communicate with each other any suitable type of network or computer connection.
- the identity management system 100 can conform to and is compatible with the Federation model.
- a Federation is an association of organizations that come together to exchange information as appropriate regarding their users and resources to enable collaboration and transactions.
- members of a Federation can easily integrate and use all or parts of the identity management system 100 (or corresponding commerce platform or e-commerce platform) that can enable them to use the services offered by such platforms.
- FIG. 8 is a diagram illustrating the identity management system 100 distributed platform model, in accordance with an exemplary embodiment of the present invention.
- a bank 805 is a participating bank that can be responsible for holding the identification information of a member 810 .
- the member 810 is an individual or entity who desires to have their identity protected.
- An identity specialist 815 is, for example, a bank agent or the like specially trained to assist the members 810 in creating their global identification account.
- a local institution global identity (GID) system 820 can include a licensed GID appliance and platform which the banks 805 can use to store identity information of members 810 .
- the GID appliance can be connected to a GID main processing and routing system 830 so that it can be located by other local GID systems 820 .
- a local main processor and routing system 825 is the main routing system that can control the local institution GID systems 820 .
- the main GID system 830 is the global center for all connections between the local institution GID systems 820 and the banks 805 .
- the users 835 are institutions or the like that can request access to information associated with a member 810 through the network.
- FIG. 9 is a diagram illustrating an exemplary architecture for the identity management system 100 platform, in accordance with an exemplary embodiment of the present invention.
- the client can visit the bank 805 and meets with a bank agent, such as an identity specialist 815 , who can assist the client in creating their identity account (and credit card account) to become a member 810 .
- a bank agent such as an identity specialist 815
- the member 815 can then use the identity management system 100 to manage their identity account (and/or credit account).
- the member 815 then can use the identity card 145 to provide access to the users 835 or other institutions to information stored in that account.
- the information can be accessed in one of several ways.
- the member 810 can visit a participating merchant. If the member 810 wishes to open an account with the merchant, instead of writing all of the information on the account application, the member 810 can swipe their identity card 145 and enter the corresponding PIN assigned to the identity card 145 .
- the merchant can send the information provided by the identity card 145 and PIN to the network, which can be routed to the GID main processor (e.g., GID main system 830 ).
- the GID main processor can use the account information to retrieve and decrypt the relevant identity information and encrypt it with the participating merchant's key.
- the encrypted identity information can be communicated from the GID main processor to GID transactional processing (e.g., local main processor and routing system 820 ) for the participating merchant.
- the participating merchant can then use its log-in or other unique identifier to access the identity information to complete the account application.
- the member 810 can use an automated voice response (VRU) system 905 , a live customer service center or the like to authorize the transfer of identity information.
- VRU automated voice response
- the merchant can also access the voice response system or customer service center to obtain the identity information (with the authorization of the member 810 ), in case the identity management system 100 is not available through the direct connection.
- a secured databank and system can be created by which the identity of individuals or businesses can be managed and accessed.
- Initial access by the user to the system can be through a bank or other trusted local organization or entity.
- an identity theft specialist at the bank can receive users who want to subscribe to this system.
- the identity theft specialist can first educate the customer on the identity management system 100 .
- the identity theft specialist can ask the user for identification papers, such as a social security card, birth certificate, driver's license, proof of residency (passport, Green Card), proof of domicile, or the like.
- the identity theft specialist can login to the identity management system 100 (e.g., through graphical user interface 170 ) to create a unique user number.
- the user can create a PIN. Selection of the PIN can be done by the user without any access by the identity theft specialist. The user must memorize the PIN. For example, if the PIN is lost or forgotten, the user must return to, for example, the bank to have the PIN reset.
- the identity management system 100 can then create an identity account for that user.
- the user can also create, for example, a Global Credit Card account or the like, as discussed previously, to allow identity management on a global basis. The user will, for example, have an audit trail of all or substantially all of the transactions that occur on the Global Credit Card account and the associated stored cards. Coupled with the alert system, the user can track any transaction charged to their account.
- a separate card with a credit card number can be issued to the user.
- the user can program, for example, all of the user's credit card accounts onto this card through access to the identity management system 100 (e.g., via graphical user interface 170 ).
- the user can additionally limit the use of each credit card (or other cards) by placing limits or other restrictions on each card, as discussed previously.
- An identity card 145 holding the unique user number can be mailed to that user's address (or to the bank, if user wishes).
- the user can then have access to the user's identity and credit card accounts maintained by the identity management system 100 . Initially, when the user logs in to their account, the user can use the card number for a login name and the PIN for a password. However, once access to the user's identity account in the identity management system 100 has been obtained, the user can change their login name password to any unique login name and password.
- the user can have many options. For example, the user can receive alerts, for example, regarding their identity use or improper uses thereof.
- the user can receive requests for identity authorizations, such as, for example, requests for the use of the user's identity.
- the identity account can also allow the user to monitor identity account activity, monitor credit card activity, make and/or receive credit card payments, and any other identity- and financially-related transactions, such as, for example, prepaid cards, gift cards, debit cards, ATM cards and the like.
- the identity management system 100 can also allow the user to input credit card information. For each credit card number, the user can choose a unique PIN, with the PIN for each credit card being different from the PIN used for identity access purposes.
- the user need only carry a Global Identity Credit Card (e.g., identity card 145 ) instead of several different cards, such as, for example, credit cards, debit cards, gift cards, ATM cards and the like.
- a Global Identity Credit Card e.g., identity card 145
- the Global Identity Credit Card can be used along with the PIN associated with one stored credit card to make transactions with the given credit card transaction.
- the user can user one or more credit cards for the transaction, based on the sequence of PIN numbers entered.
- the vendor will not have access to the actual credit card number.
- the identity system management 100 can also support ACH/EFT (Automatic Clearing House/Electronic Funds Transfer).
- An alert system can be associated with the use of the Global Identity Credit Card and the associated stored cards. For example, when a purchase takes place, an alert can be sent to the user's alert receiving device (e.g., mobile phone, PDA, e-mail or the like) about the occurrence of a transaction. Such an alert can further include suitable accompanying information, such as, for example, amounts, merchant identification, location and other like information.
- the user when applying for a mobile phone plan, can use the Global Identity Credit Card number.
- the user can authorize the identity management system 100 to reveal required identity and financial information to the business, for example, once or for a limited time.
- authorized persons at the business or stationed at the headquarter of the mobile phone company can have viewing privileges for the identity and financial information, but their access is recorded.
- the identity management system 100 can also provide credit status to a requesting party as well.
- the identity management system 100 can establish a network or computer connection to a credit reporting agency to retrieve a user's credit report. Each time a credit report is retrieved from the credit reporting agency, the corresponding credit history, credit score and the access can be recorded for the user to review.
- credit card transactions can go through the identity management system 100 . Consequently, limits on the credit card(s) can be applied and each transaction can be recorded, thereby ensuring the identity and financial safety of each transaction.
- a default system can be available. For example, when no PIN is entered, a specified default credit card can be charged.
- restrictions such as, for example, amount, geographic or vendor type, can be placed on the default credit card. For example, the default credit card without a PIN could only be used in, for example, restaurants.
- a CONFIDENCE FACTORTM can also be assigned to each user. For example, the longer the user remains with the identity management system 100 , and based on the authenticity of the documents the user presented to the identity theft specialist at the bank, the user's CONFIDENCE FACTORTM can be increased. As noted previously, the CONFIDENCE FACTORTM can be used as an additional or alternative measure of the validity of a user's identity.
- a one-time use PIN can be generated for a credit card maintained in the identity management system 100 , thereby not comprising the original PIN.
- the one-time use PIN can be retrieved from identity management system 100 during the online transaction (e.g., at time of payment).
- a PIN can be generated periodically (e.g., at predetermined intervals) for a user and sent to, for example, the mobile phone, PDA, pager, e-mail address or the like of the user. The user then does not need to access the identity management system 100 each time a one-time use PIN is required.
- the identity management system 100 can also functions as a fund transfer system for, for example, on line auctions or other transactions. For example, buyers and sellers can communicate through the identity management system 100 and transfer funds by credit card or check, because the identity of each user is established and verified in the identity management system 100 . If users provide or otherwise authorize distribution of their CONFIDENCE FACTORTM to other users, the CONFIDENCE FACTORTM can also assist in the decision making of each party.
- any or all information maintained or otherwise stored in, for example, databases in the identity management system 100 can be encrypted using any suitable encryption technique.
- information and data stored in the identity management system 100 databases can be stored using a double encryption system.
- a double encryption system operates in a manner similar to a safety deposit box, where the owner of the box has one key and the bank has another and both keys are required for the information to be unlocked.
- the identity information stored in the identity management system 100 database can be encrypted by a first key that the identity management system 100 maintains, and also by a second key that the user maintains. Both encryption keys would be needed before the identity information can be decrypted and viewed. Such encryption can ensure that the data stored will be secure from hackers and other malicious attacks. Such encryption techniques can further ensure that even if the information or data was hacked, such information could not be decrypted without the presence of both the identity management system 100 key and the user's key. Additionally, the key maintained by the identity management system 100 can also change per record or otherwise periodically to ensure further security.
- the identity management system 100 can also be used for e-commerce transactions or other purchase transactions.
- the identity management system 100 can include a transaction order generation module 150 in communication with, for example, the total identification score generation module 115 .
- the transaction order generation module 150 can be configured to generate a transaction or purchase order using the total identification score of the user. For example, before making a purchase, either online or in person, the user can generate a transaction order using the transaction order generation module 150 (e.g., by logging into the identity management system 100 and making such a request). When making a purchase, instead of using its credit card and personal information, the user can submit the transaction order to perform the transaction. The merchant or other third party can then use the transaction order to gain access to the total identification score, financial information (e.g., credit card number) and personal information (e.g., billing address of the user) to complete the transaction in the manner discussed previously on behalf of the user.
- financial information e.g., credit card number
- personal information e.g., billing address of the user
- the transaction order can contain an identity access authorization code by which the third party can gain access to the identity management system 100 to retrieve the relevant information.
- the user can specify different types of restrictions on the use of the user's information maintained by the identity management system 100 .
- the user when generating the transaction order, the user can specify, for example, that the transaction order can only be used by a certain third party to perform a certain type of transaction. The third party would then only be able to access the information to which the third party has been restricted.
- the information retrieved by the third party is maintained by the third party temporarily to conduct the transaction, but then discarded after the transaction is complete.
- temporal restrictions can be placed on the information retrieved by the third party using the transaction order, thus limiting the amount of time by which the third party can successfully access and use the user's information.
- the third party can be restricted to receive only the funds authorized for the transaction.
- the identity management system 100 can be used to conduct the actual transaction on behalf of the third party.
- the website can send the information to the identity management system 100 .
- the identity management system 100 can then verify the payment information associated with the identity card 145 and pass code, including all of the rules specified for the use of the particular form of payment (other types of verification can also be performed, such as verifying that sufficient funds are available for the form of payment).
- the manager or other proprietor of the website can receive an authorization number that can be used to receive the payment from the identity management system 100 (e.g., through an electronic funds transfer or the like).
- FIGS. 10A and 10B are flow diagrams illustrating a transaction 1000 using an automated pre-authorization process for the identity management system 100 without using a one-time card number, in accordance with an exemplary embodiment of the present invention.
- the transaction 1000 can involve a vendor 1002 , a cart 1004 , a client 1006 , an API 1008 and the identity management system 1010 .
- the vendor 1002 may or may not sign up with the GID network.
- the vendor 1002 can download the GID e-commerce API.
- the vendor 1002 can integrate the GID e-commerce API into the e-commerce website of the vendor 1002 .
- the client 1006 can register for a GID card (e.g., identity card 145 ).
- the client 1006 can store their other cards in association with their GID card using the identity management system 100 .
- step 1022 the client 1006 navigates a suitable web browser to a website of the vendor 1002 to make a purchase (these examples are also applicable to, for example, at POS self-checkout counters).
- step 1024 the client can make any and all required purchases and then prepare for checkout.
- the client 1006 can enter the number of its identity card 145 , name, billing address, and other like information.
- step 1028 the vendor 1002 can recognize the entered number as an identity card 145 number that belongs to the identity management system 100 , and the cart 1004 of the vendor 1002 can pass the cart information to the API 1008 .
- the API 1008 can return a unique URL to the vendor 1002 .
- the cart 1004 of the vendor 1002 can present a link or button to the client 1006 called, for example, “Pre-Authorize Order.”
- the client 1006 can click on the “Pre-Authorize Order” link to pre-approve the on-line transaction and access his/her stored credit cards maintained on the identity management system 100 (e.g., where the user has stored his/her credit cards with restrictions applied to them, and the like).
- the client 1006 can securely log onto the identity management system 100 .
- the secured login process can include, for example, User ID, pre assigned security questions, encryption keys, pre-assigned pictures, passwords and the like.
- the transaction information can be retrieved by the identity management system 100 and verified from the presented link.
- the pre-authorization can be presented to the client 1006 .
- the client 1006 can choose to assign the transaction to the identity card 145 or another credit card registered with the system.
- the client 1006 can submit the pre-approval by clicking on, for example, an “Approve” link or button.
- the identity management system 1046 can store the pre-authorization information in the system.
- the client 1006 can exit the identity management site and return to the cart 1004 .
- the client 1006 can complete the purchase through the vendor 1006 site by clicking on a, for example, “Submit Order” button or the like.
- the transaction request can be transferred from the cart 1004 through the network to the identity management system 100 (which supports the transaction).
- the identity management system 100 can receive the transaction.
- the transaction can be matched against the pre-authorization transaction. From the decision step 1058 , if the transferred transaction matches the pre-approved transaction (including any the limitations and filtrations such as time, geography, and the like), the transaction can be approved in step 1060 and the results can be sent back to the vendor 1002 . Otherwise, in step 1062 , the order or transaction can be rejected and the client 1006 can be given an opportunity to repeat the process.
- FIGS. 11A and 11B are flow diagrams illustrating a transaction 1100 using an automated pre-authorization process for the identity management system 100 using a one-time card number, in accordance with an exemplary embodiment of the present invention.
- the flow of the transaction 1100 can follow the steps 1012 - 1044 of FIGS. 10A and 10B .
- the identity management system 100 can generate a one-time use credit card number or the like.
- the client 1006 can choose which card to charge the transaction to, and the client 1006 can also select to have a one-time temporary credit card number to be generated.
- the identity management system 100 can then generate a one-time use, temporary credit card number (including, for example, expiration and CVV numbers) or other suitable payment information for the client 1006 .
- the flow of transaction 1100 can continue with steps 1046 and 1048 as discussed previously with respect to FIG. 10B .
- the client 1006 can copy or otherwise enter the generated one-time use credit card number in the credit card number field of the vendor 1006 site (or it can be entered automatically by the system).
- the transaction 1100 can then be completed in steps 1052 - 1062 in the manner discussed previously with respect to FIG. 10B . Once the transaction 1100 is completed, the one-time use credit card number becomes invalid and no longer usable in future transactions.
- POS Point-of-Sale
- the user can receive a request in the form of, for example, a call on his/her mobile phone (PDA, or any other electronic device) from the identity management system 100 .
- the request can provide the user with a choice of approving or not approving the transaction. For example, in the case of the request going through a mobile phone, the user can enter “1” for approving transaction and “2” for declining transaction.
- the transaction request can then transferred through the network to the identity management system 100 . If the transferred transaction matches the pre-approved transaction (including any limitations and filtrations such as time, geography, and the like), the transaction can be approved and the results can be sent back to the merchant.
- the pre-approved transaction including any limitations and filtrations such as time, geography, and the like
- the identity management system 100 can be used as a commerce or e-commerce platform that can provide users and/or merchants per transaction insurance coverage.
- FIG. 14 is a diagram illustrating insurance coverage using the identity management system 100 , in accordance with an exemplary embodiment of the present invention.
- the per transaction insurance coverage can include a suitable insurance underwriter 1405 , the identity management system 100 , a vendor 1410 and a consumer 1415 .
- the identity management system 100 in conjunction with the insurance underwriter 1405 can underwrite the per transaction activity.
- a per transaction insurance coverage can be calculated in many different ways.
- the coverage and rates can be based on the number of transactions the consumer 1415 makes, the number of transactions a vendor 1410 receives, the dollar amount of the transaction, the fraud risk associated with the purchased item, the fraud risk associated with the consumer 1415 habits, and other like information.
- the purpose of the insurance can be for, for example, identity theft fraud, credit card fraud, damaged merchandise, or the like.
- the identity management system 100 can be underwritten by an insurance company to provide per transaction insurance to consumers 1415 and/or vendors 1410 . If the consumer 1415 uses the identity card 145 for identity verification and/or for another transaction at or with the vendor 1410 , the given transaction can be insured by the identity management system 100 . For being insured, a suitable fee can be charged to every transaction. Such a fee can be paid by the vendor 1410 and/or the consumer 1415 . Alternatively, neither party pays such a fee and the cost can be offset by other income, charges, fees, or the like.
- the consumer 1415 can purchase an item (e.g., on-line or POS) from the vendor 1425 .
- the vendor 1410 can submit the transaction to the identity management system 100 .
- the identity management system 100 can authorize and/or insure the transaction, based suitable criteria.
- the vendor 1410 can receive the response to the transaction submission, along with, for example, an authorization number.
- the consumer 1415 can be provided with a receipt (e.g., a paper receipt or electronic notification).
- a deposit can be made to the insurance underwriter 1405 for the transaction.
- a fraud can be declared in step 1470 .
- the consumer 1415 , the vendor 1410 or the identity management system 100 can determine that a fraud has occurred (e.g., an unauthorized charge made on a credit card) in any suitable manner. If a fraud has occurred, then the identity management system 100 can be appropriately notified in step 1475 .
- the identity management system 100 can reimburse the vendor against any, all or none of the back charges in step 1460 .
- the identity management system 100 can suitably cover any, all or none of the costs associated with the theft or fraud associated with the consumer 1415 .
- FIG. 15 is a diagram illustrating on-line gambling transactions with the identity management system 100 , in accordance with an exemplary embodiment of the present invention. As illustrated in FIG.
- a consumer 1505 attempts to use a non-GID credit card (e.g., a credit card not associated with the identity management system 100 ) for an on-line gambling company 1510 (see flow 1525 )
- the MCC of the on-line gambling company 1510 would be passed to the credit card issuing entity 1515 (see flow 1530 ).
- the credit card issuing company 1515 can deny the transaction, because the MCC of the on-line gambling company 1510 is blocked (see flow 1535 ).
- the MCC of the identity management system 100 can be used instead of that of the vendors. Therefore, consumers 1505 can use their credit cards without unwanted restrictions. For example, assume that the consumer 1505 visits an on-line merchant (e.g., on-line gambling company 1510 ) whose MCC is blocked by the consumer 1505 credit card issuing entity 1515 . If the consumer 1505 uses their Global Identity Credit Card (e.g., identity card 145 ) (see flow 1540 ) to, for example, subscribe to an on-line gambling site, the MCC that will be presented to the credit card issuing entity 1515 will be the MCC of the identity management system 100 .
- an on-line merchant e.g., on-line gambling company 1510
- identity card 145 e.g., identity card 145
- the on-line gambling company 1510 can communicate the transaction information with the identity management system 100 (see flow 1545 ).
- the identity management system 100 can then pass the transaction information and the MCC of the identity management system 100 to the credit card issuing entity 1515 (see flow 1550 ).
- Approval for the transaction can then be passed back from the credit card issuing entity 1515 to the identity management system 100 (see flow 1555 ), and from the identity management system 100 to the on-line gambling company 1510 (see flow 1545 ) to complete the transaction.
- the MCC of the identity management system 100 would not be blocked, the transaction can occur and be processed.
- the identity management system 100 the user can enjoy a high level of security. Because users can manage, control and set restrictions on their stored accounts, the users can substantially reduce the incidence of credit card and/or identity fraud.
- FIGS. 12A and 12B are flow diagrams illustrating a transaction 1200 using an automated pre-authorization process for the identity management system 100 without registration and without using a one-time card number, in accordance with an exemplary embodiment of the present invention.
- vendors 1002 can download and integrate the appropriate e-commerce APIs into their commerce websites, as discussed with respect steps 1012 - 1016 of FIGS. 10A and 11A .
- a credit card issuing entity 1210 can become a member of the identity management system 100 .
- the credit card issuing entity 1210 can integrate the identity management system 100 into their systems.
- client 1006 of the member credit card issuing entity 1210 shops on-line.
- the transaction can continue in the manner discussed in steps 1022 - 1034 with respect to FIGS. 10A and 11A .
- client 1006 can enter their GID card number (this time issued by the credit card issuing entity 1210 ) to use the transaction Pre-Authorization.
- the vendor 1002 can recognize the GID card number and can send the information to the GID API.
- the GID API can send the vendor a unique URL to present the Pre-Authorization link to the client 1006 (the link can be either pre-stored in the API or the API can be configured to request the link from a secure connection to the identity management system 100 ).
- the client 1006 can follow a secure login protocol to reach the identity management system 100 (through the credit card online management system of the credit card issuing entity 1210 ).
- the client 1006 can securely log into the credit card online management system of the credit card issuing entity 1210 .
- the transaction information can be retrieved and verified from the presented link, as discussed with respect to step 1038 illustrated in FIGS. 10B and 11A .
- the pre-authorization can be presented to the client from the credit card online management system of the credit card issuing entity 1210 .
- step 1044 the flow continues to step 1044 if either the credit card issuing entity has no multi-card capability or if step 1042 is successfully completed.
- the process can then continue in steps 1046 - 1062 in the manner discussed previously with respect to FIGS. 10B and 11B .
- the submitted order can be cross referenced with the information stored at the identity management system 100 to verify the pre-authorization.
- the order or transaction can then be verified or rejected based on whether there is a match with the pre-authorization information stored at the identity management system 100 .
- FIGS. 13A and 13B are flow diagrams illustrating a transaction 1300 using an automated pre-authorization process for the identity management system 100 without registration but using a one-time card number, in accordance with an exemplary embodiment of the present invention.
- the transaction 1300 proceeds with steps 1012 - 1034 in the manner discussed previously with respect to FIGS. 10A , 11 A and 12 A.
- steps 1215 and 1220 are not executed for transaction 1300 , as no registration takes place by the credit card issuing entity 1210 .
- the flow of transaction 1300 then proceeds through step 1225 , 1038 , 1230 , 1235 and 1042 , in the manner discussed with respect to FIG. 12A .
- the client can take the temporary credit card number and enter it in the appropriate space on the vendor 1006 check-out page (or it can be entered automatically by the system) and click on the submit link to finalize the transaction.
- the flow of transaction 1300 can then proceed through steps 1048 , 1110 and 1052 - 1062 , as discussed with respect to FIG. 11B , so that the order or transaction can then be verified or rejected based on whether there is a match with the pre-authorization information stored at the identity management system 100 .
- the identity management system 100 of the present invention can also be used to combat mail fraud to which the user may fail prey.
- the identity management system 100 can include an address identification code generation module 155 in communication with, for example, the total identification score generation module 115 .
- the address identification code generation module 155 is configured to generate an address identification code associated with an address of the user.
- a user of the identity management system 100 can establish an address (e.g., the user's home address) and the identity management system 100 will generate a unique address identification code associated with that address.
- the address identification code can be any suitable number (e.g., a random number, code or the like) that uniquely identifies a user and the user's associated address.
- the address identification code generation module 155 can generate a unique address identification code such as, for example, 187653 that represents the user's address.
- the address identification code and an address of a communication reception center can be given to a third party.
- the address information could be 123 Processing Street, Box 187653, New City, Utah 54321, in which the address identification code forms the box number of the address of the communication reception center. Any communications sent to the user at that address by the third party are received at the communications reception center.
- the communications can be scanned or otherwise entered into the identity management system 100 and made available to the user associated with the address identification code.
- the identity management system 100 can include a communication display module 160 in communication with, for example, the total identification score generation module 115 .
- the communication display module 160 is configured to format the communications for display to the user associated with the address identification code (e.g., through the graphical user interface 170 ).
- the user can be notified of incoming mail (e.g., through electronic notification, such as e-mail) and access its mail, for example, remotely over the Internet by logging into the identity management system 100 and retrieve any and all communications received at the communication reception center.
- the identity management system 100 can also be used to prevent healthcare identity theft.
- a patient can go to the healthcare provider.
- the administrator can enter the patient's drivers license or other unique identifying documentation into the identity management system 100 , as well as any other required patient's personal information, billing information, scheduling and the like.
- access to identity management system 100 can be granted to authorized administrators.
- Each authorized administrator can have a unique PIN for accessing identity information in the identity management system 100 .
- all accesses can be recorded and logged for security purposes.
- the identity management system 100 can be integrated with other suitable systems to retrieve, for example, other healthcare-related information and the like.
- a unique identifying number can be assigned to the patient that is maintained by the identity management system 100 .
- the identifying number can be associated with an appropriate barcode.
- the identifying number and barcode can be placed on a card for the patient to maintain. During future visits, the patient can present the card to sign-in with the healthcare provider.
- the patient's identification information and healthcare information can be maintained securely in the identity management system 100 . Consequently, secure identity information will not have to be included in the patient's physical or electronic files.
- the patient's physical file can be assigned a barcode that correlates to the patient's unique identifying number to allow for easy retrieval from the healthcare provider's file room.
- the healthcare provider can then store patient files without concerns for information theft.
- Such a system can also place the healthcare providers in compliance with HIPAA regulations, because the patient's secure identity information has been removed from the files, thereby preserving patient identity privacy.
- the identity management system 100 can include an identity risk factor generation module 165 in communication with, for example, the total identification score generation module 115 .
- the identity risk factor generation module 165 is configured to generate an identity risk factor associated with the user.
- the identity risk factor is associated with a level of risk of theft of the identity of the user by identity thieves.
- the identity risk factor generation module 165 is configured to determine the exposure of a user's identity by analyzing such factors as, for example, the number and types of uses of the user's identity.
- the identity risk factor generation module 165 can determine that the level of risk of theft of the user's identity is high, and can generate a correspondingly high identity risk factor. However, if a user uses its identity only sporadically to apply for credit with reputable financial institutions, the identity risk factor generation module 165 can determine that the level of risk of theft of the user's identity is low, and generate a correspondingly low identity risk factor. Thus, by analyzing the pattern and types of uses of a user's identity (e.g., as maintained by the log module 135 ), the identity risk factor generation module 165 can generate an appropriate identity risk factor. The user can then use the identity risk factor to reduce its exposure to potential identity theft by, for example, modifying the manner and types of uses of the user's identity.
- the identity management system 100 can also include any suitable type of graphical user interface 170 configured to provide access to, either locally or remotely, and management of identification information associated with the user.
- the graphical user interface 170 can be, for example, any suitable Web browser that can support secure connections and remote access to the identity management system 100 .
- the graphical user interface 170 can be displayed on any suitable computer display or monitor capable of displaying graphical and/or textual information to a user and which allows a user to enter information (e.g., commands, information and the like) through, for example, a keyboard, a touch-screen, any type of pointing device, electronic pen, and the like.
- the graphical user interface 170 can be used by the user to access, control and manage any and all of the functionality of the identity management system 100 , including viewing and managing the user's identity profile, viewing identity reports, and the like.
- the identity management system 100 can be comprised of a microprocessor and associated memory that stores the steps of a computer program to perform the functions of the modules of the identity management system 100 .
- the microprocessor can be any suitable type of processor, such as, for example, any type of general purpose microprocessor or microcontroller, a digital signal processing (DSP) processor, an application-specific integrated circuit (ASIC), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically-erasable programmable read-only memory (EEPROM), a computer-readable medium, or the like.
- DSP digital signal processing
- ASIC application-specific integrated circuit
- PROM programmable read-only memory
- EPROM erasable programmable read-only memory
- EEPROM electrically-erasable programmable read-only memory
- the memory can be any suitable type of computer memory or any other type of electronic storage medium, such as, for example, read-only memory (ROM), random access memory (RAM), cache memory, compact disc read-only memory (CDROM), electro-optical memory, magneto-optical memory, or the like.
- ROM read-only memory
- RAM random access memory
- CDROM compact disc read-only memory
- electro-optical memory magneto-optical memory, or the like.
- the memory can be programmed using conventional techniques known to those having ordinary skill in the art of computer programming.
- the actual source code or object code of the computer program can be stored in the memory.
- FIGS. 2A-2C are flowcharts illustrating steps for verifying an identity of a user, in accordance with an exemplary embodiment of the present invention.
- step 201 of FIG. 2A at least one source of identification of the user is received.
- the at least one source of identification can comprise a driver's license of the user, a birth certificate of the user or the like.
- the identification score assigned to each of the at least one source of identification is based upon a reliability of the at least one source of identification.
- an identification score is assigned to each of the at least one source of identification.
- a total identification score of the user is generated from the identification scores of each of the at least one source of identification and a predetermined function.
- the predetermined function can comprise a summing function, a weighted summing function or the like.
- the total identification score of the user is associated with a level of verification of the identity of the user.
- the total identification score of the user is compared to a minimum identification score associated with a transaction.
- the transaction can comprise an application for credit, a purchase transaction or the like.
- the transaction is performed when the total identification score of the user is one of greater than and equal to the minimum identification score. Additional sources of identification of the user are received before performing the transaction when the total identification score is less than the minimum identification score.
- step 210 at least one of personal information and financial information of the user can be supplied to a third party.
- the total identification score can be associated with the at least one of personal information and financial information of the user.
- a unique identity access authorization code associated with the user can be generated for use by a third party in the transaction.
- step 216 at least the total identification score of the user can be transmitted to the third party upon verification of the identity access authorization code.
- At least the total identification score of the user can be transmitted to the third party upon further verification of a user identification code of the user.
- the user identification code can comprise a social security number of the user or the like.
- step 219 accesses associated with the total identification score of the user by the third party can be recorded.
- an identity card securely containing identification information associated with the user can be issued.
- the identity card can comprise a smart card or the like.
- the identification information associated with the user can be encrypted on the identity card.
- uses of the identification information securely contained on the identity card can be restricted.
- the uses of the identification information can be restricted in many ways.
- FIG. 3 is a flowchart illustrating steps for restricting uses of identification information securely contained on an identity card, in accordance with an exemplary embodiment of the present invention.
- locations of where the identification information is used can be restricted.
- times of when the identification information is used can be restricted.
- types of transactions for which the identification information is used can be restricted.
- an address identification code can be associated with an address of the user.
- the address identification code and an address of a communication reception center can be supplied to a third party.
- communications for the user can be received from the third party at the communication reception center.
- the communications can include the address identification code, for example, as part of the address on the communications.
- the communications can be supplied to the user associated with the address identification code.
- an identity risk factor associated with the user can be supplied. The identity risk factor is associated with a level of risk of theft of the identity of the user by identity thieves.
- step 425 the transaction is approved when the total identification score of the user is one of greater than and equal to the minimum identification score.
- step 430 additional sources of identification of the user are requested before approving the transaction when the total identification score is less than the minimum identification score.
- FIG. 5 is a flowchart illustrating steps for verifying an identity of a user, in accordance with an alternative exemplary embodiment of the present invention.
- step 505 at least one source of identification of the user is received.
- step 510 an identification score is assigned to each of the at least one source of identification.
- step 515 a total identification score of the user is generated from the identification scores of each of the at least one source of identification and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user.
- approval of the transaction is received when the total identification score of the user is one of greater than and equal to a minimum identification score.
- step 525 a request for additional sources of identification of the user is received before receiving approval of the transaction when the total identification score is less than the minimum identification score.
- any or all of the steps of a computer program as illustrated in FIGS. 2A , 2 B, 2 C and 3 - 6 for identity verification and management can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions.
- a “computer-readable medium” can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
- the computer readable medium can be, for example but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device, or propagation medium.
- the computer-readable medium can include the following: an electrical connection having one or more wires, a portable computer diskette, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, and a portable compact disc read-only memory (CDROM).
- RAM random access memory
- ROM read-only memory
- EPROM or Flash memory erasable programmable read-only memory
- CDROM portable compact disc read-only memory
- Exemplary embodiments of the present invention can be used in conjunction with any device, system, process or transaction in which the reliability and authenticity of the identification information associated with a user is needed.
- exemplary embodiments can be used by financial institutions as part of various types of financial transactions (e.g., applications for credit), by retail establishments as part of various types of purchase transactions (e.g., online or in-person merchandise purchases using credit cards), by credit reporting agencies to maintain, manage and verify the identity of users in conjunction with the maintenance of the credit history of a user, and the like.
Abstract
A system for verifying the identity of a user includes an identification score assignment module configured to receive at least one source of identification of the user and to assign an identification score to each of the at least one source of identification. The system includes a total identification score generation module, in communication with the identification score assignment module, configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user, and compared to a minimum identification score associated with a transaction. The transaction is performed when the total identification score of the user is greater than or equal to the minimum identification score.
Description
- This application is a continuation of U.S. patent application Ser. No. 11/295,516, filed on Dec. 7, 2005, which claims priority under 35 U.S.C. §119(e) to U.S. Provisional Application No. 60/633,419, filed on Dec. 7, 2004, and to U.S. Provisional Application No. 60/697,991, filed on Jun. 12, 2005, the entire contents of each of which are hereby incorporated by reference herein.
- 1. Field of the Invention
- The present invention relates to identity theft protection systems. More particularly, the present invention relates to a system and method for identity verification and management.
- 2. Background Information
- Identity theft is considered one of the fastest growing crimes in the United States. For example, between 2002 and 2003, the number of reported cases of identity theft grew 80 percent. In 2002 alone, nearly ten million cases of identify theft were reported. Nearly one in 8 United States adults have fallen victim to identity theft in the last five years. On average, identify theft will cost a victim approximately $1,000 in expenses to rectify the damage caused to their financial accounts and reputations. The yearly costs of identity theft are enormous, costing business approximately $48 billion and individuals approximately $5 billion.
- Identity thieves can operate in a number of ways. With the spread of the Internet and the increases in computer processing technology, access to personal and financial information of individuals (through both legal and illegal means) has become far easier and more prevalent. Other more conventional techniques include stealing credit card numbers and using those numbers to create new credit cards under false names. Job applications, personnel records and employment data that should be confidential can instead be stolen by thieves who use the information to steal workers' identities. A person's social security number can be stolen and used by the criminal to apply for credit. Once the identification is stolen and credit is issued, the identity thief can use the credit in an unrestricted manner. Typically, the victim of the identity theft may not learn of the theft until many weeks or months after the crime has occurred, for example, not until the next credit card statement is received.
- Much of identity theft occurs because an individual cannot control how and who uses their identity and, consequently, their credit. The problem of identity theft also applies to companies and other like entities whose identities are also at risk, such as financial institutions, retail stores and the like. For example, a criminal company can pretend to represent a reputable company and use the reputable company's stolen identity for financial gain. For example, a fraudulent mortgage company could pretend to represent a reputable and established Bank to steal money from unsuspecting individuals, to the financial and reputational detriment of both the individuals and the Bank.
- A system and method are disclosed for identity verification and management. In accordance with exemplary embodiments of the present invention, according to a first aspect of the present invention, a system for verifying an identity of a user includes an identification score assignment module. The identification score assignment module is configured to receive at least one source of identification of the user. The identification score assignment module is configured to assign an identification score to each of the at least one source of identification. The system includes a total identification score generation module in communication with the identification score assignment module. The total identification score generation module is configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user. The total identification score of the user is compared to a minimum identification score associated with a transaction. The transaction is performed when the total identification score of the user is one of greater than and equal to the minimum identification score. Additional sources of identification of the user are received before performing the transaction when the total identification score is less than the minimum identification score.
- According to the first aspect, the at least one source of identification can comprise a driver's license of the user. According to an alternative exemplary embodiment of the first aspect, the at least one source of identification can comprise a birth certificate of the user. The identification score assigned to each of the at least one source of identification can be based upon a reliability of the at least one source of identification. The predetermined function can comprise, for example, a summing function, a weighted summing function or the like. The system can include a data storage device. Personal information and/or financial information of the user can be stored in the data storage device. The total identification score can be associated with the personal information and/or financial information of the user. The system can include an access code generation module. The access code generation module can be configured to generate a unique identity access authorization code associated with the user for use by a third party to access information associated with the user. The system can include a data transmission module. The data transmission module can be configured to transmit at least the total identification score of the user to the third party upon verification of the identity access authorization code. The data transmission module can be configured to transmit at least the total identification score of the user to the third party upon further verification of a user identification code of the user. The user identification code can comprise a social security number of the user.
- According to the first aspect, the system can include a log module. The log module can be configured to record accesses associated with the total identification score of the user by the third party. The system can include a report generation module. The report generation module can be configured to generate reports for displaying the record of accesses associated with the total identification score of the user. Personal information and/or financial information associated with the user can be transmitted to the third party upon verification of the identity access authorization code. The personal information and/or financial information associated with the user can be transmitted to the third party upon further verification of a user identification code of the user. The user identification code can comprise a social security number of the user. The system can include an identity card. The identity card can be configured to securely contain identification information associated with the user. The identity card can comprise, for example, a smart card. The identification information associated with the user can be encrypted on the identity card. Uses of the identification information securely contained on the identity card can be restricted by the user. Locations of where the identification information is used can be restricted by the user. Times of when the identification information is used can be restricted by the user. Types of transactions for which the identification information is used can be restricted by the user. Use of the identification information for the transaction can be prohibited when the identification information is restricted by the user for the transaction. The identification information for the transaction can be used when the identification information is not prohibited by the user for the transaction.
- According to the first aspect, the system can include a transaction order generation module. The transaction order generation module can be configured to generate a transaction order using the total identification score of the user. The transaction order can be submitted by the user to perform the transaction. Personal information and/or financial information of the user can be accessed, using the transaction order, to complete the transaction. The system can include an address identification code generation module. The address identification code generation module can be configured to generate an address identification code associated with an address of the user. The address identification code and an address of a communication reception center can be supplied to a third party. Communications for the user from the third party can be received at the communication reception center. The communications can include the address identification code. The system can include a communication display module. The communication display module can be configured to display the communications to the user associated with the address identification code. The system can include an identity risk factor generation module. The identity risk factor generation module can be configured to generate an identity risk factor associated with the user. The identity risk factor can be associated with a level of risk of theft of the identity of the user by identity thieves. According to exemplary embodiments of the first aspect, the transaction can comprise, for example, an application for credit, a purchase transaction or the like. The system can include a graphical user interface. The graphical user interface can be configured to provide access to and management of identification information associated with the user.
- According to a second aspect of the present invention, a system for verifying an identity of a user includes a receiver module configured to receive at least one source of identification of the user. The system includes an identification score assignment module configured to assign an identification score to each of the at least one source of identification. The system includes an identification score generation module configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user. The system includes a comparator module configured to compare the total identification score of the user to a minimum identification score associated with a transaction. The system also includes a transaction approval module. The transaction approval module is configured to generate an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score. The transaction approval module is configured to generate a request for additional sources of identification of the user before generating the approval of the transaction when the total identification score is less than the minimum identification score.
- According to a third aspect of the present invention, a system for verifying an identity of a user includes an identification score assignment module configured to receive at least one source of identification of the user, and configured to assign an identification score to each of the at least one source of identification. The system includes a total identification score generation module configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user. The system also includes an approval receiver module. The approval receiver module is configured to receive an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score. The approval receiver module is configured to receive a request for additional sources of identification of the user before receiving the approval of the transaction when the total identification score is less than the minimum identification score.
- According to a fourth aspect of the present invention, a system for verifying an identity of a user includes a receiver module configured to receive a total identification score of the user. The total identification score is generated from identification scores assigned to each of at least one source of identification of the user and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user. The system includes a comparator module configured to compare the total identification score of the user to a minimum identification score associated with a transaction. The system includes a transaction approval module. The transaction approval module is configured to generate an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score. The transaction approval module is configured to generate a request for additional sources of identification of the user before generating the approval of the transaction when the total identification score is less than the minimum identification score.
- According to a fifth aspect of the present invention, a method of verifying an identity of a user includes the steps of: a.) receiving at least one source of identification of the user; b.) assigning an identification score to each of the at least one source of identification; and c.) generating a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user. The total identification score of the user is compared to a minimum identification score associated with a transaction. The transaction is performed when the total identification score of the user is one of greater than and equal to the minimum identification score. Additional sources of identification of the user are received before performing the transaction when the total identification score is less than the minimum identification score.
- According to the fifth aspect, the at least one source of identification can comprise a driver's license of the user. According to an alternative exemplary embodiment of the fifth aspect, the at least one source of identification can comprise a birth certificate of the user. The identification score assigned to each of the at least one source of identification can be based upon a reliability of the at least one source of identification. The predetermined function can comprise, for example, a summing function, a weighted summing function or the like. The method can include the steps of: d.) supplying at least one of personal information and financial information of the user, wherein the total identification score can be associated with the at least one of personal information and financial information of the user; e.) generating a unique identity access authorization code associated with the user for use by a third party in the transaction; and f.) transmitting, to the third party, at least the total identification score of the user upon verification of the identity access authorization code. At least the total identification score of the user can be transmitted to the third party upon further verification of a user identification code of the user. The user identification code can comprise, for example, a social security number of the user.
- According to the fifth aspect, the method can include the steps of: g.) recording accesses associated with the total identification score of the user by the third party; h.) reviewing the record of accesses associated with the total identification score of the user; and i.) transmitting, to the third party, personal information and/or financial information associated with the user upon verification of the identity access authorization code of the user. The personal information and/or financial information associated with the user can be transmitted to the third party upon further verification of a user identification code of the user. The user identification code can comprise, for example, a social security number of the user. The method can include the step of: j.) issuing an identity card securely containing identification information associated with the user. The identity card can comprise, for example, a smart card. The identification information associated with the user can be encrypted on the identity card.
- According to the fifth aspect, the method can include the step of: k.) restricting uses of the identification information securely contained on the identity card. According to an exemplary embodiment of the fifth aspect, step (k) can comprise the steps of: l.) restricting locations of where the identification information is used; m.) restricting times of when the identification information is used; and n.) restricting types of transactions for which the identification information is used. The method can include the steps of: o.) prohibiting use of the identification information for the transaction when the identification information is restricted by the user for the transaction; p.) using the identification information for the transaction when the identification information is not prohibited by the user for the transaction; q.) generating a transaction order using the total identification score of the user; r.) submitting the transaction order to perform the transaction; s.) transmitting at least one of personal information and financial information of the user, upon verification of the transaction order, to complete the transaction; t.) associating an address identification code with an address of the user; u.) supplying the address identification code and an address of a communication reception center to a third party; v.) receiving communications for the user from the third party at the communication reception center, wherein the communications include the address identification code; w.) supplying the communications to the user associated with the address identification code; and x.) supplying an identity risk factor associated with the user, wherein the identity risk factor can be associated with a level of risk of theft of the identity of the user by identity thieves. According to exemplary embodiments of the fifth aspect, the transaction can comprise, for example, an application for credit, a purchase transaction or the like.
- According to a sixth aspect of the present invention, a method of verifying an identity of a user includes the steps of: a.) receiving at least one source of identification of the user; b.) assigning an identification score to each of the at least one source of identification; c.) generating a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function, wherein the total identification score of the user is associated with a level of verification of the identity of the user; d.) comparing the total identification score of the user to a minimum identification score associated with a transaction; e.) approving the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score; and f.) requesting additional sources of identification of the user before approving the transaction when the total identification score is less than the minimum identification score.
- According to a seventh aspect of the present invention, a method of verifying an identity of a user includes the steps of: a.) receiving at least one source of identification of the user; b.) assigning an identification score to each of the at least one source of identification; c.) generating a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function, wherein the total identification score of the user is associated with a level of verification of the identity of the user; d.) receiving approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score; and e.) receiving a request for additional sources of identification of the user before receiving approval of the transaction when the total identification score is less than the minimum identification score.
- According to an eighth aspect of the present invention, a method of verifying an identity of a user includes the steps of: a.) receiving a total identification score of the user, wherein the total identification score is generated from identification scores assigned to each of at least one source of identification of the user and a predetermined function, and wherein the total identification score of the user is associated with a level of verification of the identity of the user; b.) comparing the total identification score of the user to a minimum identification score associated with a transaction; c.) approving the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score; and d.) requesting additional sources of identification of the user before approving the transaction when the total identification score is less than the minimum identification score.
- According to a ninth aspect of the present invention, a system for verifying an identity of a user includes means for assigning an identity score. The identity score assigning means is configured to receive at least one source of identification of the user. The identity score assigning means is configured to assign an identification score to each of the at least one source of identification. The system includes means for generating a total identity score in communication with the identity score assigning means. The total identity score generating means is configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user. The total identification score of the user is compared to a minimum identification score associated with a transaction. The transaction is performed when the total identification score of the user is one of greater than and equal to the minimum identification score. Additional sources of identification of the user are received before performing the transaction when the total identification score is less than the minimum identification score.
- According to the ninth aspect, the at least one source of identification can comprise a driver's license of the user. According to an alternative exemplary embodiment of the ninth aspect, the at least one source of identification can comprise a birth certificate of the user. The identification score assigned to each of the at least one source of identification can be based upon a reliability of the at least one source of identification. The predetermined function can comprise, for example, a summing function, a weighted summing function or the like. The system can include means for storing data. Personal information and/or financial information of the user can be stored in the data storing means. The total identification score can be associated with the personal information and/or financial information of the user. The system can include means for generating an access code. The access code generating means can be configured to generate a unique identity access authorization code associated with the user for use by a third party to access information associated with the user. The system can include means for transmitting data. The data transmitting means can be configured to transmit at least the total identification score of the user to the third party upon verification of the identity access authorization code. The data transmitting means can be configured to transmit at least the total identification score of the user to the third party upon further verification of a user identification code of the user. The user identification code can comprise, for example, a social security number of the user.
- According to the ninth aspect, the system can include means for logging. The logging means can be configured to record accesses associated with the total identification score of the user by the third party. The system can include means for generating a report. The report generating means can be configured to generate reports for displaying the record of accesses associated with the total identification score of the user. Personal information and/or financial information associated with the user can be transmitted to the third party upon verification of the identity access authorization code. The personal information and/or financial information associated with the user can be transmitted to the third party upon further verification of a user identification code of the user. The user identification code can comprise, for example, a social security number of the user. The system can include an identity card means. The identity card means can be configured to securely contain identification information associated with the user. The identity card can comprise, for example, a smart card means. The identification information associated with the user can be encrypted on the identity card means. Uses of the identification information securely contained on the identity card means can be restricted by the user. For example, locations of where the identification information is used can be restricted by the user. Times of when the identification information is used can be restricted by the user. Types of transactions for which the identification information is used can be restricted by the user. Use of the identification information for the transaction can be prohibited when the identification information is restricted by the user for the transaction. The identification information for the transaction can be used when the identification information is not prohibited by the user for the transaction.
- According to the ninth aspect, the system can include means for generating a transaction order. The transaction order generating means can be configured to generate a transaction order using the total identification score of the user. The transaction order can be submitted by the user to perform the transaction. Personal information and/or financial information of the user can be accessed, using the transaction order, to complete the transaction. The system can include means for generating an address identification code. The address identification code generating means can be configured to generate an address identification code associated with an address of the user. The address identification code and an address of a communication reception center can be supplied to a third party. Communications for the user from the third party can be received at the communication reception center. The communications can include, for example, the address identification code. The system can include means for displaying a communication. The communication displaying means can be configured to display communications to the user associated with the address identification code. The system can include means for generating an identity risk factor. The identity risk factor generating means can be configured to generate an identity risk factor associated with the user. The identity risk factor can be associated with a level of risk of theft of the identity of the user by identity thieves. According to exemplary embodiments of the ninth aspect, the transaction can comprise an application for credit, a purchase transaction or the like. The system can also include a graphical user interface means. The graphical user interface means can be configured to provide access to and management of identification information associated with the user.
- According to a tenth aspect of the present invention, a system for verifying an identity of a user includes means for receiving configured to receive at least one source of identification of the user. The system includes means for assigning an identification score configured to assign an identification score to each of the at least one source of identification. The system includes means for generating an identification score configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user. The system includes means for comparing configured to compare the total identification score of the user to a minimum identification score associated with a transaction. The system includes means for approving a transaction. The transaction approving means is configured to generate an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score. The transaction approving means is configured to generate a request for additional sources of identification of the user before generating the approval of the transaction when the total identification score is less than the minimum identification score.
- According to an eleventh aspect of the present invention, a system for verifying an identity of a user includes means for assigning an identification score configured to receive at least one source of identification of the user and configured to assign an identification score to each of the at least one source of identification. The system includes means for generating a total identification score configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user. The system includes means for receiving an approval. The approval receiving means is configured to receive an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score. The approval receiving means is configured to receive a request for additional sources of identification of the user before receiving the approval of the transaction when the total identification score is less than the minimum identification score.
- According to a twelfth aspect of the present invention, a system for verifying an identity of a user includes means for receiving configured to receive a total identification score of the user. The total identification score is generated from identification scores assigned to each of at least one source of identification of the user and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user. The system includes means for comparing configured to compare the total identification score of the user to a minimum identification score associated with a transaction. The system includes means for approving a transaction. The transaction approving means is configured to generate an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score. The transaction approving means is configured to generate a request for additional sources of identification of the user before generating the approval of the transaction when the total identification score is less than the minimum identification score.
- According to a thirteenth aspect of the present invention, a computer-readable medium contains a computer program for verifying an identity of a user. The computer program performs the steps of: a.) receiving at least one source of identification of the user; b.) assigning an identification score to each of the at least one source of identification; and c.) generating a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function, wherein the total identification score of the user is associated with a level of verification of the identity of the user, wherein the total identification score of the user is compared to a minimum identification score associated with a transaction, wherein the transaction is performed when the total identification score of the user is one of greater than and equal to the minimum identification score, and wherein additional sources of identification of the user are received before performing the transaction when the total identification score is less than the minimum identification score.
- According to the thirteenth aspect, the at least one source of identification can comprise a driver's license of the user. According to an alternative exemplary embodiment of the thirteenth aspect, the at least one source of identification can comprise a birth certificate of the user. The identification score assigned to each of the at least one source of identification can be based upon a reliability of the at least one source of identification. The predetermined function can comprise, for example, a summing function, a weighted summing function or the like. The computer program can perform the steps of: d.) retrieving at least one of personal information and financial information of the user, wherein the total identification score is associated with the at least one of personal information and financial information of the user; e.) generating a unique identity access authorization code associated with the user for use by a third party in the transaction; and f.) initiating transmission, to the third party, of at least the total identification score of the user upon verification of the identity access authorization code. At least the total identification score of the user can be transmitted to the third party upon further verification of a user identification code of the user. The user identification code can comprise, for example, a social security number of the user.
- According to the thirteenth aspect, the computer program can perform the steps of: g.) recording accesses associated with the total identification score of the user by the third party; h.) providing a review of the record of accesses associated with the total identification score of the user; and i.) initiating transmission, to the third party, of personal information and/or financial information associated with the user upon verification of the identity access authorization code of the user. The personal information and/or financial information associated with the user can be transmitted to the third party upon further verification of a user identification code of the user. The user identification code can comprise, for example, a social security number of the user. The computer program can perform the step of: j.) generating authorization for issuance of an identity card securely containing identification information associated with the user. The identity card can comprise, for example, a smart card or the like. The identification information associated with the user can be encrypted on the identity card.
- According to the thirteenth aspect, the computer program can perform the step of k.) generating use restrictions for the identification information securely contained on the identity card. According to an exemplary embodiment of the thirteenth aspect, for step (k), the computer program can perform the steps of: l.) generating location restrictions for where the identification information is used; m.) generating temporal restrictions for when the identification information is used; and n.) generating type restrictions for transactions for which the identification information is used. The computer program can perform the steps of: o.) generating use prohibitions for the identification information for the transaction when the identification information is restricted by the user for the transaction; p.) generating authorization to use the identification information for the transaction when the identification information is not prohibited by the user for the transaction; q.) generating a transaction order using the total identification score of the user; r.) forwarding the transaction order to perform the transaction; s.) initiating transmission of at least one of personal information and financial information of the user, upon verification of the transaction order, to complete the transaction; t.) associating an address identification code with an address of the user; u.) providing the address identification code and an address of a communication reception center to a third party; v.) receiving communications for the user from the third party at the communication reception center, wherein the communications can include, for example, the address identification code; w.) forwarding the communications to the user associated with the address identification code; and x.) generating an identity risk factor associated with the user, wherein the identity risk factor can be associated with a level of risk of theft of the identity of the user by identity thieves. According to exemplary embodiments of the thirteenth aspect, the transaction can comprise an application for credit, a purchase transaction or the like.
- According to a fourteenth aspect of the present invention, a computer-readable medium contains a computer program for verifying an identity of a user, wherein the computer program performs the step of: a.) receiving at least one source of identification of the user; b.) assigning an identification score to each of the at least one source of identification; c.) generating a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function, wherein the total identification score of the user is associated with a level of verification of the identity of the user; d.) comparing the total identification score of the user to a minimum identification score associated with a transaction; e.) generating an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score; and f.) initiating a request for additional sources of identification of the user before generating the approval of the transaction when the total identification score is less than the minimum identification score.
- According to a fifteenth aspect of the present invention, a computer-readable medium contains a computer program for verifying an identity of a user, wherein the computer program performs the step of: a.) receiving at least one source of identification of the user; b.) assigning an identification score to each of the at least one source of identification; c.) generating a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function, wherein the total identification score of the user is associated with a level of verification of the identity of the user; d.) receiving an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score; and e.) receiving a request for additional sources of identification of the user before receiving the approval of the transaction when the total identification score is less than the minimum identification score.
- According to a sixteenth aspect of the present invention, a computer-readable medium contains a computer program for verifying an identity of a user, wherein the computer program performs the step of a.) receiving a total identification score of the user, wherein the total identification score is generated from identification scores assigned to each of at least one source of identification of the user and a predetermined function, and wherein the total identification score of the user is associated with a level of verification of the identity of the user; b.) comparing the total identification score of the user to a minimum identification score associated with a transaction; c.) generating an approval of the transaction when the total identification score of the user is one of greater than and equal to the minimum identification score; and d.) initiating a request for additional sources of identification of the user before generating the approval of the transaction when the total identification score is less than the minimum identification score.
- According to a seventeenth aspect of the present application, a system for verifying an identity of a user includes an identification score assignment module. The identification score assignment module is configured to receive at least one source of identification of the user. The identification score assignment module is configured to assign an identification score to each of the at least one source of identification. The system includes a total identification score generation module in communication with the identification score assignment module. The total identification score generation module is configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user. The total identification score of the user is compared to a minimum identification score associated with a transaction. The system includes an identity confidence factor generation module in communication with the total identification score generation module. The identity confidence factor generation module is configured to generate an identity confidence factor associated with the user in accordance with a validity of the identity of the user. The transaction is performed when at least one of i.) the total identification score of the user is one of greater than and equal to the minimum identification score, and ii.) the identity confidence factor of the user is greater than a predetermined identity threshold value. Additional sources of identification of the user are received before performing the transaction when at least one of: i.) the total identification score is less than the minimum identification score, and ii.) the identify confidence factor of the user is less than the predetermined identity threshold value.
- According to the seventeenth aspect, the validity of the identity of the user can be based on a time factor. The time factor can comprise a length of time in which the identity of the user is used legitimately. The identity confidence factor of the user can be increased as the length of time in which the identity of the user is legitimately used increases. The system can include a healthcare identity card. The healthcare identity card can be configured to securely contain identification information associated with the user. The healthcare identity card can be configured to be used by a healthcare provider to retrieve healthcare information associated with the user.
- Other objects and advantages of the present invention will become apparent to those skilled in the art upon reading the following detailed description of preferred embodiments, in conjunction with the accompanying drawings, wherein like reference numerals have been used to designate like elements, and wherein:
-
FIG. 1 is a block diagram illustrating a system for verifying an identity of a user, in accordance with an exemplary embodiment of the present invention. -
FIGS. 2A-2C are flowcharts illustrating steps for verifying an identity of a user, in accordance with an exemplary embodiment of the present invention. -
FIG. 3 is a flowchart illustrating steps for restricting uses of identification information securely contained on an identity card, in accordance with an exemplary embodiment of the present invention. -
FIG. 4 is a flowchart illustrating steps for verifying an identity of a user, in accordance with an alternative exemplary embodiment of the present invention. -
FIG. 5 is a flowchart illustrating steps for verifying an identity of a user, in accordance with an alternative exemplary embodiment of the present invention. -
FIG. 6 is a flowchart illustrating steps for verifying an identity of a user, in accordance with an alternative exemplary embodiment of the present invention. -
FIG. 7 is a diagram illustrating information routing for GIS, in accordance with an exemplary embodiment of the present invention. -
FIG. 8 is a diagram illustrating the identity management system distributed platform model, in accordance with an exemplary embodiment of the present invention. -
FIG. 9 is a diagram illustrating an exemplary architecture for theidentity management system 100 platform, in accordance with an exemplary embodiment of the present invention. -
FIGS. 10A and 10B are flow diagrams illustrating a transaction using an automated pre-authorization process for the identity management system without using a one-time card number, in accordance with an exemplary embodiment of the present invention. -
FIGS. 11A and 11B are flow diagrams illustrating a transaction using an automated pre-authorization process for the identity management system using a one-time card number, in accordance with an exemplary embodiment of the present invention. -
FIGS. 12A and 12B are flow diagrams illustrating a transaction using an automated pre-authorization process for the identity management system without registration and without using a one-time card number, in accordance with an exemplary embodiment of the present invention. -
FIGS. 13A and 13B are flow diagrams illustrating a transaction using an automated pre-authorization process for the identity management system without registration but using a one-time card number, in accordance with an exemplary embodiment of the present invention. -
FIG. 14 is a diagram illustrating insurance coverage using the identity management system, in accordance with an exemplary embodiment of the present invention. -
FIG. 15 is a diagram illustrating on-line gambling transactions with the identity management system, in accordance with an exemplary embodiment of the present invention. -
FIG. 16 is a diagram illustrating a commerce platform for the identity management system, in accordance with an exemplary embodiment of the present invention. - Exemplary embodiments of the present invention are directed to a system and method for identity verification and management. According to exemplary embodiments, the identity of an individual or entity (collectively, a “user”) is first verified. One or more sources of identification are supplied by the user, with each source of identification being verified and given an individual identity value or score based on, for example, the level of reliability or authenticity of the identification source. The identity of the user is then evaluated based on the total of the identity scores. A total identification score is assigned to the user. Once the identity of the user is verified, the user can manage its identity using the identity management system of the present invention.
- The identity management system according to exemplary embodiments can, for example, provide authorization to certain organizations to supply services to the user for a period of time. For example, each time the user authorizes an organization to provide a service to the user using the user's identity, the identity management system can provide the user with an identity authorization code to pass to the organization. Once a user sends the identity authorization code, along with its identity information, such as, for example, a social security number, the organization can further verify the identity of the user by using an additional aspect of the identity management system of the present invention. According to exemplary embodiments, the identity management system can be used by vendors wishing to provide a service to the user. For example, the identity management system can allow the vendor to input the client's identity information (e.g., social security number) along with the provided identity authorization code to determine if the user has verified the vendor to use the user's identity information based on the criteria the user has inputted into the identity management system.
- The user can also restrict the use of its identity information and credit information based on, for example, an identification card issued to the user by the system. The identification card can also restrict uses of the user's identity and/or credit based on specified restrictions. For example, the user can specify a restriction such that any credit card issued to the user cannot be used internationally or the like. Such a restriction will allow the user to restrict the user's exposure to identity theft. The identity management system according to exemplary embodiments can also issue an identity risk factor to the user. The identity risk factor can assist both the user and third parties in evaluating the exposure of the user to identity theft.
- Online (i.e., Internet-based) purchases can also be verified using the identity management system according to exemplary embodiments. For example, the identity management system can identify a user by asking the user to provide an identification number and/or an identity code uniquely assigned to the user. Thus, an online merchant can be certain that the credit card being used has not been stolen and is not being used in a fraudulent manner. In addition, as discussed previously, the user can restrict the use of the credit card based on specified restrictions as part of process of managing the user's identity profile.
- Accordingly, by providing control and management of one's identity to the user according to exemplary embodiments, identity theft can be significantly reduced. Currently, government issued identification cards and documents, such as driver's licenses, passports and birth certificates, are among the few means of verifying a user's identity. However, these forms of identification can be obtained easily using fake or falsified information, nor are copies of these forms of governmental identification generally required when applying for credit. In contrast, exemplary embodiments of the present invention can establish, maintain and secure the identity of a user through proper identity verification and management, issuance of secure identity cards and unique identity codes to be used along with the identity cards, and the like.
- As used herein, a “user” can be any person, group of individuals, company, corporation, business, retail establishment, organization or other any suitable type of entity that possesses a unique identity that can be potentially stolen or otherwise compromised, and for which protection against identity theft is desired.
- These and other aspects of the present invention will now be described in greater detail.
FIG. 1 is a block diagram illustrating anidentity management system 100 for verifying an identity of a user, in accordance with an exemplary embodiment of the present invention. Theidentity management system 100 includes an identificationscore assignment module 105. The identificationscore assignment module 105 is configured to receive at least one source ofidentification 110 of the user. Any suitable number N of sources ofidentification 110 can be supplied or otherwise transmitted by the user to the identification score assignment module 105 (e.g., source ofidentification 1, source ofidentification 2, . . . , source of identification N). Each source ofidentification 110 can be any appropriate means for uniquely identifying a user, such as, for example, a driver's license, a social security card, a birth certificate, passport or other like credential(s) of the user. The sources ofidentification 110 can be supplied by the user to the identificationscore assignment module 105 using any appropriate means, such as any suitable form of electronic transmission (e.g., a scanned copy of the documentation, facsimile, electronic mail and/or the like) or manual delivery. - The identification
score assignment module 105 is configured to assign an identification score to each of the at least one source ofidentification 110. According to exemplary embodiments, an identification score is a value that represents the level of verification or veracity of a given source ofidentification 110. In other words, the identification score assigned to each of the at least one source ofidentification 110 is based upon the reliability of the at least one source ofidentification 110. For example, identification scores can be based on a scale, such as 0 to 10, 0 to 100 or any suitable scale. For example, on a scale of 0 to 100, an identification score below a certain threshold number (e.g., 50 or other suitable value) can represent that the source ofidentification 110 cannot be considered trusted or reliable and is not (or cannot be) verified, while an identification score at or above the given threshold (e.g., 50 or other suitable value) can represent that the source ofidentification 110 can be considered trusted, reliable and verified (or verifiable). However, any appropriate identification score can be assigned to a source ofinformation 110, so long as the identification score is indicative of the level of verification, reliability and/or veracity of the source ofidentification 110. - According to an exemplary embodiment, identification scores for each type of source of
identification 110 can pre-assigned and stored in, for example, a look-up table or database. According to the example of a scale of 0 to 100, driver's licenses can have a score of for example, 60 (or other suitable value), while birth certificates can have a score of, for example, 85 (or other suitable value), with each score being retrieved from the look-up table or database based on the type of source ofidentification 110 provided by the user. Alternatively, identification scores for each source ofidentification 110 can be assigned dynamically, i.e., the identification scores can be generated based on one or more factors, for example, the type of source ofidentification 110, personal information of the user, and the like. For example, if a driver's license is issued from a particular state, the driver's license is an original (not a copy) and the driver (i.e., the user) is above a certain age, then the identification score assigned to this source ofidentification 110 can be high, otherwise it can be assigned a lower score. Those of ordinary skill in the art will recognize that other methods of assigning identification scores to sources ofidentification 110 can be used. - The
identity management system 100 includes a total identificationscore generation module 115 in communication with the identificationscore assignment module 105. The total identificationscore generation module 115 is configured to generate a total identification score of the user from the identification scores of each of the at least one source ofidentification 110 using a predetermined function. According to exemplary embodiments, a total identification score of a user is a value that represents the level of verification of the identity of the user. The total identification score can be considered akin to, for example, a credit score that is given to a user based on the user's credit history. For example, total identification scores can be based on a scale, such as 0 to 10, 0 to 100 or any suitable scale. For example, on a scale of 0 to 100, a total identification score below a certain threshold number (e.g., 50 or other suitable value) can represent that the identity of the user cannot be considered reliable and is not (or cannot be) verified, while a total identification score at or above the given threshold (e.g., 50 or other suitable value) can represent that the identity of the user can be considered trusted, reliable and verified (or verifiable). However, any appropriate threshold can be used as the demarcation for the total identification score, so long as any total identification score at or above such a threshold is indicative of the level of verification, reliability and/or veracity of the identity of the user. - According to exemplary embodiments, the total identification
score generation module 115 generates a total identification score by combining the identification scores of each source ofidentification 110. For example, the total identificationscore generation module 115 can use a summing function to sum the individual scores to create the total identification score. Alternatively, the total identificationscore generation module 115 can use a weighted summing function to add the individuals identification scores of each of the sources ofidentification 110, while giving greater weight to those sources ofidentification 110 that are more reliable (e.g., assigning greater weight to a birth certificate than to a social security card). Alternatively, the total identificationscore generation module 115 can use an averaging function to average the identification scores of the sources ofidentification 110. However, any suitable method for generating the total identification score from the identification scores of each of the sources ofidentification 110 can be used, so long as the resulting total identification score is indicative of the level of verification or reliability of the identity of the user. - For purposes of illustration and not limitation, assume that a user provides three sources of
identification 110 to the identification score assignment module 105: a social security card, a driver's license, and a birth certificate. The identificationscore assignment module 105 can then attempt to verify each source ofidentification 110. For example, the identificationscore assignment module 105 can be configured to access public record databases (e.g., via the Internet), state department of motor vehicle databases (e.g., to verify the driver's license) or other databases of other state agencies (e.g., to verify the birth certificate), federal record databases (e.g., to verify the social security card) and the like. Assume for purposes of illustration that a scale of 0 to 100 is used for identification scores. After the verification process, the identificationscore assignment module 105 assigns an identification score of 54 to the social security card, an identification score of 68 to the driver's license, and an identification score of 85 to the birth certificate. As discussed previously, each of the identification scores can be either a pre-assigned number based on the type of source ofidentification 110, or dynamically generated based on one or more factors. These individual identification scores are then passed to the total identificationscore generation module 115. If the total identificationscore generation module 115 uses a summing function to generate the total identification score, then the summed total identification score assigned to the user would be 54+71+85=210. If an averaging function is used to generate the total identification score, the total identification score assigned to the user would be 210/3=70. - According to exemplary embodiments, the total identification score assigned to the user can be used as part of a transaction. For example, the transaction can include an application for credit, a purchase transaction, or any suitable transaction for which verification of a user's identity is required. Continuing with the present illustration, assume that the user applies for a credit card. The credit card company can receive the total identification score of the user (as discussed below) as part of the application process. The total identification score of the user can be compared to a minimum identification score associated with the transaction. Although the credit card company can perform the comparison, the total identification
score generation module 115 can alternatively perform the comparison on behalf of the credit card company. For example, the total identificationscore generation module 115 can include or be in communication with a comparator module configured to compare the total identification score of the user to the minimum identification score associated with the transaction. - For purposes of the present illustration, assume that the credit card company requires a minimum total identification score of 50 (using an averaging function) to issue the user a credit card. Since the total identification score of the user is 70, the credit card company can be assured of the verification of the identity of the user. In other words, the transaction can be performed (e.g., the credit card is issued), since the total identification score of the user (e.g., 70) is greater than or equal to the minimum identification score (e.g., 50) required to perform the transaction. However, if the total identification score was less than the minimum identification score, one or more additional sources of
identification 110 of the user can be requested, received and verified (e.g., until the total identification score is above the minimum identification score) before the transaction can be performed. For example, if the comparison is performed by theidentity management system 100, the total identificationscore generation module 115 can include or be in communication with a transaction approval module. The transaction approval module can be configured to generate an approval of the transaction when the total identification score of the user is greater than or equal to the minimum identification score, and to generate a request to the user for additional sources ofidentification 110 before generating the approval of the transaction when the total identification score is less than the minimum identification score. Alternatively, if the comparison is performed by the third party, the total identificationscore generation module 115 can include or be in communication with an approval receiver module. The approval receiver module can be configured to receive an approval of the transaction when the total identification score of the user is greater than or equal to the minimum identification score, and to receive a request for additional sources ofidentification 110 of the user before receiving the approval of the transaction when the total identification score is less than the minimum identification score. - As will be apparent to those of ordinary skill, the identification scores assigned to each of the sources of
identification 110, the total identification score of the user, and the minimum identification score required to perform the transaction will depend on such factors as the types of documents submitted by the user, the predetermined function used to generate the total identification score, the level of verification desired by the third party to perform the transaction, the type of transaction to be performed, and other like factors. - For example, a CONFIDENCE FACTOR™ (which can also be referred to as an “identity confidence factor”) can be used to evaluate and measure the validity of a user's identity, additionally or alternatively to the total identification score of the user. For example, the CONFIDENCE FACTOR™ can be used by the total identification
score generation module 115 as part of the generation of the total identification score of the user. - According to an exemplary embodiment, the CONFIDENCE FACTOR™ is a value represents the validity of a user's identity. For example, the CONFIDENCE FACTOR™ can be a base value (e.g., 0 or any suitable value) that can be increased or otherwise altered based on one or more factors, including, for example, time. For example, the CONFIDENCE FACTOR™ can be increased (e.g., by suitable increments): i.) as a user's identity is consistently and legitimately used over a period of time; ii.) based on the length of time the user has been a member of the identity verification and management system according to exemplary embodiments; iii.) based on the length of time a user preserves a healthy credit report; and/or other like temporal indications. Other appropriate factors or variables can be combined with, for example, time to determine the CONFIDENCE FACTOR™. For example, such factors can include the number of instances that a user accesses their on-line identity account, the lack of criminal records, arrests or other criminal activity, and the like. As with the total identification score, as a user's CONFIDENCE FACTOR™ increases, the probability of a false identity decreases.
- According to the exemplary embodiment, the CONFIDENCE FACTOR™ can be combined with or used separately from the total identification score to indicate the level of verification or reliability of the identity of the user. The CONFIDENCE FACTOR™ can represent the validity of a user's identity proven over time and which can be based on information provided by an entity other than the user, such as criminal records later discovered and the like, while the total identification score represents a combination of identity scores that may not be dependent upon factors such as time. Thus, for example, the CONFIDENCE FACTOR™ can be added to the total identification score to improve the level of verification or reliability of the identify of the user. Alternatively, the CONFIDENCE FACTOR™ can be used as part of the evaluation of the total identification score by a third party. For purposes of illustration and not limitation, if the user has a marginal total identification score that does not qualify the user for, for example, a business loan from a financial institution, a high CONFIDENCE FACTOR™ can provide the additional identity verification required by the financial institution to authorize the loan. Additionally, if the user has a high total identification score, then a high CONFIDENCE FACTOR™ can be used by the financial institution to authorize an increased loan amount or lower interest rate for the loan.
- Exemplary embodiments of the present invention can be used to perform identity access control. Accordingly, the
identity management system 100 can include adata storage device 120 in communication with, for example, the total identificationscore assignment module 115. Thedata storage device 120 can be used to store personal information and/or financial information of the user, although any suitable information associated with the user can be stored in thedata storage device 120. Thedata storage device 120 can be any suitable type of computer memory or other computer storage medium capable of storing information. According to exemplary embodiments, the total identification score of the user can be associated with the personal and/or financial information stored in thedata storage device 120. By creating such an association, the information associated with the total identification score can be accessed and retrieved as part of a transaction, rather than having the user personally supply such information for each and every transaction. - Accordingly, the
identity management system 100 can include an accesscode generation module 125 in communication with, for example, the total identificationscore assignment module 115. The accesscode generation module 125 is configured to generate a unique identity access authorization code associated with the user for use by a third party to access the personal and/or financial information associated with the user. Theidentity management system 100 also can include adata transmission module 130 in communication with, for example, the accesscode generation module 125 and, through acommunication link 133, to a third party entity. Thedata transmission module 130 is configured to transmit at least the total identification score of the user to the third party upon verification of the identity access authorization code. Thedata transmission module 130 is also configured to receive information from external (i.e., third party) sources via thecommunication link 133. - For purposes of illustration and not limitation, assume the user has a total identification score of 70, which was generated as discussed in the previous illustration. The user then desires to apply for credit, such as a credit card. According to exemplary embodiments, the user can log into or otherwise gain access to the
identity management system 100 of the present invention by, for example, logging into (e.g., via login name and password) a website or through a suitable graphical user interface (e.g., graphical user interface 170). Once the user accesses theidentity management system 100, the user can have a unique identity access authorization code generated for the user by the accesscode generation module 125. The identity access authorization code can be given to a third party by the user to allow the third party to gain access to the user's personal and/or financial information maintained by theidentity management system 100. The identity access authorization code can be any suitable code or number that is unique to the user, such as, for example, a random number, an alphanumeric string of characters, the public key of a public key-private key public key infrastructure (PKI) system, or the like. According to an exemplary embodiment, the identity access authorization code can be a one-time use code, although the identity access authorization code can be used any number of times. - Continuing with the present illustration, when applying for the credit card, instead of inputting its personal and financial information into the application form, the user can supply the identity access authorization code to the bank or other financial institution to whom the user is applying for credit. Using the user's identity access authorization code and, for example, an identifier that uniquely identifies the financial institution (e.g., a financial institution identification number), the financial institution can gain access to the
identity management system 100 to retrieve information associated with the user (e.g., through thegraphical user interface 170 or like interface). In other words, the personal information and/or financial information associated with the user can be transmitted to the third party (e.g., via data transmission module 130) upon verification of the identity access authorization code. For example, the financial institution can retrieve the total identification score of the user, as well as any personal and/or financial information associated with the user that is needed for the credit application. The retrieved information can then be used by the financial institution to complete or otherwise fill in, for example, the credit card application on behalf of the user. As discussed previously, the financial institution can compare the total identification score of the user to a minimum identification score to determine whether the application process can continue (e.g., when the total identification score is greater than or equal to the minimum identification score) or whether additional sources ofidentification 110 are required from the user before continuing (e.g., when the total identification score is less than the minimum identification score). - According to an exemplary embodiment, to improve the security of the user's personal and/or financial information stored in the
identity management system 100, a user identification code can be generated by the identity management system 100 (e.g., by the access code generation module 125) or supplied by the user to the third party entity, along with the identity access authorization code. The third party entity can use the user identification code in connection with the identity access authorization code before access and retrieval of the user's information is granted to the third party entity. For example, thedata transmission module 130 can be configured to transmit at least the total identification score of the user to the third party upon further verification of the user identification code of the user. The user identification code can be any suitable number or code that uniquely identifies the user, such as the user's social security number or the like. - The
identity management system 100 can include alog module 135 in communication with, for example, the accesscode generation module 125. Thelog module 135 can be configured to record or otherwise store a list of, for example, accesses associated with the total identification score of the user by the third party. However, thelog module 135 can be configured to record accesses to any of the personal and/or financial information associated with the user that is stored and maintained by theidentity management system 100. Theidentity management system 100 can also include areport generation module 140 in communication with, for example, the accesscode generation module 125. Thereport generation module 140 can be configured to generate, for example, reports for displaying the record of accesses associated with the total identification score and other information associated with the user. The record of accesses can be displayed to the user through, for example, a graphical user interface (e.g., graphical user interface 170) or other display device or printed in hard copy for review by the user. Additionally, thelog module 135 can be used to maintain a record of each use of a user's identification information by a third party. Thereport generation module 140 can then provide an identity report to the user by which the user can view the activities performed by the third parties with respect to the user's identity, in a manner similar to that which a user reviews a credit report to view credit transactions and credit activity. - According to exemplary embodiments, an
identity card 145 can be issued by theidentity management system 100 at the request of the user (e.g., by logging into theidentity management system 100 through thegraphical user interface 170 and making such a request). Theidentity card 145 can be configured to securely contain identification information associated with the user. For example, the total identification score of the user can be encrypted (e.g., using any suitable encryption technique) and stored on theidentity card 145, although any suitable information can be securely contained on theidentity card 145, such as, for example, the personal and/or financial information associated with the user. However, according to an alternative exemplary embodiment, theidentity card 145 can act as a key to access information stored remotely. - The
identity card 145 can comprise a smart card (e.g., containing a “smart chip”), a card with a magnetic stripe, or any suitable storage medium on which encrypted information can be stored. Alternatively, theidentify card 145 can comprise any suitable form of electronic device capable of storing information, such as, for example, a cell phone or other electrical or electronic devices. In addition, theidentity card 145 can include biometric forms of identification, such as, for example, a fingerprint or the like. Alternatively, theidentify card 145 can comprise a unique identifying feature of a human, such as an individual's sclera, retina or fingerprint that can be used with or without an accompanying card or other identifying device. According to an alternative exemplary embodiment, suitable RFID technology can be used. The RFID technology can be used instead of the card (e.g., a suitable RFID chip can be implanted within or on a person or a person's belongings) for use with theidentity management system 100. Alternatively, a suitable RFID chip or device can reside on theidentity card 145. - The user can then provide the
identity card 145 to a third party, who can decrypt the identification information stored on the card and use that information as part of a transaction (e.g., applying for credit, a purchase transaction, and the like). For example, the identification information contained on theidentity card 145 can be used by the third party in addition or alternatively to the information that can be retrieved by the third party using the identity access authorization code. Alternatively, the identification information contained on theidentity card 145 can comprise, for example, the identity access authorization code by which the third party gains access to the information associated with user that is stored and maintained by theidentity management system 100. - According to exemplary embodiments, the user can restrict the uses of the identification information securely contained on the
identity card 145. For example, the user can restrict the locations of where the identification information is used (e.g., the identification information can only be used in the United States and Canada, but not in Mexico). Additionally or alternatively, the user can restrict the times of when the identification information is used (e.g., the identification information can only be used between the hours of 9:00 a.m. and 5:00 p.m.). Additionally or alternatively, the user can restrict the types of transactions for which the identification information can be used (e.g., the identification information can only be used for purchase transactions, but not applications for credit). Other types of restrictions of the identification information securely stored on theidentity card 145 are possible. According to exemplary embodiments, the third party can decrypt the identification information stored on theidentity card 145. Using the decrypted identification information, the third party can access the identity management system 100 (e.g., through thegraphical user interface 170 using the identity access authorization code, through a secure socket connection using an appropriate network protocol and the like) as part of a transaction. Based on the restrictions placed on the identification information by the user, theidentity management system 100 can prohibit or otherwise deny the use of the identification information when the identification information is restricted by the user for the transaction, or allow or otherwise approve the use of the identification information when the identification information is not prohibited by the user. Thus, the use of the identification information securely contained on theidentity card 145 can be approved or denied in a manner similar to that which a bank either approves or denies the use of a credit card for a purchase transaction. - According to an alternative exemplary embodiment of the present invention, the
identity card 145 can also be used to restrict the uses of accompanying credit cards, checks, affiliated identification cards (as discussed below) and the like forms of payment or identification that can be used in conjunction with theidentity card 145. For example, the user can restrict the use of credit cards by specifying where, when and how the credit cards can be used. For example, based on the identification information securely contained on theidentity card 145, a merchant or other third party can either allow the accompanying credit card to be used when the use falls within the restriction(s) specified in the identification information, or deny the use of the credit card when the use does not. As discussed previously, the restriction information can be included in the identification information securely contained on theidentity card 145, which is provided to the third party once the identification information is decrypted. For example, when the user provides theidentity card 145, theidentity management system 100 can automatically inform the third party of the restrictions by allowing or rejecting the use of theidentity card 145. - Alternatively, the identification information can be used by the third party to gain access to the
identity management system 100, at which time the user-specified restriction(s) for the credit card are provided to the third party. According to an alternative exemplary embodiment, the third party can access the user-specified restrictions directly from theidentity management system 100 using, for example, a unique third party authorization code (e.g., generated by the identity management system 100), regardless of the presence of theidentity card 145. For example, a third party can independently access theidentity management system 100 remotely (e.g., through the Internet,graphical user interface 170, telephone or automated customer service, through an appropriate secure network connection, or the like) to check for the user's total identification score, other identification information, and for any user-specified restrictions placed on the form of payment (e.g., a credit card, check or the like) proffered by the user, when the user does not provide the third party with anidentity card 145. To access the user's identity information and any accompanying restrictions, the third party can log into the identity management system 100 (e.g., through thegraphical user interface 170, telephone support, secure network connection or the like), enter the third party's unique vendor authorization code, and enter the account number of the form of payment proffered by the user (e.g., credit card number, checking account number, and the like). The identity information and any user-specified restrictions can then be provided to the third party by theidentity management system 100. - According to an exemplary embodiment, the identity theft protection provided by the use of an
identity card 145 can be separate from credit protection that can be associated with one or more credit cards. Thus, aseparate identity card 145 and credit card(s) can be used. Although theidentity card 145 can be used in conjunction with any suitable form of payment or identification, theidentity card 145 can also serve as both a form of payment (e.g., a credit card or the like) and means of identification simultaneously, without the need for separate forms of payment and identification. Thus, theidentity card 145 can serve as the only form of payment and identification that the user need carry. For example, credit card information or other payment information can be entered into theidentity management system 100 and be accessible by theidentity card 145, along with the identification information of the user (including, for example, any user-specified restrictions associated with the forms of payment). To access a particular credit card or other form of payment, the user can enter a personalized PIN number or suitable pass code into a third party's point-of-sale (POS) system that will allow the use of the information associated with the particular credit card or other form of payment for the transaction. Each form of payment can be associated with a unique pass code, or a single pass code can be associated with all forms of payment, allowing the user to associate a particular form of payment with the pass code as desired. - For example, the user can log into the identity management system 100 (e.g., using the user's unique name and password) and enter information associated with one or more forms of payment, such as, for example, credit card numbers, expiration dates and authorization codes, although information associated with any suitable form of payment (e.g., check cards, checks and the like) can be entered. For purposes of illustration and not limitation, the user can enter information associated with a credit card, such as the following:
-
- Name on Credit Card: John Q. Smith
- Credit Card Type: Visa
- Credit Card Number: 1234-1234-1234-1234
- Expiration Date: 07/2010
- CVV Code: 4567
Once this information is entered, theidentity management system 100 can generate a unique code that can be assigned to the credit card (such as, for example, Card Pass Code: 98765) and associated with theidentity card 145 of the user. Any unique code or number can be assigned to the form of payment. The user can then use theidentity card 145 to conduct a financial transaction, without the need to proffer a separate form of payment. For purposes of the present example, when making a purchase or performing a financial transaction, to use the aforementioned Visa credit card, the user can swipe or otherwise enter theidentity card 145 into the merchant's POS system and enter the pass code of 98765, thereby retrieving the credit card information associated with theidentity card 145 and the pass code.
- As discussed previously, according to one exemplary embodiment, a
single identity card 145 can be used to access any or all identification or credit card information. In other words, a user can carry theidentity card 145 instead of many other cards. As noted previously, users can store or otherwise associate any credit card information with theidentity card 145 using theidentity management system 100. For example, the user can access theidentity management system 100 via, for example, the Internet or World Wide Web via a suitable graphical user interface (e.g., graphical user interface 170) and an appropriate Internet or network connection. However, to charge a credit card stored on or otherwise associated with theidentity card 145, the merchant or third party can process the charge through conventional credit card network. The credit card network is a specialized network that is connected to merchants, credit card companies and banks. - Conventionally, to perform a credit card transaction, the user or the merchant swipes a credit card through a credit card reading device. The device reads the information from the card and sends it to a first processing site (a “first processor” or “acquirer”) for processing by the merchant. From the first processor, the information will be transmitted via the credit card network and ultimately reach a second processing site (a “second processor”) at a designated bank or financial institution for processing (e.g., authorization or denial of the charge). The bank or other financial institution that receives the charge information is the bank or financial institution that issued the credit card to the user. An authorization or denial of the charge, based on the user's available credit, will be sent to the merchant or third party via the second and first processors.
- According to an exemplary embodiment, the
identity management system 100 can review the authorization transactions processed by the merchants or third parties as part of identity theft prevention. To review such authorization transactions, the existing merchant authorization process can be modified by placing a third processing site (a “third processor”) between the first and second processors. Thus, according to exemplary embodiments, when the merchant or user swipes theidentity card 145 through the credit card reading device, the information from theidentity card 145 will be sent to the first processor. From the first processor, the information can be transmitted through the credit card network to the third processor. The third processor can reside in, for example, theidentity management system 100. For example, the third processor can compare the identity information associated with the credit card information to verify the identity of the user to ensure that an actual or potential identity theft is not occurring (e.g., the credit card has not been marked as lost or stolen and the like, as discussed below). For example, if the identity of the user making the credit card charge is not the correct identity associated with the credit card authorization, the third processor can issue an identity denial of the credit card transaction based on the failed identity verification. Otherwise, the third processor can issue an identity authorization for the credit card transaction as a result of the verified identity. After the information has been verified by the third processor, the charge information can be sent to the second processor at the bank for financial authorization or denial of the transaction, for example, based on the user's available credit. - More particularly, the first processor receives a request for credit card authorization from the point-of-sale (POS) and passes that request to the issuing bank for verification. The first processor then relays the answer to that request from the issuing bank to the merchant. When a merchant wants to establish a connection with a network, the merchant establishes the connection through a gateway. The first processor receives the merchant request for credit card authorization and sends it to the network. From the network, the request finds its way to the issuing bank's database for authorization. Some banks act as their own processor and receive and answer any requests. However, many banks register with a second processor, such as Élan Financial Services or the like. The second processor has access to the issuing bank's information and can issue authorization. Once the second processor accesses the bank data, it can relay an answer back through the network to the first processor and ultimately to the merchant. Most or all accounts can settle through a clearing house and get deposited into the merchant's acquiring bank for final reconciliation of authorizations.
- The third processor can act like the second processor, and, in a manner, replace the second processor. For example, the
identity management system 100 can issue a global or universal credit card (such as theidentity card 145 or a separate credit card), as discussed below. The global credit card can be used in several different ways. For example, the global credit card can be used to store other credit cards. When a user uses the global credit card along with a PIN associated with a certain stored credit card, an authorization request can be sent from the merchant through a gateway to the merchant's chosen processor. From the first processor the request can be sent to the network and finally to theidentity management system 100. Theidentity management system 100 can make a connection to the issuing bank and check the user's account for availability of funds. The transaction can be performed using an “On-Us” approach to avoid network charges, as discussed below. If funds are available, an authorization message can be sent to the merchant. If funds are not available, a authorization declined messages can be sent instead. If an authorization is provided to the merchant, a settlement can be requested to transfer the funds to, for example, theidentity management system 100 as soon as possible. In such a transactional system, the user would have zero credit balance in theidentity management system 100. All balances would be provided by the issuing bank. Theidentity management system 100 would then be used for management of the transaction. - Alternatively, the global credit card can be used to store other credit cards and can be used as a credit card itself: If used as a credit card itself, the user can use their global credit card without using an associated PIN. In such a scenario, the authorization request can be sent from the merchant through a gateway to the merchant's chosen processor. From the first processor, the request can be sent to the network and finally to the
identity management system 100. The transaction can be recorded, and, if the user has sufficient funds in their account, an authorization message can be sent to the merchant. Otherwise an authorization declined message can be sent. Users can use theidentity management system 100 to assign each transaction to a bank or credit card of choice. At regular intervals, theidentity management system 100 can collect requests and send user's requested transactions to the issuing banks. If sufficient funds are available, the user's account can be credited and money can be collected from the issuing bank. If sufficient funds are not available, the user's account will not be credited, which will be reflected in the user's account. If the user does not assign the transaction to any of the other banks, the user's account with theidentity management system 100 will be affected. In such case, theidentity management system 100 can act as a credit card company. - Introduction of a third processor into existing credit card systems could disturb cost equilibriums in the credit card authorization process and could result in the incurring of extra charges. The extra charges could result, because when data travels to each processor, a percentage of the transaction amount is deducted in favor of that processor. Thus, adding a third processor can increase the charge. In existing credit card systems, any such extra charge is pushed back to the merchants. Merchants have come to accept such charges to compete for customers who prefer to use credit cards. Accordingly, a new system that produces new costs will either have to absorb the costs itself or push those costs to the merchants. Therefore, exemplary embodiments of the present invention can reduce/avoid any extra costs incurred by introducing the
identity card 145 into the credit card system. To eliminate such extra charges, exemplary embodiments can use an “On-Us” approach. For example, the entity creating the extra charges (the entity maintaining the identity verification system 100) can partner with banks or other financial institutions to eliminate those extra charges. Additionally, such an approach can eliminate the need for a third processor, as the second processor can be used to perform both the identity authorization and the financial (credit card) authorization. Alternatively, negotiations can take place with banks or other financial institutions to lower or eliminate such charges. As will be recognized, such negotiations can take many shapes and forms, with various incentives, give-backs and concessions made between the parties to reduce or eliminate such charges. However, with the negotiation approach, a third processor would still be used. -
FIG. 16 is a diagram illustrating a commerce platform for theidentity management system 100, in accordance with an exemplary embodiment of the present invention. To participate in transactions at astore 1605, auser 1610 can register with the identity management system 100 (also referred to as a “Global Identity (GID) processor”) (see flow 1650). For example, if the bank of theuser 1610 is a participatingentity 1615 of thecommerce platform network 1600, then theuser 1610 can be automatically registered by opening, for example, a credit card or the like with the bank and having the bank issue the credit card to theuser 1610. The credit card can be, for example, anidentity card 145 or the like associated with theidentity management system 100, and can have a suitable PIN number associated with the card to identify the card as anidentity card 145. Alternatively or additionally, theuser 1610 can associate one or more credit cards with anidentity card 145, with each credit card assigned a unique PIN number so that theuser 1610 can choose which credit card(s) to use at the time of the transaction. Thus, according to exemplary embodiments, the PIN number can be used to identify the card as anidentity card 145 and to select the credit card to use for the transaction, while the credit card numbers can be used to identify the correct issuing bank. - When the
user 1610 participates in a transaction at thestore 1605, theuser 1610 can enter the PIN or other identifier associated with theidentity card 145. The transaction information, including, for example, credit card and PIN numbers, can be passed to the identity management system 100 (see flow 1650). Theidentity management system 100 can query a suitable database to look up or otherwise retrieve the credit card and PIN number combination (see flow 1655). Such information can allow theidentity management system 100 to determine the particular bank (e.g., participating entity 1615) that issued the credit card. Once such a determination is made, theidentity management system 100 can query or otherwise access the account information for theuser 1605 from the proper participating entity 1615 (e.g., for no fee since it is a participating entity). The transaction information, can then be routed to the proper participatingentity 1615 from theidentity management system 100 to complete the transaction (e.g., an “OnUs” transaction based on the PIN numbers—see flow 1660). The completed and authorized transaction information can then be passed from the participatingentity 1615 through theidentity management system 100 using the corresponding network 1625 (e.g., the credit card network or the like) to thestore 1605 to finish the transaction. Theidentity management system 100 can perform any suitable type of transaction exchange with participatingentities 1615, such as, for example, ACH-based transactions to transfer money (see flow 1665) to settle charges made by theuser 1605 or the like. - However, entities that do not participate in the commerce platform according to exemplary embodiments (referred to as non-participating entities 1630) can still use the
commerce platform network 1600 to perform transactions. For example, the transaction information received by theidentity management system 100 from theuser 1610 at the initiation of a transaction can be forwarded by theidentity management system 100 to the appropriatenon-participating entity 1630, for example, based on the credit card number. Although theidentity management system 100 may not be able to access the account information of theuser 1610 from thenon-participating entity 1630, theidentity management system 100 can still perform appropriate transaction routing functions to route the transaction information to thenon-participating entity 1620 via the network 1635 (e.g., a credit card network or the like). Alternatively or additionally, theidentity management system 100 can perform suitable transaction exchanges with thenon-participating entities 1630. For example, theidentity management system 100 can perform ACH-based transactions or other electronic funds transfer to transfer money to, for example, settle charges made by theuser 1605 and other like transactions. Thus, for example, with either participating ornon-participating entities user 1605 can have their account debited or otherwise charged by either direct access to bank account of the user (e.g., via a participating entity 1615) or by having theidentity management system 100 use electronic funds transfer systems, such as an ACH-based transaction system, to interact withnon-participating entities 1630 to settle such transactions. - As noted previously, the
user 1610 can participate in a transaction at thestore 1605 by entering the PIN number along with the credit card information (e.g., by swiping the card at an appropriate purchase terminal). By using the PIN number, theuser 1605 can choose the credit card(s) to which the transaction is to be assigned at the time the transaction is being made. However, according to an alternative exemplary embodiment, theuser 1610 can simply enter the credit card information, thereby not assigning the transaction to any particular credit card at the time of the transaction. In such a scenario, theidentity management system 100 can hold the transaction, while still authorizing the charge. After the transaction takes place, theuser 1605 can then log into or otherwise access their account on the identity management system 100 (e.g., through a suitable graphical user interface over, for example, the Internet or World Wide Web) (see flow 1670). Theuser 1605 can then use theidentity management system 100 to assign the transaction(s) to one or more accounts (e.g., credit card accounts or the like) inblock 1640. Once assigned, theidentity management system 100 can then perform suitable interactions with either or both of the participating andnon-participating entities identity management system 100 can act as a credit card company. - To conduct the financial transaction, the
identity management system 100 can perform steps, such as: checking theidentity card 145 to ensure that it is valid and not marked as compromised (e.g., lost) by the owner; checking to ensure that theidentity card 145 has not been restricted based on the location, type or any other restrictions imposed by the user; verifying that the person meets the minimum identity score requirement of the merchant; checking for any additional restrictions and other like steps. Once the initial verification has been performed, theidentity management system 100 can automatically send the credit card information (including the financial transaction information, such as amount of purchase and the like) to the appropriate credit card processing company. The credit card processing company performs the account processing in the conventional manner and returns an answer (e.g., financial transaction is accepted or denied). The answer can be relayed from theidentity management system 100, either directly or indirectly, to the merchant, thus completing the financial transaction. - According to an alternative exemplary embodiment, a form of payment can have more than one pass code associated with it. For example, each pass code can impose certain restrictions on a transaction. For instance, a parent can enter the form of payment information under the identity account of their child. Using one pass code, the parent can restrict the transaction to a certain dollar amount. However, using another, different, pass code, the parent can increase this spending limit. For purposes of illustration and not limitation, the child can enter a store and decide to make one or more purchases. During the checkout, the child can use a first pass code to make a purchase which limits the expenditure to only non-alcoholic items under a total of $100.00. However, if the child is stranded and is required to make an emergency transaction that may exceed the $100.00 limit, the child can be provided with an additional emergency pass code, different than the first pass code, that does not impose any limitation on the expenditure.
- In addition, there can be situations where it may not be possible to enter a pass code upon purchase, such as restaurant payment. In these situations, the account number of a form of payment (e.g., a credit card number) stored or otherwise located on the
identity card 145 can be designated as a default form of payment with certain restrictions. The default form of payment can be automatically selected from theidentity card 145 for the purchase transaction. For example, the user can designate an AMERICAN EXPRESS™ card to be the default form of payment. The default form of payment can also be subject to certain rules, with the rules being the set of restrictions and requirements that the user imposes on the use of the form of payment. The rules for the default form of payment can include, for example, the maximum amount that can be charged for this form of payment, the venues in which the form of payment can be used, the geographical areas in which the form of payment can be used, or any other suitable rule. However, multiple different default forms of payment can be associated with theidentity card 145, with each default form of payment being used for different purposes. For example, for restaurant purchases, the default form of payment can be the aforementioned AMERICAN EXPRESS™ card. However, for clothing purchases, a Visa card can be default form of payment. The rules for the default form of payment associated with anidentity card 145 can be establish to use any suitable number of forms of payment (credit cards, debit cards, checks, and the like) for any types of purchases or transactions. - According to an alternative exemplary embodiment, multiple pass codes can be entered, so that the purchase or other financial transaction can be divided or otherwise split based on the rules associated with each of the multiple forms of payment stored along with a user's identity profile. For example, if a first credit card has a pass code of 12345 and second credit card has a pass code of 98765, entering a code of 1234598765 would cause the purchase transaction to be performed based on the rules imposed on both credit cards associated with these respective pass codes (e.g., a union or other accumulation of the respective rule sets). Consequently, for purposes of illustration and not limitation, a $5000 transaction can be divided between the credit card assigned to pass code 12345 and credit card assigned to pass code 98765. Although the merchant will see the transaction as a single purchase transaction, for the transaction to proceed, both of the respective credit cards are checked and suitably verified by the
identity management system 100. The purchase transaction split can be specified in the pass code that is entered by the user. For example, a $5000 transaction can be split by assigning $1000 for the pass code 12345 and $4000 for the pass code 98765. The resulting pass code can be entered as, for example, 123451000987654000 or the like. - According to an alternative exemplary embodiment, instead of using an
identity card 145, the identity information associated with theidentity card 145 can instead be integrated with any other suitable form of payment and/or identification issued by another institution. For example, a credit card issued by a financial institution can be configured to include a user's identity number either on the credit card or associated with the credit card number (e.g., in the financial institution's database), thereby allowing an integration with the identity information available from theidentity management system 100. Thus, a user can use a form of payment, such as a credit card, and still have the form of payment checked for all of the restrictions imposed by the user through theidentity management system 100 on the particular form of payment. - For purposes of illustration and not limitation, assume a user applies for a Visa credit card. The issuing bank can associate the user's identity information with the credit card being issued. The user can then impose restrictions on the use of the credit card account through the identity management system 100 (e.g., the credit card cannot be used outside of the United States). When the new credit card is used (without any accompanying identity card 145), the credit card company can check with the
identity management system 100 to determine whether there are any restrictions imposed on the purchase transaction for the given credit card. For example, if the credit card cannot be used outside of the United Sates, then an attempt to make a purchase in Taiwan would be rejected. - Such integration is not limited to credit cards or other similar forms of payment, but can also be used in association with suitable forms of identification, such as, for example, a social security card. For example, the social security card can be configured to contain or be associated with the identity information of the user, so that the use of social security card number can also be restricted through the
identity management system 100. In such an embodiment, for example, a user can provide its social security card to a prospective employer without fear of the social security number being stolen or used for fraudulent purposes. As with the credit card number illustrated above, before the social security number can be used for any purpose, such as, for example, reporting a 1099 Form to the Internal Revenue Service (IRS), the IRS can first check with theidentity management system 100 to verify that the user has allowed the use of the social security number by the given employer, thereby ensuring that the employer is not making fraudulent claims. - Although numerous illustrative examples have been given in which a credit card has been discussed as a form of payment, other forms of payment can be used according to exemplary embodiments of the present invention. For example, the
identity management system 100 can be configured to store the routing number and the bank account number for checks. A user can then assign a rule for use of the check information, and one or more pass codes can be issued to allow use of and access to this check information. For example, during a purchase transaction, a user can enter identification information (e.g., via the identity card 145) and the (check) pass code into the merchant's POS system. Theidentity management system 100 can determine if the purchase transaction satisfies the rule(s) that apply to the use of the check information. If so, a new (i.e., the next) check number can be issued and the check can be verified against the bank account (e.g., to determine if there are sufficient funds). Once verified, the merchant can receive a verification code or other unique number that can be used for an electronic deposit or electronic funds transfer from the bank account of the user to the bank account of the merchant. Such an embodiment can eliminate the need for a user to carry and write checks to perform purchase and other financial transactions. Other forms of payment can be maintained by and used in accordance with exemplary embodiments of the present invention. - According to exemplary embodiments, the same process that is used for identifying a user in the United States can be adapted for identifying a user in a foreign country, such as, for example, Germany, using identification documents native to that country (e.g., German identification documents). For example, a European Union identification card can be used instead of a social security card for purposes a creating a German user's total identification score. However, the meaning of the total identification score and/or the meaning of the CONFIDENCE FACTOR™ does not change for different geographical regions. For example, when a total identification score of 70 is assigned to a user in the United States, if the same total identification score is assigned to a user in Germany, these two users are considered to be completely equal in their level of identity. Thus, if the two users with equal total identification scores travel to another country, such as India, their identification scores represent a level of identity that is equal to an Indian resident with a total identification score of 70. According to exemplary embodiments, then, the
identity card 145 can be used as a type of “global identification card.” As such, a foreign user traveling in the United States and having a total identification score of 70 can be treated equally to a United States citizen with a similar total identification score, regardless of the nationality of the foreign user. For example, providing the user'sidentity card 145 along with a check as a form of payment can ensure that the transaction is treated equally, regardless of where the user originates from and from which country the check is issued. Since the level of identity of a user can be uniformly ascertainable throughout the world according to exemplary embodiments, any transaction can be performed anywhere as safely as if it were performed in the user's native country. - In addition, since the
identity card 145 can be associated with any form of identification or financial information, the usage of theidentity card 145 anywhere in the world can be tracked for the user and logged for immediate or later access through theidentity management system 100. Consequently, the user can track the usage of theidentity card 145 in different geographical locations, thereby providing the user with a global record of not only the use of the user's identity and identification information, but also the user's financial information. Other characteristics or behavior of the user can be tracked in such a manner. For example, as theidentity card 145 is used for purposes of travel (e.g., as theidentity card 145 is swiped or otherwise recorded at identity checkpoints, such as airports or other like points of embarkation and disembarkation), a record of the user's travel can be maintained. Thus, a user's travel, both nationally and internationally, can be monitored and logged, thereby allowing the user to track travel with theidentity card 145 in different geographical locations. Other such characteristics or behavior can be tracked using theidentity card 145. - According to an exemplary embodiment, the
identity management system 100 can be based on a distributed model that allows users to maintain and host their identity and related information according to a Global Identification Number (GIN). The GIN can be any suitable form of alpha-numeric or other identifier that is capable of uniquely identifying a user. The distributed model can be implemented through a service called, for example, Global Identity Services (GIS), as discussed below. The GIS can allow both authoritative and non-authoritative hosting of data and perform information routing based on the GIN. - As used herein, an “authoritative organization” is an entity or other user whose purpose is to securely maintain identity and identity-related data and information that is globally accessible by other entities. The data and information maintained by the authoritative organizations is trusted by other users and is accepted by any user that “joins” or otherwise uses the
identity management system 100. Each of the authoritative organizations would be required to obtain an organizational GIN (OGIN). - As used herein, a “non-authoritative organization” is any other entity or user that chooses to provide limited or no access to identity and identity-related data and information, for example, to maintain the privacy or confidentiality of the data. Such non-authoritative organizations do have the ability to obtain data from (authoritative) partners through the GIS. However, the non-authoritative organizations would not be required to obtain an organizational GIN, unless they choose to share their identity and identity-related data and information with another organization.
- According to exemplary embodiments, a primary function of the GIS is to provide a routing mechanism for data stored in various locations.
FIG. 7 is a diagram illustrating information routing for GIS, in accordance with an exemplary embodiment of the present invention. When an entity requests services (e.g., retrieval of identity information or the like) associated with theidentity management system 100, the request is first routed to the Local GIS (LGIS)server 705. If no LGIS server exists, the request is directly sent to the Primary GIS (PGIS) server(s) 710. Otherwise, if anLGIS server 705 exists, and this server can satisfy the request (e.g., the identity information resides on that LGIS server 705), the request is immediately fulfilled. If theLGIS server 705 cannot satisfy the request (e.g., the identity information does not reside on that LGIS server 705), the request is forwarded to one of thePGIS servers 710. ThePGIS server 710 processing the request finds the Authoritative GIS (AGIS)server 715 associated with the request and sends the request to that server. TheAGIS server 715 satisfies the request by, for example, retrieving and returning the requested information to the requesting entity. If the information is not located at the specifiedAGIS server 715, an error or other like indication can be returned to the requesting entity (e.g., to indicate that the identity information cannot be located or otherwise retrieved). The LGIS server(s) 705,PGIS servers 710 andAGIS servers 715 can communicate with each other any suitable type of network or computer connection. - According to an additional exemplary embodiment, the
identity management system 100 can conform to and is compatible with the Federation model. A Federation is an association of organizations that come together to exchange information as appropriate regarding their users and resources to enable collaboration and transactions. For example, members of a Federation can easily integrate and use all or parts of the identity management system 100 (or corresponding commerce platform or e-commerce platform) that can enable them to use the services offered by such platforms. -
FIG. 8 is a diagram illustrating theidentity management system 100 distributed platform model, in accordance with an exemplary embodiment of the present invention. InFIG. 8 , abank 805 is a participating bank that can be responsible for holding the identification information of amember 810. Themember 810 is an individual or entity who desires to have their identity protected. Anidentity specialist 815 is, for example, a bank agent or the like specially trained to assist themembers 810 in creating their global identification account. A local institution global identity (GID)system 820 can include a licensed GID appliance and platform which thebanks 805 can use to store identity information ofmembers 810. The GID appliance can be connected to a GID main processing androuting system 830 so that it can be located by otherlocal GID systems 820. A local main processor androuting system 825 is the main routing system that can control the localinstitution GID systems 820. Themain GID system 830 is the global center for all connections between the localinstitution GID systems 820 and thebanks 805. Theusers 835 are institutions or the like that can request access to information associated with amember 810 through the network. -
FIG. 9 is a diagram illustrating an exemplary architecture for theidentity management system 100 platform, in accordance with an exemplary embodiment of the present invention. For a client to have their identity protected, the client can visit thebank 805 and meets with a bank agent, such as anidentity specialist 815, who can assist the client in creating their identity account (and credit card account) to become amember 810. Once the account is created in thebank 805, themember 815 can then use theidentity management system 100 to manage their identity account (and/or credit account). Once an account has been configured, themember 815 then can use theidentity card 145 to provide access to theusers 835 or other institutions to information stored in that account. - The information can be accessed in one of several ways. For example, the
member 810 can visit a participating merchant. If themember 810 wishes to open an account with the merchant, instead of writing all of the information on the account application, themember 810 can swipe theiridentity card 145 and enter the corresponding PIN assigned to theidentity card 145. The merchant can send the information provided by theidentity card 145 and PIN to the network, which can be routed to the GID main processor (e.g., GID main system 830). The GID main processor can use the account information to retrieve and decrypt the relevant identity information and encrypt it with the participating merchant's key. The encrypted identity information can be communicated from the GID main processor to GID transactional processing (e.g., local main processor and routing system 820) for the participating merchant. The participating merchant can then use its log-in or other unique identifier to access the identity information to complete the account application. In case the participating merchant cannot access a card swiping system or if the system is off-line for some reason, themember 810 can use an automated voice response (VRU)system 905, a live customer service center or the like to authorize the transfer of identity information. The merchant can also access the voice response system or customer service center to obtain the identity information (with the authorization of the member 810), in case theidentity management system 100 is not available through the direct connection. - Those of ordinary skill in the art will recognize that the
identity management system 100 can be implemented in a variety of ways. According to one exemplary embodiment of the present invention, a secured databank and system can be created by which the identity of individuals or businesses can be managed and accessed. Initial access by the user to the system can be through a bank or other trusted local organization or entity. For example, an identity theft specialist at the bank can receive users who want to subscribe to this system. At the bank, the identity theft specialist can first educate the customer on theidentity management system 100. Following the education session, the identity theft specialist can ask the user for identification papers, such as a social security card, birth certificate, driver's license, proof of residency (passport, Green Card), proof of domicile, or the like. After examining the paperwork, the identity theft specialist can login to the identity management system 100 (e.g., through graphical user interface 170) to create a unique user number. - After the user number has been assigned, the user can create a PIN. Selection of the PIN can be done by the user without any access by the identity theft specialist. The user must memorize the PIN. For example, if the PIN is lost or forgotten, the user must return to, for example, the bank to have the PIN reset. The
identity management system 100 can then create an identity account for that user. The user can also create, for example, a Global Credit Card account or the like, as discussed previously, to allow identity management on a global basis. The user will, for example, have an audit trail of all or substantially all of the transactions that occur on the Global Credit Card account and the associated stored cards. Coupled with the alert system, the user can track any transaction charged to their account. If created, a separate card with a credit card number can be issued to the user. The user can program, for example, all of the user's credit card accounts onto this card through access to the identity management system 100 (e.g., via graphical user interface 170). The user can additionally limit the use of each credit card (or other cards) by placing limits or other restrictions on each card, as discussed previously. Anidentity card 145 holding the unique user number can be mailed to that user's address (or to the bank, if user wishes). - Using the Internet or the World Wide Web, the user can then have access to the user's identity and credit card accounts maintained by the
identity management system 100. Initially, when the user logs in to their account, the user can use the card number for a login name and the PIN for a password. However, once access to the user's identity account in theidentity management system 100 has been obtained, the user can change their login name password to any unique login name and password. - Through the identity account, the user can have many options. For example, the user can receive alerts, for example, regarding their identity use or improper uses thereof. The user can receive requests for identity authorizations, such as, for example, requests for the use of the user's identity. The identity account can also allow the user to monitor identity account activity, monitor credit card activity, make and/or receive credit card payments, and any other identity- and financially-related transactions, such as, for example, prepaid cards, gift cards, debit cards, ATM cards and the like. As discussed previously, the
identity management system 100 can also allow the user to input credit card information. For each credit card number, the user can choose a unique PIN, with the PIN for each credit card being different from the PIN used for identity access purposes. Consequently, the user need only carry a Global Identity Credit Card (e.g., identity card 145) instead of several different cards, such as, for example, credit cards, debit cards, gift cards, ATM cards and the like. For example, once at the Point-of-Sale, the Global Identity Credit Card can be used along with the PIN associated with one stored credit card to make transactions with the given credit card transaction. However, as discussed previously, the user can user one or more credit cards for the transaction, based on the sequence of PIN numbers entered. However, the vendor will not have access to the actual credit card number. - The
identity system management 100 can also support ACH/EFT (Automatic Clearing House/Electronic Funds Transfer). An alert system can be associated with the use of the Global Identity Credit Card and the associated stored cards. For example, when a purchase takes place, an alert can be sent to the user's alert receiving device (e.g., mobile phone, PDA, e-mail or the like) about the occurrence of a transaction. Such an alert can further include suitable accompanying information, such as, for example, amounts, merchant identification, location and other like information. - For example, when applying for a mobile phone plan, the user can use the Global Identity Credit Card number. By entering the PIN associated with the identity of user and the credit card for the transaction, the user can authorize the
identity management system 100 to reveal required identity and financial information to the business, for example, once or for a limited time. To ensure identity protection, authorized persons at the business or stationed at the headquarter of the mobile phone company can have viewing privileges for the identity and financial information, but their access is recorded. Theidentity management system 100 can also provide credit status to a requesting party as well. For example, theidentity management system 100 can establish a network or computer connection to a credit reporting agency to retrieve a user's credit report. Each time a credit report is retrieved from the credit reporting agency, the corresponding credit history, credit score and the access can be recorded for the user to review. - According to an exemplary embodiment, credit card transactions can go through the
identity management system 100. Consequently, limits on the credit card(s) can be applied and each transaction can be recorded, thereby ensuring the identity and financial safety of each transaction. For places where inputting a PIN is not feasible, a default system can be available. For example, when no PIN is entered, a specified default credit card can be charged. Using theidentity management system 100, restrictions such as, for example, amount, geographic or vendor type, can be placed on the default credit card. For example, the default credit card without a PIN could only be used in, for example, restaurants. - Additionally, a CONFIDENCE FACTOR™ can also be assigned to each user. For example, the longer the user remains with the
identity management system 100, and based on the authenticity of the documents the user presented to the identity theft specialist at the bank, the user's CONFIDENCE FACTOR™ can be increased. As noted previously, the CONFIDENCE FACTOR™ can be used as an additional or alternative measure of the validity of a user's identity. - Following the establishment of an identity with the
identity management system 100, users can engage in trade with businesses or perform any other suitable transaction in which identity is a component. For example, for online transactions, a one-time use PIN can be generated for a credit card maintained in theidentity management system 100, thereby not comprising the original PIN. To ensure identity safety, the one-time use PIN can be retrieved fromidentity management system 100 during the online transaction (e.g., at time of payment). Alternatively, upon request, a PIN can be generated periodically (e.g., at predetermined intervals) for a user and sent to, for example, the mobile phone, PDA, pager, e-mail address or the like of the user. The user then does not need to access theidentity management system 100 each time a one-time use PIN is required. - The
identity management system 100 can also functions as a fund transfer system for, for example, on line auctions or other transactions. For example, buyers and sellers can communicate through theidentity management system 100 and transfer funds by credit card or check, because the identity of each user is established and verified in theidentity management system 100. If users provide or otherwise authorize distribution of their CONFIDENCE FACTOR™ to other users, the CONFIDENCE FACTOR™ can also assist in the decision making of each party. - According to exemplary embodiments, any or all information maintained or otherwise stored in, for example, databases in the
identity management system 100 can be encrypted using any suitable encryption technique. According to an exemplary embodiments, information and data stored in theidentity management system 100 databases can be stored using a double encryption system. A double encryption system operates in a manner similar to a safety deposit box, where the owner of the box has one key and the bank has another and both keys are required for the information to be unlocked. - For example, the identity information stored in the
identity management system 100 database can be encrypted by a first key that theidentity management system 100 maintains, and also by a second key that the user maintains. Both encryption keys would be needed before the identity information can be decrypted and viewed. Such encryption can ensure that the data stored will be secure from hackers and other malicious attacks. Such encryption techniques can further ensure that even if the information or data was hacked, such information could not be decrypted without the presence of both theidentity management system 100 key and the user's key. Additionally, the key maintained by theidentity management system 100 can also change per record or otherwise periodically to ensure further security. - According to an exemplary embodiment of the present invention, the
identity management system 100 can also be used for e-commerce transactions or other purchase transactions. Theidentity management system 100 can include a transactionorder generation module 150 in communication with, for example, the total identificationscore generation module 115. The transactionorder generation module 150 can be configured to generate a transaction or purchase order using the total identification score of the user. For example, before making a purchase, either online or in person, the user can generate a transaction order using the transaction order generation module 150 (e.g., by logging into theidentity management system 100 and making such a request). When making a purchase, instead of using its credit card and personal information, the user can submit the transaction order to perform the transaction. The merchant or other third party can then use the transaction order to gain access to the total identification score, financial information (e.g., credit card number) and personal information (e.g., billing address of the user) to complete the transaction in the manner discussed previously on behalf of the user. - For example, the transaction order can contain an identity access authorization code by which the third party can gain access to the
identity management system 100 to retrieve the relevant information. As noted previously, the user can specify different types of restrictions on the use of the user's information maintained by theidentity management system 100. Thus, when generating the transaction order, the user can specify, for example, that the transaction order can only be used by a certain third party to perform a certain type of transaction. The third party would then only be able to access the information to which the third party has been restricted. According to an exemplary embodiment, the information retrieved by the third party is maintained by the third party temporarily to conduct the transaction, but then discarded after the transaction is complete. Alternatively or additionally, temporal restrictions can be placed on the information retrieved by the third party using the transaction order, thus limiting the amount of time by which the third party can successfully access and use the user's information. Additionally, once an identity access authorization code is entered by the third party, the third party can be restricted to receive only the funds authorized for the transaction. Thus, theidentity management system 100 can be used to conduct the actual transaction on behalf of the third party. - For example, assume that a user navigates a web browser to a website to make a purchase. When ready to enter payment information, instead of a credit card number or the like, the user can enter the number of its
identity card 145 and an accompanying pass code. Once the “submit payment” button is clicked, the website can send the information to theidentity management system 100. Theidentity management system 100 can then verify the payment information associated with theidentity card 145 and pass code, including all of the rules specified for the use of the particular form of payment (other types of verification can also be performed, such as verifying that sufficient funds are available for the form of payment). Once verified, the manager or other proprietor of the website can receive an authorization number that can be used to receive the payment from the identity management system 100 (e.g., through an electronic funds transfer or the like). - According to an alternative exemplary embodiment, another means by which a purchase (for example, POS, on-line, telephonic or the like) can occur using the
identity management system 100 is referred to herein as an “Automated Pre-Authorization.” In such an alternative exemplary embodiment, theidentity management system 100 can be referred to as a “Global Identity (GID) system” that can be used in conjunction with a “GID network.” Such an alternative embodiment can be used to facilitate and secure purchases such as, for example, on-line purchases and the like, and can be based on the “Purchase Order” (PO) concept. For example, to integrate their on-line payment processing system and to become a member, on-line merchants can download an Application Programming Interface (API) from theidentity management system 100. Alternatively, the on-line merchant can “officially” register withidentity management system 100 to obtain a unique key and certificate, including a set of Application Programming Interfaces (APIs). Such APIs can enable the merchant to create a unique encrypted key based on the information gathered from the client. Various appropriate criteria can be used by the API to create the unique encrypted key, such as, for example, the merchant name, the total invoice amount and other like criteria. Officially registered and un-officially registered merchants can be differentiated for the users by, for example, identity score, CONFIDENCE FACTOR™ or risk factor and the customer can be made aware of the merchant's identity. Such an Automated Pre-Authorization process can be illustrated with the following examples. -
FIGS. 10A and 10B are flow diagrams illustrating atransaction 1000 using an automated pre-authorization process for theidentity management system 100 without using a one-time card number, in accordance with an exemplary embodiment of the present invention. As illustrated inFIG. 10A , thetransaction 1000 can involve avendor 1002, acart 1004, aclient 1006, anAPI 1008 and the identity management system 1010. Instep 1012, thevendor 1002 may or may not sign up with the GID network. Instep 1014, thevendor 1002 can download the GID e-commerce API. Instep 1016, thevendor 1002 can integrate the GID e-commerce API into the e-commerce website of thevendor 1002. Instep 1018, theclient 1006 can register for a GID card (e.g., identity card 145). Instep 1020, theclient 1006 can store their other cards in association with their GID card using theidentity management system 100. - For purposes of illustration and not limitation, assume that in
step 1022 theclient 1006 navigates a suitable web browser to a website of thevendor 1002 to make a purchase (these examples are also applicable to, for example, at POS self-checkout counters). Instep 1024, the client can make any and all required purchases and then prepare for checkout. When ready to enter payment information, instead of a credit card number or the like, instep 1026, theclient 1006 can enter the number of itsidentity card 145, name, billing address, and other like information. Instep 1028, thevendor 1002 can recognize the entered number as anidentity card 145 number that belongs to theidentity management system 100, and thecart 1004 of thevendor 1002 can pass the cart information to theAPI 1008. Instep 1030, theAPI 1008 can return a unique URL to thevendor 1002. Instep 1032, thecart 1004 of thevendor 1002 can present a link or button to theclient 1006 called, for example, “Pre-Authorize Order.” Instep 1034, theclient 1006 can click on the “Pre-Authorize Order” link to pre-approve the on-line transaction and access his/her stored credit cards maintained on the identity management system 100 (e.g., where the user has stored his/her credit cards with restrictions applied to them, and the like). Instep 1036, theclient 1006 can securely log onto theidentity management system 100. The secured login process can include, for example, User ID, pre assigned security questions, encryption keys, pre-assigned pictures, passwords and the like. - Continuing in
FIG. 10B , instep 1038, the transaction information can be retrieved by theidentity management system 100 and verified from the presented link. Instep 1040, the pre-authorization can be presented to theclient 1006. Instep 1042, theclient 1006 can choose to assign the transaction to theidentity card 145 or another credit card registered with the system. Instep 1044, theclient 1006 can submit the pre-approval by clicking on, for example, an “Approve” link or button. Instep 1046, theidentity management system 1046 can store the pre-authorization information in the system. Instep 1048, theclient 1006 can exit the identity management site and return to thecart 1004. Instep 1050, theclient 1006 can complete the purchase through thevendor 1006 site by clicking on a, for example, “Submit Order” button or the like. Instep 1052, the transaction request can be transferred from thecart 1004 through the network to the identity management system 100 (which supports the transaction). Instep 1054, theidentity management system 100 can receive the transaction. Instep 1056, the transaction can be matched against the pre-authorization transaction. From thedecision step 1058, if the transferred transaction matches the pre-approved transaction (including any the limitations and filtrations such as time, geography, and the like), the transaction can be approved instep 1060 and the results can be sent back to thevendor 1002. Otherwise, instep 1062, the order or transaction can be rejected and theclient 1006 can be given an opportunity to repeat the process. -
FIGS. 11A and 11B are flow diagrams illustrating atransaction 1100 using an automated pre-authorization process for theidentity management system 100 using a one-time card number, in accordance with an exemplary embodiment of the present invention. As illustrated inFIGS. 11A and 11B , the flow of thetransaction 1100 can follow the steps 1012-1044 ofFIGS. 10A and 10B . However, afterstep 1044 inFIG. 11B , instep 1105, theidentity management system 100 can generate a one-time use credit card number or the like. In other words, instep 1042, theclient 1006 can choose which card to charge the transaction to, and theclient 1006 can also select to have a one-time temporary credit card number to be generated. Instep 1105, theidentity management system 100 can then generate a one-time use, temporary credit card number (including, for example, expiration and CVV numbers) or other suitable payment information for theclient 1006. The flow oftransaction 1100 can continue withsteps FIG. 10B . However, instep 1110 afterstep 1048, theclient 1006 can copy or otherwise enter the generated one-time use credit card number in the credit card number field of thevendor 1006 site (or it can be entered automatically by the system). Thetransaction 1100 can then be completed in steps 1052-1062 in the manner discussed previously with respect toFIG. 10B . Once thetransaction 1100 is completed, the one-time use credit card number becomes invalid and no longer usable in future transactions. - For Point-of-Sale (POS) transactions, assume that a user goes to the POS to purchase an item. If the user uses the
identity card 145, the user can receive a request in the form of, for example, a call on his/her mobile phone (PDA, or any other electronic device) from theidentity management system 100. The request can provide the user with a choice of approving or not approving the transaction. For example, in the case of the request going through a mobile phone, the user can enter “1” for approving transaction and “2” for declining transaction. If the user chooses to approve the transaction, the transaction request can then transferred through the network to theidentity management system 100. If the transferred transaction matches the pre-approved transaction (including any limitations and filtrations such as time, geography, and the like), the transaction can be approved and the results can be sent back to the merchant. - The
identity management system 100 can be used as a commerce or e-commerce platform that can provide users and/or merchants per transaction insurance coverage.FIG. 14 is a diagram illustrating insurance coverage using theidentity management system 100, in accordance with an exemplary embodiment of the present invention. The per transaction insurance coverage can include asuitable insurance underwriter 1405, theidentity management system 100, avendor 1410 and aconsumer 1415. Instep 1420, theidentity management system 100 in conjunction with theinsurance underwriter 1405 can underwrite the per transaction activity. A per transaction insurance coverage can be calculated in many different ways. For example, the coverage and rates can be based on the number of transactions theconsumer 1415 makes, the number of transactions avendor 1410 receives, the dollar amount of the transaction, the fraud risk associated with the purchased item, the fraud risk associated with theconsumer 1415 habits, and other like information. The purpose of the insurance can be for, for example, identity theft fraud, credit card fraud, damaged merchandise, or the like. For example, theidentity management system 100 can be underwritten by an insurance company to provide per transaction insurance toconsumers 1415 and/orvendors 1410. If theconsumer 1415 uses theidentity card 145 for identity verification and/or for another transaction at or with thevendor 1410, the given transaction can be insured by theidentity management system 100. For being insured, a suitable fee can be charged to every transaction. Such a fee can be paid by thevendor 1410 and/or theconsumer 1415. Alternatively, neither party pays such a fee and the cost can be offset by other income, charges, fees, or the like. - For example, in
step 1425, theconsumer 1415 can purchase an item (e.g., on-line or POS) from thevendor 1425. Instep 1430, thevendor 1410 can submit the transaction to theidentity management system 100. Instep 1435, theidentity management system 100 can authorize and/or insure the transaction, based suitable criteria. Instep 1440, thevendor 1410 can receive the response to the transaction submission, along with, for example, an authorization number. Instep 1445, theconsumer 1415 can be provided with a receipt (e.g., a paper receipt or electronic notification). Instep 1450, if the transaction was insured, a deposit can be made to theinsurance underwriter 1405 for the transaction. Instep 1455, the insurance underwriter can reimburse theidentity management system 100 for the cost of the insurance coverage. Instep 1460, theidentity management system 100 can reimburse thevendor 1410 against back charges, such as, for example, for the insurance coverage if paid by thevendor 1410. - At any of
steps step 1470. For example, either theconsumer 1415, thevendor 1410 or theidentity management system 100 can determine that a fraud has occurred (e.g., an unauthorized charge made on a credit card) in any suitable manner. If a fraud has occurred, then theidentity management system 100 can be appropriately notified instep 1475. Theidentity management system 100 can reimburse the vendor against any, all or none of the back charges instep 1460. Instep 1465, theidentity management system 100 can suitably cover any, all or none of the costs associated with the theft or fraud associated with theconsumer 1415. - Certain business sectors can benefit greatly from the
identity management system 100, especially from the commerce and the e-commerce platforms according to exemplary and alternative exemplary embodiments thereof. For example, on-line gambling and on-line adult entertainment sites are presently being sanctioned by many credit card issuing entities because of, for example, general negative public opinion regarding these industries and increased risk of fraud. For these reasons and others, many credit card issuing companies can block the Merchant Category Codes (MCCs) of these businesses.FIG. 15 is a diagram illustrating on-line gambling transactions with theidentity management system 100, in accordance with an exemplary embodiment of the present invention. As illustrated inFIG. 15 , if aconsumer 1505 attempts to use a non-GID credit card (e.g., a credit card not associated with the identity management system 100) for an on-line gambling company 1510 (see flow 1525), the MCC of the on-line gambling company 1510 would be passed to the credit card issuing entity 1515 (see flow 1530). However, the creditcard issuing company 1515 can deny the transaction, because the MCC of the on-line gambling company 1510 is blocked (see flow 1535). - However, according to exemplary embodiments, when a transaction passes through the
identity management system 100, the MCC of theidentity management system 100 can be used instead of that of the vendors. Therefore,consumers 1505 can use their credit cards without unwanted restrictions. For example, assume that theconsumer 1505 visits an on-line merchant (e.g., on-line gambling company 1510) whose MCC is blocked by theconsumer 1505 creditcard issuing entity 1515. If theconsumer 1505 uses their Global Identity Credit Card (e.g., identity card 145) (see flow 1540) to, for example, subscribe to an on-line gambling site, the MCC that will be presented to the creditcard issuing entity 1515 will be the MCC of theidentity management system 100. For example, the on-line gambling company 1510 can communicate the transaction information with the identity management system 100 (see flow 1545). Theidentity management system 100 can then pass the transaction information and the MCC of theidentity management system 100 to the credit card issuing entity 1515 (see flow 1550). Approval for the transaction can then be passed back from the creditcard issuing entity 1515 to the identity management system 100 (see flow 1555), and from theidentity management system 100 to the on-line gambling company 1510 (see flow 1545) to complete the transaction. Because the MCC of theidentity management system 100 would not be blocked, the transaction can occur and be processed. Additionally and as described above, by using theidentity management system 100, the user can enjoy a high level of security. Because users can manage, control and set restrictions on their stored accounts, the users can substantially reduce the incidence of credit card and/or identity fraud. - A further example of Automated Pre-Authorization can occur when there are no system registration requirements and each financial entity can provide the Automated Pre-Authorization to their clients.
FIGS. 12A and 12B are flow diagrams illustrating atransaction 1200 using an automated pre-authorization process for theidentity management system 100 without registration and without using a one-time card number, in accordance with an exemplary embodiment of the present invention. In such a scenario,vendors 1002 can download and integrate the appropriate e-commerce APIs into their commerce websites, as discussed with respect steps 1012-1016 ofFIGS. 10A and 11A . In addition, instep 1215, a creditcard issuing entity 1210 can become a member of theidentity management system 100. Instep 1220, the creditcard issuing entity 1210 can integrate theidentity management system 100 into their systems. - For purposes of illustration and not limitation, assume that the
client 1006 of the member creditcard issuing entity 1210 shops on-line. The transaction can continue in the manner discussed in steps 1022-1034 with respect toFIGS. 10A and 11A . In other words, at the check-out page,client 1006 can enter their GID card number (this time issued by the credit card issuing entity 1210) to use the transaction Pre-Authorization. Thevendor 1002 can recognize the GID card number and can send the information to the GID API. The GID API can send the vendor a unique URL to present the Pre-Authorization link to the client 1006 (the link can be either pre-stored in the API or the API can be configured to request the link from a secure connection to the identity management system 100). Once theclient 1006 clicks on the Pre-Authorization link, in a new or separate window, theclient 1006 can follow a secure login protocol to reach the identity management system 100 (through the credit card online management system of the credit card issuing entity 1210). In other words, instep 1225, theclient 1006 can securely log into the credit card online management system of the creditcard issuing entity 1210. The transaction information can be retrieved and verified from the presented link, as discussed with respect to step 1038 illustrated inFIGS. 10B and 11A . Instep 1230, the pre-authorization can be presented to the client from the credit card online management system of the creditcard issuing entity 1210. Indecision step 1235, a determination can be made as to whether the creditcard issuing entity 1210 has the capability to handle multiple credit cards for eachclient 1006. If so, then instep 1042, theclient 1006 can choose the card to which they would like the transaction charged. - In
FIG. 12B , the flow continues to step 1044 if either the credit card issuing entity has no multi-card capability or ifstep 1042 is successfully completed. The process can then continue in steps 1046-1062 in the manner discussed previously with respect toFIGS. 10B and 11B . Thus, the submitted order can be cross referenced with the information stored at theidentity management system 100 to verify the pre-authorization. The order or transaction can then be verified or rejected based on whether there is a match with the pre-authorization information stored at theidentity management system 100. -
FIGS. 13A and 13B are flow diagrams illustrating atransaction 1300 using an automated pre-authorization process for theidentity management system 100 without registration but using a one-time card number, in accordance with an exemplary embodiment of the present invention. Thetransaction 1300 proceeds with steps 1012-1034 in the manner discussed previously with respect toFIGS. 10A , 11A and 12A. However,steps transaction 1300, as no registration takes place by the creditcard issuing entity 1210. The flow oftransaction 1300 then proceeds throughstep FIG. 12A . InFIG. 13B , the flow oftransaction 1300 continues throughsteps FIG. 11B . However, instep 1310, the one-time use credit card is shown or otherwise presented to theclient 1006 through, for example, the credit card online management system of the creditcard issuing entity 1210. In other words, after theclient 1006 chooses a credit card to be applied to the transaction, the creditcard issuing entity 1210 of theclient 1006 can provide theclient 1006 with a one-time use temporary credit card number that theclient 1006 can use to apply to the transaction. The client can take the temporary credit card number and enter it in the appropriate space on thevendor 1006 check-out page (or it can be entered automatically by the system) and click on the submit link to finalize the transaction. The flow oftransaction 1300 can then proceed throughsteps FIG. 11B , so that the order or transaction can then be verified or rejected based on whether there is a match with the pre-authorization information stored at theidentity management system 100. - According to an alternative exemplary embodiment, although purchase transactions submitted to the
identity management system 100 can be automatically processed by the system based on one or more predetermined rules, purchase transactions can be submitted to theidentity management system 100 for queuing and manual processing. For purposes of illustration and not limitation, assume a user purchases audio compact discs (CDs) through a catalog, where the company selling the CDs requires that the user buy an additional five CDs every month for six months. According to the alternative exemplary embodiment, the user can put a manual hold on this purchase transaction and review the transaction manually through theidentity management system 100 before allowing the merchant to charge the credit card or other form of payment. Thus, the user can be assured that the correct amount for the transaction is being deducted at the correct time. However, such a process can also be automated through an appropriate rule set, such as, for example, where any transactions conducted by this merchant can be restricted to a certain amount per month per charge for a maximum of six months. - The
identity management system 100 of the present invention can also be used to combat mail fraud to which the user may fail prey. Referring toFIG. 1 , according to exemplary embodiments, theidentity management system 100 can include an address identificationcode generation module 155 in communication with, for example, the total identificationscore generation module 115. The address identificationcode generation module 155 is configured to generate an address identification code associated with an address of the user. For example, a user of theidentity management system 100 can establish an address (e.g., the user's home address) and theidentity management system 100 will generate a unique address identification code associated with that address. The address identification code can be any suitable number (e.g., a random number, code or the like) that uniquely identifies a user and the user's associated address. For example, if the user's home address is 123 Street, Smith City, Va. 12345, the address identificationcode generation module 155 can generate a unique address identification code such as, for example, 187653 that represents the user's address. The address identification code and an address of a communication reception center (e.g., a generic mail processing center) can be given to a third party. For example, the address information could be 123 Processing Street, Box 187653, New City, Utah 54321, in which the address identification code forms the box number of the address of the communication reception center. Any communications sent to the user at that address by the third party are received at the communications reception center. - Once the communications or other mail are received by the communication reception center, the communications can be scanned or otherwise entered into the
identity management system 100 and made available to the user associated with the address identification code. For example, theidentity management system 100 can include acommunication display module 160 in communication with, for example, the total identificationscore generation module 115. Thecommunication display module 160 is configured to format the communications for display to the user associated with the address identification code (e.g., through the graphical user interface 170). Thus, the user can be notified of incoming mail (e.g., through electronic notification, such as e-mail) and access its mail, for example, remotely over the Internet by logging into theidentity management system 100 and retrieve any and all communications received at the communication reception center. - Furthermore, instead of sending confidential material to the user through the mail (e.g., credit card statements, bank statements and other the like confidential material), the respective financial or other like institutions can access the
identity management system 100 and enter such information into the system. Consequently, the user can access its financial statements and other confidential information directly from theidentity management system 100, without the need to generate postal mail. In this manner, confidential communications can be sent to the user in a secure manner, without fear that such mail could be stolen from, for example, the user's mailbox. Such an advantage is particularly important where an identity thief could steal a credit card statement from a user's mailbox and use the information contained within the credit card statement to create another credit card for illegal use by the identity thief. - Identity theft threatens every societal and economical sector. Healthcare is not immune from this threat. According to an exemplary embodiment of the present invention, the
identity management system 100 can also be used to prevent healthcare identity theft. For example, a patient can go to the healthcare provider. To register the patient for the first time, the administrator can enter the patient's drivers license or other unique identifying documentation into theidentity management system 100, as well as any other required patient's personal information, billing information, scheduling and the like. For healthcare providers, access toidentity management system 100 can be granted to authorized administrators. Each authorized administrator can have a unique PIN for accessing identity information in theidentity management system 100. However, all accesses can be recorded and logged for security purposes. Theidentity management system 100 can be integrated with other suitable systems to retrieve, for example, other healthcare-related information and the like. - If the patient does not have a drivers license or other identifying documentation, a unique identifying number can be assigned to the patient that is maintained by the
identity management system 100. The identifying number can be associated with an appropriate barcode. The identifying number and barcode can be placed on a card for the patient to maintain. During future visits, the patient can present the card to sign-in with the healthcare provider. The patient's identification information and healthcare information can be maintained securely in theidentity management system 100. Consequently, secure identity information will not have to be included in the patient's physical or electronic files. The patient's physical file can be assigned a barcode that correlates to the patient's unique identifying number to allow for easy retrieval from the healthcare provider's file room. The healthcare provider can then store patient files without concerns for information theft. Such a system can also place the healthcare providers in compliance with HIPAA regulations, because the patient's secure identity information has been removed from the files, thereby preserving patient identity privacy. - The
identity management system 100 can include an identity riskfactor generation module 165 in communication with, for example, the total identificationscore generation module 115. The identity riskfactor generation module 165 is configured to generate an identity risk factor associated with the user. According to exemplary embodiments, the identity risk factor is associated with a level of risk of theft of the identity of the user by identity thieves. For example, the identity riskfactor generation module 165 is configured to determine the exposure of a user's identity by analyzing such factors as, for example, the number and types of uses of the user's identity. For example, if a user uses its identity to perform numerous online purchases with companies located in certain third world countries, the identity riskfactor generation module 165 can determine that the level of risk of theft of the user's identity is high, and can generate a correspondingly high identity risk factor. However, if a user uses its identity only sporadically to apply for credit with reputable financial institutions, the identity riskfactor generation module 165 can determine that the level of risk of theft of the user's identity is low, and generate a correspondingly low identity risk factor. Thus, by analyzing the pattern and types of uses of a user's identity (e.g., as maintained by the log module 135), the identity riskfactor generation module 165 can generate an appropriate identity risk factor. The user can then use the identity risk factor to reduce its exposure to potential identity theft by, for example, modifying the manner and types of uses of the user's identity. - The
identity management system 100 can also include any suitable type ofgraphical user interface 170 configured to provide access to, either locally or remotely, and management of identification information associated with the user. Thus, thegraphical user interface 170 can be, for example, any suitable Web browser that can support secure connections and remote access to theidentity management system 100. Thegraphical user interface 170 can be displayed on any suitable computer display or monitor capable of displaying graphical and/or textual information to a user and which allows a user to enter information (e.g., commands, information and the like) through, for example, a keyboard, a touch-screen, any type of pointing device, electronic pen, and the like. Thegraphical user interface 170 can be used by the user to access, control and manage any and all of the functionality of theidentity management system 100, including viewing and managing the user's identity profile, viewing identity reports, and the like. - Each of modules of
identity management system 100, including identificationscore assignment module 105, total identificationscore generation module 115, accesscode generation module 125,data transmission module 130,log module 135,report generation module 140, transactionorder generation module 150, address identificationcode generation module 155,communication display module 160 and identity riskfactor generation module 165, or any combination thereof, can be comprised of any suitable type of electrical or electronic component or device that is capable of performing the functions associated with the respective element. According to such an exemplary embodiment, each component or device can be in communication with another component or device using any appropriate type of electrical connection that is capable of carrying electrical information. Alternatively, each of the modules ofidentity management system 100 can be comprised of any combination of hardware, firmware and software that is capable of performing the function associated with the respective module. In addition,communication link 133 can be comprised of any suitable type of communication medium or channel capable of transmitting and receiving electrical information. - Alternatively, the
identity management system 100 can be comprised of a microprocessor and associated memory that stores the steps of a computer program to perform the functions of the modules of theidentity management system 100. The microprocessor can be any suitable type of processor, such as, for example, any type of general purpose microprocessor or microcontroller, a digital signal processing (DSP) processor, an application-specific integrated circuit (ASIC), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically-erasable programmable read-only memory (EEPROM), a computer-readable medium, or the like. The memory can be any suitable type of computer memory or any other type of electronic storage medium, such as, for example, read-only memory (ROM), random access memory (RAM), cache memory, compact disc read-only memory (CDROM), electro-optical memory, magneto-optical memory, or the like. As will be appreciated based on the foregoing description, the memory can be programmed using conventional techniques known to those having ordinary skill in the art of computer programming. For example, the actual source code or object code of the computer program can be stored in the memory. -
FIGS. 2A-2C are flowcharts illustrating steps for verifying an identity of a user, in accordance with an exemplary embodiment of the present invention. Instep 201 ofFIG. 2A , at least one source of identification of the user is received. According to exemplary embodiments, the at least one source of identification can comprise a driver's license of the user, a birth certificate of the user or the like. The identification score assigned to each of the at least one source of identification is based upon a reliability of the at least one source of identification. Instep 204, an identification score is assigned to each of the at least one source of identification. Instep 207, a total identification score of the user is generated from the identification scores of each of the at least one source of identification and a predetermined function. The predetermined function can comprise a summing function, a weighted summing function or the like. The total identification score of the user is associated with a level of verification of the identity of the user. The total identification score of the user is compared to a minimum identification score associated with a transaction. The transaction can comprise an application for credit, a purchase transaction or the like. The transaction is performed when the total identification score of the user is one of greater than and equal to the minimum identification score. Additional sources of identification of the user are received before performing the transaction when the total identification score is less than the minimum identification score. - In
step 210, at least one of personal information and financial information of the user can be supplied to a third party. The total identification score can be associated with the at least one of personal information and financial information of the user. Instep 213, a unique identity access authorization code associated with the user can be generated for use by a third party in the transaction. Instep 216, at least the total identification score of the user can be transmitted to the third party upon verification of the identity access authorization code. At least the total identification score of the user can be transmitted to the third party upon further verification of a user identification code of the user. The user identification code can comprise a social security number of the user or the like. Instep 219, accesses associated with the total identification score of the user by the third party can be recorded. Instep 222, the record of accesses associated with the total identification score of the user can be reviewed. Instep 225, at least one of personal information and financial information associated with the user can be transmitted to the third party upon verification of the identity access authorization code of the user. The at least one of personal information and financial information associated with the user can be transmitted to the third party upon further verification of a user identification code of the user. The user identification code can comprise a social security number of the user or the like. - In
step 228 ofFIG. 2B , an identity card securely containing identification information associated with the user can be issued. The identity card can comprise a smart card or the like. The identification information associated with the user can be encrypted on the identity card. Instep 231, uses of the identification information securely contained on the identity card can be restricted. The uses of the identification information can be restricted in many ways. For example,FIG. 3 is a flowchart illustrating steps for restricting uses of identification information securely contained on an identity card, in accordance with an exemplary embodiment of the present invention. Instep 305 ofFIG. 3 , locations of where the identification information is used can be restricted. Instep 310, times of when the identification information is used can be restricted. Instep 315, types of transactions for which the identification information is used can be restricted. - Returning to
FIG. 2B , instep 234, a determination can be made as to whether use of the identification information is restricted by the user for the transaction. If so, then instep 237, use of the identification information can be prohibited for the transaction. If not, then instep 240, the identification information can be used for the transaction. In either case, instep 243, a transaction order can be generated using the total identification score of the user. Instep 246, the transaction order can be submitted to perform the transaction. Instep 249, at least one of personal information and financial information of the user can be transmitted, upon verification of the transaction order, to complete the transaction. - In
FIG. 2C , instep 252, an address identification code can be associated with an address of the user. Instep 255, the address identification code and an address of a communication reception center can be supplied to a third party. Instep 258, communications for the user can be received from the third party at the communication reception center. The communications can include the address identification code, for example, as part of the address on the communications. Instep 261, the communications can be supplied to the user associated with the address identification code. Instep 264, an identity risk factor associated with the user can be supplied. The identity risk factor is associated with a level of risk of theft of the identity of the user by identity thieves. -
FIG. 4 is a flowchart illustrating steps for verifying an identity of a user, in accordance with an alternative exemplary embodiment of the present invention. Instep 405, at least one source of identification of the user is received. Instep 410, an identification score is assigned to each of the at least one source of identification. Instep 415, a total identification score of the user is generated from the identification scores of each of the at least one source of identification and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user. Instep 420, the total identification score of the user is compared to a minimum identification score associated with a transaction. Instep 425, the transaction is approved when the total identification score of the user is one of greater than and equal to the minimum identification score. Instep 430, additional sources of identification of the user are requested before approving the transaction when the total identification score is less than the minimum identification score. -
FIG. 5 is a flowchart illustrating steps for verifying an identity of a user, in accordance with an alternative exemplary embodiment of the present invention. Instep 505, at least one source of identification of the user is received. Instep 510, an identification score is assigned to each of the at least one source of identification. Instep 515, a total identification score of the user is generated from the identification scores of each of the at least one source of identification and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user. Instep 520, approval of the transaction is received when the total identification score of the user is one of greater than and equal to a minimum identification score. Instep 525, a request for additional sources of identification of the user is received before receiving approval of the transaction when the total identification score is less than the minimum identification score. -
FIG. 6 is a flowchart illustrating steps for verifying an identity of a user, in accordance with an alternative exemplary embodiment of the present invention. Instep 605, a total identification score of the user is received. The total identification score is generated from identification scores assigned to each of at least one source of identification of the user and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user. Instep 610, the total identification score of the user is compared to a minimum identification score associated with a transaction. Instep 615, the transaction is approved when the total identification score of the user is one of greater than and equal to the minimum identification score. Instep 620, additional sources of identification of the user are requested before approving the transaction when the total identification score is less than the minimum identification score. - Any or all of the steps of a computer program as illustrated in
FIGS. 2A , 2B, 2C and 3-6 for identity verification and management can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. As used herein, a “computer-readable medium” can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. The computer readable medium can be, for example but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device, or propagation medium. More specific examples (a non-exhaustive list) of the computer-readable medium can include the following: an electrical connection having one or more wires, a portable computer diskette, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, and a portable compact disc read-only memory (CDROM). - Exemplary embodiments of the present invention can be used in conjunction with any device, system, process or transaction in which the reliability and authenticity of the identification information associated with a user is needed. For example, exemplary embodiments can be used by financial institutions as part of various types of financial transactions (e.g., applications for credit), by retail establishments as part of various types of purchase transactions (e.g., online or in-person merchandise purchases using credit cards), by credit reporting agencies to maintain, manage and verify the identity of users in conjunction with the maintenance of the credit history of a user, and the like.
- It will be appreciated by those of ordinary skill in the art that the present invention can be embodied in various specific forms without departing from the spirit or essential characteristics thereof. The presently disclosed embodiments are considered in all respects to be illustrative and not restrictive. The scope of the invention is indicated by the appended claims, rather than the foregoing description, and all changes that come within the meaning and range of equivalence thereof are intended to be embraced.
- All United States patents and applications, foreign patents, and publications discussed above are hereby incorporated herein by reference in their entireties.
Claims (20)
1. A system for verifying an identity of a user during a transaction, the system comprising:
an identity card, the identity card comprising a computer readable medium;
wherein the computer readable medium has information associated with the user stored thereon;
an identification server operatively coupled to a processor and configured to generate an identification score for the user;
wherein the identification score is associated with a level of verification of the identity of the user;
wherein the identification score is stored to an information database;
an identity management server communicatively coupled with a computer network and the information database;
wherein the identity management system receives a query from a third party via the computer network for identification information;
wherein the identity management system receives the information from the identity card via the computer network;
wherein the identity management system processes the information from the identity card and queries the information database for the identification information and an identification score associated with the information from the identity card;
wherein the identity management system communicates the identification information and the identification score to the third party;
wherein the transaction is performed when
(i) the identification score of the user is greater than or equal to a minimum threshold value, and
(ii) the transaction does not fall within a user-specified restriction.
2. The system of claim 1 , wherein said readable media comprises at least one of: (i) smart chip; (ii) magnetic strip; and (iii) RFID.
3. The system of claim 1 , wherein the identity card is a mobile phone or a PDA.
4. The system of claim 1 , wherein the information contained on the identity card includes at least one user-specified restriction.
5. The system of claim 1 , wherein the information stored on the card is encrypted.
6. The system of claim 5 , wherein the third party decrypts the information stored on the card as part of a transaction.
7. The system of claim 1 , wherein the information stored on the card includes an identity access authorization code.
8. The system of claim 1 , wherein the identification information comprises at least one of: (i) an identity risk factor; (ii) biometric data associated with the user; (iii) financial information associated with the user; and (iv) a total identification score for the user.
9. The system of claim 8 , wherein the financial information includes account information for one or more credit cards.
10. The system of claim 1 , wherein the one or more user-specified restrictions limit the transaction based at least one of: (i) geographic location; (ii) time of day; (iii) date; (iv) type of transaction; (v) value of transaction; and (vi) payment method.
11. A method for reducing fraud in financial transactions, the method comprising:
receiving a request from a point-of-sale for authorization of a transaction associated with an account;
communicating a message to a mobile device associated with the account soliciting authorization from the account holder, wherein the message provides the account holder with a option of approving or denying the transaction; and
authorizing the transaction when an approval response is communicated by the account holder and denying the transaction when a denial response is communicated by the account holder.
12. The method of claim 11 , wherein the transaction is denied when a response is not communicated by the account holder.
13. The method of claim 11 , wherein the transaction is approved without communicating a message to the account holder when the transaction is preapproved by the account holder.
14. A system for facilitating transactions using a universal credit card, the system comprising:
an identity card, the identity card comprising a computer readable medium;
wherein the computer readable medium has account information associated with two or more credit cards stored thereon;
wherein each of said one or more credit cards is associated with a unique PIN;
an identity management server communicatively coupled with a computer network and a credit card processing server;
wherein the identity management system receives a transaction authorization request from a third party through the computer network, the transaction authorization request including at least one of
(i) the unique PIN selected by the user, and
(ii) account information associated with a selected credit card;
wherein the identity management system queries an information database for an issuing bank associated with the
(i) the unique PIN selected by the user, or
(ii) account information associated with a selected credit card;
wherein the identity management system determines an availability of funds by communicating with the issuing bank through the card processing server;
wherein the identity management system transmits an authorization message to the third party when funds are available, and transmits an authorization declined message to the third party when funds are not available
15. The system of claim 14 , wherein a default credit card is automatically selected when the user does not select a unique PIN.
16. The system of claim 14 , wherein said readable media comprises as least one of: (i) smart chip; (ii) magnetic strip; and (iii) RFID.
17. The system of claim 14 , wherein the identity card is a mobile phone or a PDA.
18. The system of claim 14 , wherein the information stored on the card is encrypted.
19. The system of claim 14 , wherein the identity management system transmits an authorization declined message to the third party when the transaction fall within one or more user-specified restrictions.
20. The system of claim 19 , wherein the one or more user-specified restrictions limit the transaction based at least one of: (i) geographic location; (ii) time of day; (iii) date; (iv) type of transaction; (v) value of transaction; and (vi) payment method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/524,312 US20120290482A1 (en) | 2004-12-07 | 2012-06-15 | System and method for identity verification and management |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US63341904P | 2004-12-07 | 2004-12-07 | |
US69799105P | 2005-07-12 | 2005-07-12 | |
US11/295,516 US8224753B2 (en) | 2004-12-07 | 2005-12-07 | System and method for identity verification and management |
US13/524,312 US20120290482A1 (en) | 2004-12-07 | 2012-06-15 | System and method for identity verification and management |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/295,516 Continuation US8224753B2 (en) | 2004-12-07 | 2005-12-07 | System and method for identity verification and management |
Publications (1)
Publication Number | Publication Date |
---|---|
US20120290482A1 true US20120290482A1 (en) | 2012-11-15 |
Family
ID=36578498
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/295,516 Active 2029-03-05 US8224753B2 (en) | 2004-12-07 | 2005-12-07 | System and method for identity verification and management |
US13/524,312 Abandoned US20120290482A1 (en) | 2004-12-07 | 2012-06-15 | System and method for identity verification and management |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/295,516 Active 2029-03-05 US8224753B2 (en) | 2004-12-07 | 2005-12-07 | System and method for identity verification and management |
Country Status (4)
Country | Link |
---|---|
US (2) | US8224753B2 (en) |
GB (1) | GB0712870D0 (en) |
TW (1) | TW200642408A (en) |
WO (1) | WO2006062998A2 (en) |
Cited By (45)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120254017A1 (en) * | 2011-03-30 | 2012-10-04 | Fusco Douglas D | System and Method for Credit Information Acquisition, Aggregation, and Maintenance |
US20130066767A1 (en) * | 2011-03-30 | 2013-03-14 | Douglas D. Fusco | System and Method for Credit Information Acquisition, Aggregation, and Funding |
US20140040130A1 (en) * | 2012-07-31 | 2014-02-06 | Google Inc. | Merchant category codes in a proxy card transaction |
US20140172690A1 (en) * | 2012-12-17 | 2014-06-19 | Sas Institute Inc. | Systems and Methods For Matching Domain Specific Transactions |
US20140297435A1 (en) * | 2013-03-28 | 2014-10-02 | Hoiling Angel WONG | Bank card secured payment system and method using real-time communication technology |
WO2014182785A1 (en) * | 2013-05-07 | 2014-11-13 | Ramalingam Krishnamurthi Anand | Fraud prevention for transactions |
US9020859B2 (en) | 2013-05-13 | 2015-04-28 | Ramalingam Krishnamurthi Anand | Fraud prevention for transactions |
WO2015191741A1 (en) * | 2014-06-10 | 2015-12-17 | Board Of Trustees Of The Leland Stanford Junior University Office Of The General Counsel | Systems and methods for conducting relationship dependent online transactions |
US20160203531A1 (en) * | 2013-10-01 | 2016-07-14 | Amadellas Corporation | Devices and methods for information processing and access control |
US9406065B2 (en) | 2014-03-04 | 2016-08-02 | Bank Of America Corporation | Customer token preferences interface |
US9424572B2 (en) | 2014-03-04 | 2016-08-23 | Bank Of America Corporation | Online banking digital wallet management |
US9525685B2 (en) | 2014-02-07 | 2016-12-20 | Bank Of America Corporation | User authentication based on other applications |
US9600844B2 (en) | 2014-03-04 | 2017-03-21 | Bank Of America Corporation | Foreign cross-issued token |
US9600817B2 (en) | 2014-03-04 | 2017-03-21 | Bank Of America Corporation | Foreign exchange token |
US9628495B2 (en) | 2014-02-07 | 2017-04-18 | Bank Of America Corporation | Self-selected user access based on specific authentication types |
US9647999B2 (en) | 2014-02-07 | 2017-05-09 | Bank Of America Corporation | Authentication level of function bucket based on circumstances |
US9721268B2 (en) | 2014-03-04 | 2017-08-01 | Bank Of America Corporation | Providing offers associated with payment credentials authenticated in a specific digital wallet |
US9721248B2 (en) | 2014-03-04 | 2017-08-01 | Bank Of America Corporation | ATM token cash withdrawal |
US9729536B2 (en) | 2015-10-30 | 2017-08-08 | Bank Of America Corporation | Tiered identification federated authentication network system |
US9819680B2 (en) | 2014-02-07 | 2017-11-14 | Bank Of America Corporation | Determining user authentication requirements based on the current location of the user in comparison to the users's normal boundary of location |
US9830597B2 (en) | 2014-03-04 | 2017-11-28 | Bank Of America Corporation | Formation and funding of a shared token |
WO2017213719A1 (en) | 2016-06-06 | 2017-12-14 | Thomson Reuters Global Resources | Systems and methods for providing identity scores |
US9965606B2 (en) | 2014-02-07 | 2018-05-08 | Bank Of America Corporation | Determining user authentication based on user/device interaction |
US10002352B2 (en) | 2014-03-04 | 2018-06-19 | Bank Of America Corporation | Digital wallet exposure reduction |
US10026119B2 (en) * | 2012-09-10 | 2018-07-17 | Google Llc | Efficient transfer of funds between accounts |
US20180276652A1 (en) * | 2015-09-03 | 2018-09-27 | Dionisios A. Sofronas | Contactless mobile payment system |
US10176542B2 (en) * | 2014-03-24 | 2019-01-08 | Mastercard International Incorporated | Systems and methods for identity validation and verification |
US10268635B2 (en) | 2016-06-17 | 2019-04-23 | Bank Of America Corporation | System for data rotation through tokenization |
US10313480B2 (en) | 2017-06-22 | 2019-06-04 | Bank Of America Corporation | Data transmission between networked resources |
US10402817B1 (en) * | 2018-10-12 | 2019-09-03 | Capital One Services, Llc | Relaxed fraud detection for transactions using virtual transaction cards |
US10460367B2 (en) | 2016-04-29 | 2019-10-29 | Bank Of America Corporation | System for user authentication based on linking a randomly generated number to the user and a physical item |
US10469504B1 (en) | 2017-09-08 | 2019-11-05 | Stripe, Inc. | Systems and methods for using one or more networks to assess a metric about an entity |
US10496998B1 (en) * | 2018-05-15 | 2019-12-03 | Capital One Services, Llc | Generating a random verification code for a transaction |
US10511692B2 (en) | 2017-06-22 | 2019-12-17 | Bank Of America Corporation | Data transmission to a networked resource based on contextual information |
US10524165B2 (en) | 2017-06-22 | 2019-12-31 | Bank Of America Corporation | Dynamic utilization of alternative resources based on token association |
US10574643B2 (en) | 2016-09-09 | 2020-02-25 | Trusona, Inc. | Systems and methods for distribution of selected authentication information for a network of devices |
US10614452B2 (en) | 2014-09-16 | 2020-04-07 | Mastercard International Incorporated | Systems and methods for providing risk based decisioning service to a merchant |
US10678898B2 (en) * | 2013-05-13 | 2020-06-09 | Veridium Ip Limited | System and method for authorizing access to access-controlled environments |
US11210380B2 (en) * | 2013-05-13 | 2021-12-28 | Veridium Ip Limited | System and method for authorizing access to access-controlled environments |
US11323420B2 (en) * | 2017-11-16 | 2022-05-03 | Visa International Service Association | Providing assertions regarding entities |
US11321716B2 (en) | 2019-02-15 | 2022-05-03 | Visa International Service Association | Identity-based transaction processing |
TWI767254B (en) * | 2020-06-17 | 2022-06-11 | 玉山商業銀行股份有限公司 | Authorization system and method thereof |
US11423758B2 (en) | 2018-04-09 | 2022-08-23 | State Farm Mutual Automobile Insurance Company | Sensing peripheral heuristic evidence, reinforcement, and engagement system |
US11423754B1 (en) | 2014-10-07 | 2022-08-23 | State Farm Mutual Automobile Insurance Company | Systems and methods for improved assisted or independent living environments |
US11706225B1 (en) | 2022-05-02 | 2023-07-18 | Bank Of America Corporation | System for source independent but source value dependent transfer monitoring |
Families Citing this family (461)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9400589B1 (en) | 2002-05-30 | 2016-07-26 | Consumerinfo.Com, Inc. | Circular rotational interface for display of consumer credit information |
US9710852B1 (en) | 2002-05-30 | 2017-07-18 | Consumerinfo.Com, Inc. | Credit report timeline user interface |
US7792715B1 (en) | 2002-09-21 | 2010-09-07 | Mighty Net, Incorporated | Method of on-line credit information monitoring and control |
CA2724292C (en) | 2003-05-30 | 2014-09-30 | Privaris, Inc. | An in-circuit security system and methods for controlling access to and use of sensitive data |
US7617501B2 (en) | 2004-07-09 | 2009-11-10 | Quest Software, Inc. | Apparatus, system, and method for managing policies on a computer having a foreign operating system |
WO2006039003A2 (en) * | 2004-08-20 | 2006-04-13 | Viisage Technology, Inc. | Method and system to authenticate an object |
US8732004B1 (en) | 2004-09-22 | 2014-05-20 | Experian Information Solutions, Inc. | Automated analysis of data to generate prospect notifications based on trigger events |
US7431207B1 (en) * | 2005-01-05 | 2008-10-07 | American Express Travel Related Services Co., Inc. | System and method for two-step payment transaction authorizations |
US7566002B2 (en) * | 2005-01-06 | 2009-07-28 | Early Warning Services, Llc | Identity verification systems and methods |
US8226001B1 (en) | 2010-06-23 | 2012-07-24 | Fiteq, Inc. | Method for broadcasting a magnetic stripe data packet from an electronic smart card |
KR20070119051A (en) | 2005-03-26 | 2007-12-18 | 프라이베이시스, 인크. | Electronic financial transaction cards and methods |
US8684267B2 (en) | 2005-03-26 | 2014-04-01 | Privasys | Method for broadcasting a magnetic stripe data packet from an electronic smart card |
US8175889B1 (en) | 2005-04-06 | 2012-05-08 | Experian Information Solutions, Inc. | Systems and methods for tracking changes of address based on service disconnect/connect data |
US20070280436A1 (en) * | 2006-04-14 | 2007-12-06 | Anthony Rajakumar | Method and System to Seed a Voice Database |
US9571652B1 (en) | 2005-04-21 | 2017-02-14 | Verint Americas Inc. | Enhanced diarization systems, media and methods of use |
US9113001B2 (en) | 2005-04-21 | 2015-08-18 | Verint Americas Inc. | Systems, methods, and media for disambiguating call data to determine fraud |
US20120253805A1 (en) | 2005-04-21 | 2012-10-04 | Anthony Rajakumar | Systems, methods, and media for determining fraud risk from audio signals |
US8073691B2 (en) * | 2005-04-21 | 2011-12-06 | Victrio, Inc. | Method and system for screening using voice data and metadata |
US8924285B2 (en) * | 2005-04-21 | 2014-12-30 | Verint Americas Inc. | Building whitelists comprising voiceprints not associated with fraud and screening calls using a combination of a whitelist and blacklist |
US8793131B2 (en) | 2005-04-21 | 2014-07-29 | Verint Americas Inc. | Systems, methods, and media for determining fraud patterns and creating fraud behavioral models |
US8639757B1 (en) | 2011-08-12 | 2014-01-28 | Sprint Communications Company L.P. | User localization using friend location information |
US20120053939A9 (en) * | 2005-04-21 | 2012-03-01 | Victrio | Speaker verification-based fraud system for combined automated risk score with agent review and associated user interface |
US8930261B2 (en) * | 2005-04-21 | 2015-01-06 | Verint Americas Inc. | Method and system for generating a fraud risk score using telephony channel based audio and non-audio data |
US8510215B2 (en) * | 2005-04-21 | 2013-08-13 | Victrio, Inc. | Method and system for enrolling a voiceprint in a fraudster database |
US20060248019A1 (en) * | 2005-04-21 | 2006-11-02 | Anthony Rajakumar | Method and system to detect fraud using voice data |
WO2006116772A2 (en) | 2005-04-27 | 2006-11-02 | Privasys, Inc. | Electronic cards and methods for making same |
US7793851B2 (en) * | 2005-05-09 | 2010-09-14 | Dynamics Inc. | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
US20070094152A1 (en) * | 2005-10-20 | 2007-04-26 | Bauman Brian D | Secure electronic transaction authentication enhanced with RFID |
US7904949B2 (en) | 2005-12-19 | 2011-03-08 | Quest Software, Inc. | Apparatus, systems and methods to provide authentication services to a legacy application |
US8087075B2 (en) | 2006-02-13 | 2011-12-27 | Quest Software, Inc. | Disconnected credential validation using pre-fetched service tickets |
CN100556042C (en) * | 2006-03-10 | 2009-10-28 | 腾讯科技(深圳)有限公司 | A kind of accounts security management system and method based on instant messaging |
US7912762B2 (en) | 2006-03-31 | 2011-03-22 | Amazon Technologies, Inc. | Customizable sign-on service |
US7874005B2 (en) * | 2006-04-11 | 2011-01-18 | Gold Type Business Machines | System and method for non-law enforcement entities to conduct checks using law enforcement restricted databases |
US8738921B2 (en) | 2006-05-16 | 2014-05-27 | Transactionsecure Llc | System and method for authenticating a person's identity using a trusted entity |
US8429712B2 (en) | 2006-06-08 | 2013-04-23 | Quest Software, Inc. | Centralized user authentication system apparatus and method |
US7725128B2 (en) * | 2006-09-06 | 2010-05-25 | Genmobi Technologies, Inc. | Integrated instant messaging and web browsing client and related methods |
US8424061B2 (en) * | 2006-09-12 | 2013-04-16 | International Business Machines Corporation | Method, system and program product for authenticating a user seeking to perform an electronic service request |
US8118223B2 (en) | 2006-09-28 | 2012-02-21 | Visa U.S.A. Inc. | Smart sign mobile transit fare payment |
US8346639B2 (en) * | 2007-02-28 | 2013-01-01 | Visa U.S.A. Inc. | Authentication of a data card using a transit verification value |
US20080203170A1 (en) * | 2007-02-28 | 2008-08-28 | Visa U.S.A. Inc. | Fraud prevention for transit fare collection |
US8523069B2 (en) | 2006-09-28 | 2013-09-03 | Visa U.S.A. Inc. | Mobile transit fare payment |
US8738485B2 (en) | 2007-12-28 | 2014-05-27 | Visa U.S.A. Inc. | Contactless prepaid product for transit fare collection |
US8386349B2 (en) * | 2007-02-28 | 2013-02-26 | Visa U.S.A. Inc. | Verification of a portable consumer device in an offline environment |
US7527208B2 (en) * | 2006-12-04 | 2009-05-05 | Visa U.S.A. Inc. | Bank issued contactless payment card used in transit fare collection |
US8036979B1 (en) | 2006-10-05 | 2011-10-11 | Experian Information Solutions, Inc. | System and method for generating a finance attribute from tradeline data |
US8239677B2 (en) * | 2006-10-10 | 2012-08-07 | Equifax Inc. | Verification and authentication systems and methods |
US8086710B2 (en) | 2006-10-30 | 2011-12-27 | Quest Software, Inc. | Identity migration apparatus and method |
US7895332B2 (en) | 2006-10-30 | 2011-02-22 | Quest Software, Inc. | Identity migration system apparatus and method |
US20080288299A1 (en) * | 2006-10-31 | 2008-11-20 | Genmobi Technologies, Inc. | System and method for user identity validation for online transactions |
US8515847B2 (en) * | 2006-10-31 | 2013-08-20 | Microfolio Data, Llc | System and method for password-free access for validated users |
US20080114987A1 (en) * | 2006-10-31 | 2008-05-15 | Novell, Inc. | Multiple security access mechanisms for a single identifier |
US20080120558A1 (en) | 2006-11-16 | 2008-05-22 | Paco Xander Nathan | Systems and methods for managing a persistent virtual avatar with migrational ability |
US9253183B2 (en) * | 2006-11-16 | 2016-02-02 | Mark Stephen Meadows | Systems and methods for authenticating an avatar |
US7657569B1 (en) | 2006-11-28 | 2010-02-02 | Lower My Bills, Inc. | System and method of removing duplicate leads |
US7778885B1 (en) | 2006-12-04 | 2010-08-17 | Lower My Bills, Inc. | System and method of enhancing leads |
CN101197131B (en) * | 2006-12-07 | 2011-03-30 | 积体数位股份有限公司 | Accidental vocal print password validation system, accidental vocal print cipher lock and its generation method |
US7786935B2 (en) * | 2007-01-07 | 2010-08-31 | Connectsoft, Inc. | Method and system for inferring a location of a mobile computing device |
US8606666B1 (en) | 2007-01-31 | 2013-12-10 | Experian Information Solutions, Inc. | System and method for providing an aggregation tool |
US8606626B1 (en) | 2007-01-31 | 2013-12-10 | Experian Information Solutions, Inc. | Systems and methods for providing a direct marketing campaign planning environment |
TWI464699B (en) * | 2007-03-29 | 2014-12-11 | Alibaba Group Holding Ltd | And a payment system and a method for trading with an ID card containing an IC card |
US8285656B1 (en) | 2007-03-30 | 2012-10-09 | Consumerinfo.Com, Inc. | Systems and methods for data verification |
US20080261698A1 (en) * | 2007-04-18 | 2008-10-23 | Technology Assurance Laboratory, Inc. | Automated method and system for a gaming opportunity |
US20080270154A1 (en) * | 2007-04-25 | 2008-10-30 | Boris Klots | System for scoring click traffic |
US11257080B2 (en) | 2007-05-04 | 2022-02-22 | Michael Sasha John | Fraud deterrence for secure transactions |
US10853855B2 (en) * | 2007-05-20 | 2020-12-01 | Michael Sasha John | Systems and methods for automatic and transparent client authentication and online transaction verification |
US20080294540A1 (en) | 2007-05-25 | 2008-11-27 | Celka Christopher J | System and method for automated detection of never-pay data sets |
US20090006230A1 (en) * | 2007-06-27 | 2009-01-01 | Checkfree Corporation | Identity Risk Scoring |
US8271285B2 (en) * | 2007-08-02 | 2012-09-18 | International Business Machines Corporation | Using speaker identification and verification speech processing technologies to activate and deactivate a payment card |
US20090076959A1 (en) * | 2007-09-11 | 2009-03-19 | Patrick Devaney | System and method for brokering ad hoc personal identification transactions between two consenting parties |
EP2947592B1 (en) | 2007-09-24 | 2021-10-27 | Apple Inc. | Embedded authentication systems in an electronic device |
US8792118B2 (en) | 2007-09-26 | 2014-07-29 | Ringcentral Inc. | User interfaces and methods to provision electronic facsimiles |
US8275110B2 (en) | 2007-09-28 | 2012-09-25 | Ringcentral, Inc. | Active call filtering, screening and dispatching |
US8670545B2 (en) | 2007-09-28 | 2014-03-11 | Ringcentral, Inc. | Inbound call identification and management |
US8600391B2 (en) | 2008-11-24 | 2013-12-03 | Ringcentral, Inc. | Call management for location-aware mobile devices |
US9098844B2 (en) | 2007-11-20 | 2015-08-04 | Wells Fargo Bank, N.A. | Mobile electronic wallet |
US8127986B1 (en) | 2007-12-14 | 2012-03-06 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US9990674B1 (en) | 2007-12-14 | 2018-06-05 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US8020775B2 (en) | 2007-12-24 | 2011-09-20 | Dynamics Inc. | Payment cards and devices with enhanced magnetic emulators |
US8600120B2 (en) | 2008-01-03 | 2013-12-03 | Apple Inc. | Personal computing device control using face detection and recognition |
US10373198B1 (en) | 2008-06-13 | 2019-08-06 | Lmb Mortgage Services, Inc. | System and method of generating existing customer leads |
EP3054408A1 (en) * | 2008-06-24 | 2016-08-10 | HSBC Technology & Services (USA) Inc. | Methods and systems for verifying customer supplied financial account information using debit and credit transactions |
US8478692B2 (en) | 2008-06-26 | 2013-07-02 | Visa International Service Association | Systems and methods for geographic location notifications of payment transactions |
US8312033B1 (en) | 2008-06-26 | 2012-11-13 | Experian Marketing Solutions, Inc. | Systems and methods for providing an integrated identifier |
US9542687B2 (en) | 2008-06-26 | 2017-01-10 | Visa International Service Association | Systems and methods for visual representation of offers |
US9256904B1 (en) | 2008-08-14 | 2016-02-09 | Experian Information Solutions, Inc. | Multi-bureau credit file freeze and unfreeze |
RU2011116158A (en) | 2008-09-25 | 2012-10-27 | Виза Интернэшнл Сервис Ассосиэйшн (Us) | METHOD AND SYSTEM FOR SORTING WARNING MESSAGES AND OFFERS ON MOBILE DEVICE |
US20100082490A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | Systems and methods for secure wireless transactions |
US8307412B2 (en) * | 2008-10-20 | 2012-11-06 | Microsoft Corporation | User authentication management |
US20100114573A1 (en) * | 2008-10-30 | 2010-05-06 | Motorola, Inc. | Method and Device for Verifying a User |
US8060424B2 (en) | 2008-11-05 | 2011-11-15 | Consumerinfo.Com, Inc. | On-line method and system for monitoring and reporting unused available credit |
US20100122347A1 (en) * | 2008-11-13 | 2010-05-13 | International Business Machines Corporation | Authenticity ratings based at least in part upon input from a community of raters |
US8621642B2 (en) * | 2008-11-17 | 2013-12-31 | Digitalpersona, Inc. | Method and apparatus for an end user identity protection suite |
US8780383B2 (en) | 2008-11-25 | 2014-07-15 | Ringcentral, Inc. | Authenticated facsimile transmission from mobile devices |
WO2010062981A2 (en) | 2008-11-26 | 2010-06-03 | Ringcentral, Inc. | Centralized status server for call management of location-aware mobile devices |
US20100153278A1 (en) * | 2008-12-16 | 2010-06-17 | Farsedakis Lewis E | Web sites that introduce a seller to a universe of buyers, web sites that receive a buyer's listing of what he wants to buy, other introduction web sites, systems using introduction web sites and internet-based introductions |
US8579203B1 (en) | 2008-12-19 | 2013-11-12 | Dynamics Inc. | Electronic magnetic recorded media emulators in magnetic card devices |
US8931703B1 (en) | 2009-03-16 | 2015-01-13 | Dynamics Inc. | Payment cards and devices for displaying barcodes |
US20100241498A1 (en) * | 2009-03-19 | 2010-09-23 | Microsoft Corporation | Dynamic advertising platform |
US9886693B2 (en) * | 2009-03-30 | 2018-02-06 | Yuh-Shen Song | Privacy protected anti identity theft and payment network |
US20110225045A1 (en) * | 2009-03-30 | 2011-09-15 | Yuh-Shen Song | Paperless Coupon Transactions System |
US9329619B1 (en) | 2009-04-06 | 2016-05-03 | Dynamics Inc. | Cards with power management |
US10176419B1 (en) | 2009-04-06 | 2019-01-08 | Dynamics Inc. | Cards and assemblies with user interfaces |
US8622309B1 (en) | 2009-04-06 | 2014-01-07 | Dynamics Inc. | Payment cards and devices with budgets, parental controls, and virtual accounts |
US8762288B2 (en) | 2009-04-22 | 2014-06-24 | The Western Union Company | Methods and systems for establishing an identity confidence database |
US20100280955A1 (en) * | 2009-04-30 | 2010-11-04 | General Electric Company | Systems and methods for verifying identity |
US10140598B2 (en) | 2009-05-20 | 2018-11-27 | Visa International Service Association | Device including encrypted data for expiration date and verification value creation |
US8393545B1 (en) | 2009-06-23 | 2013-03-12 | Dynamics Inc. | Cards deployed with inactivated products for activation |
JP2011008701A (en) * | 2009-06-29 | 2011-01-13 | Sony Corp | Information processing server, information processing apparatus, and information processing method |
US8255984B1 (en) | 2009-07-01 | 2012-08-28 | Quest Software, Inc. | Single sign-on system for shared resource environments |
US11797997B2 (en) * | 2009-07-07 | 2023-10-24 | Visa International Service Association | Data verification in transactions in distributed network |
CA2804455C (en) * | 2009-07-07 | 2018-05-29 | Finsphere Corporation | Mobile directory number and email verification of financial transactions |
US8752142B2 (en) | 2009-07-17 | 2014-06-10 | American Express Travel Related Services Company, Inc. | Systems, methods, and computer program products for adapting the security measures of a communication network based on feedback |
US8511574B1 (en) | 2009-08-17 | 2013-08-20 | Dynamics Inc. | Advanced loyalty applications for powered cards and devices |
US9306666B1 (en) | 2009-10-08 | 2016-04-05 | Dynamics Inc. | Programming protocols for powered cards and devices |
US8727219B1 (en) | 2009-10-12 | 2014-05-20 | Dynamics Inc. | Magnetic stripe track signal having multiple communications channels |
US8523059B1 (en) | 2009-10-20 | 2013-09-03 | Dynamics Inc. | Advanced payment options for powered cards and devices |
US8393546B1 (en) | 2009-10-25 | 2013-03-12 | Dynamics Inc. | Games, prizes, and entertainment for powered cards and devices |
US9922167B2 (en) * | 2009-11-20 | 2018-03-20 | Versus Technology, Inc. | Context-aware method and system for facilitating the delivery of healthcare to patients within a clinical environment monitored by real-time locating apparatus |
US9756076B2 (en) * | 2009-12-17 | 2017-09-05 | American Express Travel Related Services Company, Inc. | Dynamically reacting policies and protections for securing mobile financial transactions |
US8621636B2 (en) * | 2009-12-17 | 2013-12-31 | American Express Travel Related Services Company, Inc. | Systems, methods, and computer program products for collecting and reporting sensor data in a communication network |
US8650129B2 (en) | 2010-01-20 | 2014-02-11 | American Express Travel Related Services Company, Inc. | Dynamically reacting policies and protections for securing mobile financial transaction data in transit |
US8602312B2 (en) | 2010-02-16 | 2013-12-10 | Dynamics Inc. | Systems and methods for drive circuits for dynamic magnetic stripe communications devices |
US8348172B1 (en) | 2010-03-02 | 2013-01-08 | Dynamics Inc. | Systems and methods for detection mechanisms for magnetic cards and devices |
US10693263B1 (en) | 2010-03-16 | 2020-06-23 | Dynamics Inc. | Systems and methods for audio connectors for powered cards and devices |
US9189601B2 (en) * | 2010-03-16 | 2015-11-17 | Jireh Health, Llc | Apparatus, system, and method for accurate dispensing of prescription medications |
NL1037813C2 (en) * | 2010-03-18 | 2011-09-20 | Stichting Bioxs | System and method for checking the authenticity of the identity of a person logging into a computer network. |
US9652802B1 (en) | 2010-03-24 | 2017-05-16 | Consumerinfo.Com, Inc. | Indirect monitoring and reporting of a user's credit data |
US10453093B1 (en) | 2010-04-30 | 2019-10-22 | Lmb Mortgage Services, Inc. | System and method of optimizing matching of leads |
US20110270761A1 (en) * | 2010-04-30 | 2011-11-03 | Tobsc Inc. | Methods and apparatus for a financial document clearinghouse and secure delivery network |
US10504105B2 (en) | 2010-05-18 | 2019-12-10 | Dynamics Inc. | Systems and methods for cards and devices operable to communicate to touch sensitive displays |
US8850539B2 (en) | 2010-06-22 | 2014-09-30 | American Express Travel Related Services Company, Inc. | Adaptive policies and protections for securing financial transaction data at rest |
US10360625B2 (en) | 2010-06-22 | 2019-07-23 | American Express Travel Related Services Company, Inc. | Dynamically adaptive policy management for securing mobile financial transactions |
US8924296B2 (en) * | 2010-06-22 | 2014-12-30 | American Express Travel Related Services Company, Inc. | Dynamic pairing system for securing a trusted communication channel |
US8317103B1 (en) | 2010-06-23 | 2012-11-27 | FiTeq | Method for broadcasting a magnetic stripe data packet from an electronic smart card |
US8700895B1 (en) | 2010-06-30 | 2014-04-15 | Google Inc. | System and method for operating a computing device in a secure mode |
US9118666B2 (en) | 2010-06-30 | 2015-08-25 | Google Inc. | Computing device integrity verification |
US8931058B2 (en) | 2010-07-01 | 2015-01-06 | Experian Information Solutions, Inc. | Systems and methods for permission arbitrated transaction services |
US8744956B1 (en) | 2010-07-01 | 2014-06-03 | Experian Information Solutions, Inc. | Systems and methods for permission arbitrated transaction services |
USD652448S1 (en) | 2010-07-02 | 2012-01-17 | Dynamics Inc. | Multiple button interactive electronic card |
USD670759S1 (en) | 2010-07-02 | 2012-11-13 | Dynamics Inc. | Multiple button interactive electronic card with light sources |
USD652449S1 (en) | 2010-07-02 | 2012-01-17 | Dynamics Inc. | Multiple button interactive electronic card |
USD672389S1 (en) | 2010-07-02 | 2012-12-11 | Dynamics Inc. | Multiple button interactive electronic card with light sources |
USD652867S1 (en) | 2010-07-02 | 2012-01-24 | Dynamics Inc. | Multiple button interactive electronic card |
USD652075S1 (en) | 2010-07-02 | 2012-01-10 | Dynamics Inc. | Multiple button interactive electronic card |
USD687094S1 (en) | 2010-07-02 | 2013-07-30 | Dynamics Inc. | Multiple button interactive electronic card with light sources |
USD674013S1 (en) | 2010-07-02 | 2013-01-08 | Dynamics Inc. | Multiple button interactive electronic card with light sources |
USD652450S1 (en) | 2010-07-09 | 2012-01-17 | Dynamics Inc. | Multiple button interactive electronic card |
USD651644S1 (en) | 2010-07-09 | 2012-01-03 | Dynamics Inc. | Interactive electronic card with display |
USD666241S1 (en) | 2010-07-09 | 2012-08-28 | Dynamics Inc. | Multiple button interactive electronic card with light source |
USD652076S1 (en) | 2010-07-09 | 2012-01-10 | Dynamics Inc. | Multiple button interactive electronic card with display |
USD651237S1 (en) | 2010-07-09 | 2011-12-27 | Dynamics Inc. | Interactive electronic card with display |
USD665447S1 (en) | 2010-07-09 | 2012-08-14 | Dynamics Inc. | Multiple button interactive electronic card with light source and display |
USD651238S1 (en) | 2010-07-09 | 2011-12-27 | Dynamics Inc. | Interactive electronic card with display |
USD653288S1 (en) | 2010-07-09 | 2012-01-31 | Dynamics Inc. | Multiple button interactive electronic card |
USD792511S1 (en) | 2010-07-09 | 2017-07-18 | Dynamics Inc. | Display with font |
USD643063S1 (en) | 2010-07-09 | 2011-08-09 | Dynamics Inc. | Interactive electronic card with display |
USD665022S1 (en) | 2010-07-09 | 2012-08-07 | Dynamics Inc. | Multiple button interactive electronic card with light source |
USD792513S1 (en) | 2010-07-09 | 2017-07-18 | Dynamics Inc. | Display with font |
USD792512S1 (en) | 2010-07-09 | 2017-07-18 | Dynamics Inc. | Display with font |
US8322623B1 (en) | 2010-07-26 | 2012-12-04 | Dynamics Inc. | Systems and methods for advanced card printing |
US9818125B2 (en) | 2011-02-16 | 2017-11-14 | Dynamics Inc. | Systems and methods for information exchange mechanisms for powered cards and devices |
US10055614B1 (en) | 2010-08-12 | 2018-08-21 | Dynamics Inc. | Systems and methods for advanced detection mechanisms for magnetic cards and devices |
US9053398B1 (en) | 2010-08-12 | 2015-06-09 | Dynamics Inc. | Passive detection mechanisms for magnetic cards and devices |
GB2483515B (en) * | 2010-09-13 | 2018-01-24 | Barclays Bank Plc | Online user authentication |
US10022884B1 (en) | 2010-10-15 | 2018-07-17 | Dynamics Inc. | Systems and methods for alignment techniques for magnetic cards and devices |
US8561894B1 (en) | 2010-10-20 | 2013-10-22 | Dynamics Inc. | Powered cards and devices designed, programmed, and deployed from a kiosk |
US9646240B1 (en) | 2010-11-05 | 2017-05-09 | Dynamics Inc. | Locking features for powered cards and devices |
US8782217B1 (en) | 2010-11-10 | 2014-07-15 | Safetyweb, Inc. | Online identity management |
US8484186B1 (en) | 2010-11-12 | 2013-07-09 | Consumerinfo.Com, Inc. | Personalized people finder |
US9147042B1 (en) | 2010-11-22 | 2015-09-29 | Experian Information Solutions, Inc. | Systems and methods for data verification |
US8359631B2 (en) | 2010-12-08 | 2013-01-22 | Lewis Farsedakis | Portable identity rating |
US8464358B2 (en) | 2010-12-08 | 2013-06-11 | Lewis Farsedakis | Portable identity rating |
US20120173335A1 (en) * | 2010-12-29 | 2012-07-05 | Meir Amzallag | System and Methods for Enhancing Sales of Online Transactions |
US8567679B1 (en) | 2011-01-23 | 2013-10-29 | Dynamics Inc. | Cards and devices with embedded holograms |
US10095970B1 (en) | 2011-01-31 | 2018-10-09 | Dynamics Inc. | Cards including anti-skimming devices |
EP2676197B1 (en) | 2011-02-18 | 2018-11-28 | CSidentity Corporation | System and methods for identifying compromised personally identifiable information on the internet |
US9836680B1 (en) | 2011-03-03 | 2017-12-05 | Dynamics Inc. | Systems and methods for advanced communication mechanisms for magnetic cards and devices |
US8485446B1 (en) | 2011-03-28 | 2013-07-16 | Dynamics Inc. | Shielded magnetic stripe for magnetic cards and devices |
EP2707847A4 (en) | 2011-05-10 | 2015-04-01 | Dynamics Inc | Systems, devices, and methods for mobile payment acceptance, mobile authorizations, mobile wallets, and contactless communication mechanisms |
USD670330S1 (en) | 2011-05-12 | 2012-11-06 | Dynamics Inc. | Interactive card |
USD676904S1 (en) | 2011-05-12 | 2013-02-26 | Dynamics Inc. | Interactive display card |
USD670331S1 (en) | 2011-05-12 | 2012-11-06 | Dynamics Inc. | Interactive display card |
USD670332S1 (en) | 2011-05-12 | 2012-11-06 | Dynamics Inc. | Interactive card |
USD670329S1 (en) | 2011-05-12 | 2012-11-06 | Dynamics Inc. | Interactive display card |
US8628022B1 (en) | 2011-05-23 | 2014-01-14 | Dynamics Inc. | Systems and methods for sensor mechanisms for magnetic cards and devices |
US20120303534A1 (en) * | 2011-05-27 | 2012-11-29 | Tomaxx Gmbh | System and method for a secure transaction |
US9607336B1 (en) | 2011-06-16 | 2017-03-28 | Consumerinfo.Com, Inc. | Providing credit inquiry alerts |
US20120331557A1 (en) * | 2011-06-21 | 2012-12-27 | Keith Anthony Washington | Global identity protector E-commerce payment code certified processing system |
US9483606B1 (en) | 2011-07-08 | 2016-11-01 | Consumerinfo.Com, Inc. | Lifescore |
US9824198B2 (en) * | 2011-07-14 | 2017-11-21 | Docusign, Inc. | System and method for identity and reputation score based on transaction history |
US8827153B1 (en) | 2011-07-18 | 2014-09-09 | Dynamics Inc. | Systems and methods for waveform generation for dynamic magnetic stripe communications devices |
US8850536B2 (en) | 2011-08-05 | 2014-09-30 | Safefaces LLC | Methods and systems for identity verification in a social network using ratings |
US8850535B2 (en) | 2011-08-05 | 2014-09-30 | Safefaces LLC | Methods and systems for identity verification in a social network using ratings |
US9148447B2 (en) * | 2011-08-31 | 2015-09-29 | Bank Of America Corporation | Safe services framework |
US9106691B1 (en) | 2011-09-16 | 2015-08-11 | Consumerinfo.Com, Inc. | Systems and methods of identity protection and management |
US20130073445A1 (en) * | 2011-09-21 | 2013-03-21 | Moneygram International, Inc. | Real-Time Approval of Bank Draft Payments for Money Transfer Transactions |
US9002322B2 (en) | 2011-09-29 | 2015-04-07 | Apple Inc. | Authentication with secondary approver |
US8769624B2 (en) | 2011-09-29 | 2014-07-01 | Apple Inc. | Access control utilizing indirect authentication |
US20130091052A1 (en) * | 2011-10-07 | 2013-04-11 | Paal Kaperdal | Systems and methods for generating new accounts with a financial institution |
US8738516B1 (en) | 2011-10-13 | 2014-05-27 | Consumerinfo.Com, Inc. | Debt services candidate locator |
US11551046B1 (en) | 2011-10-19 | 2023-01-10 | Dynamics Inc. | Stacked dynamic magnetic stripe commmunications device for magnetic cards and devices |
US11409971B1 (en) | 2011-10-23 | 2022-08-09 | Dynamics Inc. | Programming and test modes for powered cards and devices |
US11030562B1 (en) | 2011-10-31 | 2021-06-08 | Consumerinfo.Com, Inc. | Pre-data breach monitoring |
US8966602B2 (en) * | 2011-11-07 | 2015-02-24 | Facebook, Inc. | Identity verification and authentication |
US9619741B1 (en) | 2011-11-21 | 2017-04-11 | Dynamics Inc. | Systems and methods for synchronization mechanisms for magnetic cards and devices |
US8960545B1 (en) | 2011-11-21 | 2015-02-24 | Dynamics Inc. | Data modification for magnetic cards and devices |
US9064194B1 (en) | 2012-02-03 | 2015-06-23 | Dynamics Inc. | Systems and methods for spike suppression for dynamic magnetic stripe communications devices |
US9710745B1 (en) | 2012-02-09 | 2017-07-18 | Dynamics Inc. | Systems and methods for automated assembly of dynamic magnetic stripe communications devices |
US8888009B1 (en) | 2012-02-14 | 2014-11-18 | Dynamics Inc. | Systems and methods for extended stripe mechanisms for magnetic cards and devices |
US9916992B2 (en) | 2012-02-20 | 2018-03-13 | Dynamics Inc. | Systems and methods for flexible components for powered cards and devices |
US9734669B1 (en) | 2012-04-02 | 2017-08-15 | Dynamics Inc. | Cards, devices, systems, and methods for advanced payment game of skill and game of chance functionality |
US11418483B1 (en) | 2012-04-19 | 2022-08-16 | Dynamics Inc. | Cards, devices, systems, and methods for zone-based network management |
US8924292B1 (en) * | 2012-04-25 | 2014-12-30 | Wells Fargo Bank, N.A. | System and method for a mobile wallet |
US9853959B1 (en) | 2012-05-07 | 2017-12-26 | Consumerinfo.Com, Inc. | Storage and maintenance of personal data |
US9033218B1 (en) | 2012-05-15 | 2015-05-19 | Dynamics Inc. | Cards, devices, systems, methods and dynamic security codes |
BR112014028774B1 (en) | 2012-05-18 | 2022-05-10 | Apple Inc | Method, electronic device, computer readable storage medium and information processing apparatus |
US9251792B2 (en) * | 2012-06-15 | 2016-02-02 | Sri International | Multi-sample conversational voice verification |
TWI462604B (en) * | 2012-06-18 | 2014-11-21 | Wistron Corp | Wireless network client-authentication system and wireless network connection method thereof |
US9064195B2 (en) | 2012-06-29 | 2015-06-23 | Dynamics Inc. | Multiple layer card circuit boards |
USD687095S1 (en) | 2012-08-27 | 2013-07-30 | Dynamics Inc. | Interactive electronic card with buttons |
USD729871S1 (en) | 2012-08-27 | 2015-05-19 | Dynamics Inc. | Interactive electronic card with display and buttons |
USD729869S1 (en) | 2012-08-27 | 2015-05-19 | Dynamics Inc. | Interactive electronic card with display and button |
USD730438S1 (en) | 2012-08-27 | 2015-05-26 | Dynamics Inc. | Interactive electronic card with display and button |
USD687488S1 (en) | 2012-08-27 | 2013-08-06 | Dynamics Inc. | Interactive electronic card with buttons |
USD687489S1 (en) | 2012-08-27 | 2013-08-06 | Dynamics Inc. | Interactive electronic card with buttons |
USD687490S1 (en) | 2012-08-27 | 2013-08-06 | Dynamics Inc. | Interactive electronic card with display and button |
USD828870S1 (en) | 2012-08-27 | 2018-09-18 | Dynamics Inc. | Display card |
USD688744S1 (en) | 2012-08-27 | 2013-08-27 | Dynamics Inc. | Interactive electronic card with display and button |
USD673606S1 (en) | 2012-08-27 | 2013-01-01 | Dynamics Inc. | Interactive electronic card with display and buttons |
USD687487S1 (en) | 2012-08-27 | 2013-08-06 | Dynamics Inc. | Interactive electronic card with display and button |
USD676487S1 (en) | 2012-08-27 | 2013-02-19 | Dynamics Inc. | Interactive electronic card with display and buttons |
USD675256S1 (en) | 2012-08-27 | 2013-01-29 | Dynamics Inc. | Interactive electronic card with display and button |
USD694322S1 (en) | 2012-08-27 | 2013-11-26 | Dynamics Inc. | Interactive electronic card with display buttons |
USD692053S1 (en) | 2012-08-27 | 2013-10-22 | Dynamics Inc. | Interactive electronic card with display and button |
USD695636S1 (en) | 2012-08-27 | 2013-12-17 | Dynamics Inc. | Interactive electronic card with display and buttons |
USD730439S1 (en) | 2012-08-27 | 2015-05-26 | Dynamics Inc. | Interactive electronic card with buttons |
USD729870S1 (en) | 2012-08-27 | 2015-05-19 | Dynamics Inc. | Interactive electronic card with display and button |
USD687887S1 (en) | 2012-08-27 | 2013-08-13 | Dynamics Inc. | Interactive electronic card with buttons |
US9368116B2 (en) | 2012-09-07 | 2016-06-14 | Verint Systems Ltd. | Speaker separation in diarization |
US11126997B1 (en) | 2012-10-02 | 2021-09-21 | Dynamics Inc. | Cards, devices, systems, and methods for a fulfillment system |
US9010647B2 (en) | 2012-10-29 | 2015-04-21 | Dynamics Inc. | Multiple sensor detector systems and detection methods of magnetic cards and devices |
US9659246B1 (en) | 2012-11-05 | 2017-05-23 | Dynamics Inc. | Dynamic magnetic stripe communications device with beveled magnetic material for magnetic cards and devices |
US20140129670A1 (en) * | 2012-11-07 | 2014-05-08 | Nokia Corporation | Method and apparatus for modifying unique identifiers associated with a web browser |
US9654541B1 (en) | 2012-11-12 | 2017-05-16 | Consumerinfo.Com, Inc. | Aggregating user web browsing data |
US10134400B2 (en) | 2012-11-21 | 2018-11-20 | Verint Systems Ltd. | Diarization using acoustic labeling |
IL223225A (en) * | 2012-11-25 | 2013-11-28 | Eliahu Antopolsky | System for meetings documentation that enables access to the documentation only by the consent of the participants |
US8856894B1 (en) | 2012-11-28 | 2014-10-07 | Consumerinfo.Com, Inc. | Always on authentication |
US9916621B1 (en) | 2012-11-30 | 2018-03-13 | Consumerinfo.Com, Inc. | Presentation of credit score factors |
US9010644B1 (en) | 2012-11-30 | 2015-04-21 | Dynamics Inc. | Dynamic magnetic stripe communications device with stepped magnetic material for magnetic cards and devices |
US10255598B1 (en) | 2012-12-06 | 2019-04-09 | Consumerinfo.Com, Inc. | Credit card account data extraction |
US10949627B2 (en) | 2012-12-20 | 2021-03-16 | Dynamics Inc. | Systems and methods for non-time smearing detection mechanisms for magnetic cards and devices |
US20140188717A1 (en) * | 2013-01-02 | 2014-07-03 | David Gillman | Method and Apparatus for Payment of Invoices |
USD750166S1 (en) | 2013-03-04 | 2016-02-23 | Dynamics Inc. | Interactive electronic card with display and buttons |
USD750168S1 (en) | 2013-03-04 | 2016-02-23 | Dynamics Inc. | Interactive electronic card with display and button |
USD750167S1 (en) | 2013-03-04 | 2016-02-23 | Dynamics Inc. | Interactive electronic card with buttons |
USD751639S1 (en) | 2013-03-04 | 2016-03-15 | Dynamics Inc. | Interactive electronic card with display and button |
USD765174S1 (en) | 2013-03-04 | 2016-08-30 | Dynamics Inc. | Interactive electronic card with button |
USD764584S1 (en) | 2013-03-04 | 2016-08-23 | Dynamics Inc. | Interactive electronic card with buttons |
USD777252S1 (en) | 2013-03-04 | 2017-01-24 | Dynamics Inc. | Interactive electronic card with buttons |
USD765173S1 (en) | 2013-03-04 | 2016-08-30 | Dynamics Inc. | Interactive electronic card with display and button |
USD751640S1 (en) | 2013-03-04 | 2016-03-15 | Dynamics Inc. | Interactive electronic card with display and button |
US8972400B1 (en) | 2013-03-11 | 2015-03-03 | Consumerinfo.Com, Inc. | Profile data management |
US9870589B1 (en) | 2013-03-14 | 2018-01-16 | Consumerinfo.Com, Inc. | Credit utilization tracking and reporting |
US10102570B1 (en) | 2013-03-14 | 2018-10-16 | Consumerinfo.Com, Inc. | Account vulnerability alerts |
US8812387B1 (en) | 2013-03-14 | 2014-08-19 | Csidentity Corporation | System and method for identifying related credit inquiries |
US9406085B1 (en) | 2013-03-14 | 2016-08-02 | Consumerinfo.Com, Inc. | System and methods for credit dispute processing, resolution, and reporting |
US9633322B1 (en) | 2013-03-15 | 2017-04-25 | Consumerinfo.Com, Inc. | Adjustment of knowledge-based authentication |
US10664936B2 (en) | 2013-03-15 | 2020-05-26 | Csidentity Corporation | Authentication systems and methods for on-demand products |
US9396320B2 (en) | 2013-03-22 | 2016-07-19 | Nok Nok Labs, Inc. | System and method for non-intrusive, privacy-preserving authentication |
US10270748B2 (en) | 2013-03-22 | 2019-04-23 | Nok Nok Labs, Inc. | Advanced authentication techniques and applications |
US9887983B2 (en) | 2013-10-29 | 2018-02-06 | Nok Nok Labs, Inc. | Apparatus and method for implementing composite authenticators |
US9818165B2 (en) | 2013-04-04 | 2017-11-14 | Conduent Business Services, Llc | Birth registration |
US10685398B1 (en) | 2013-04-23 | 2020-06-16 | Consumerinfo.Com, Inc. | Presenting credit score information |
US9721147B1 (en) | 2013-05-23 | 2017-08-01 | Consumerinfo.Com, Inc. | Digital identity |
US9961077B2 (en) | 2013-05-30 | 2018-05-01 | Nok Nok Labs, Inc. | System and method for biometric authentication with device attestation |
US9460722B2 (en) | 2013-07-17 | 2016-10-04 | Verint Systems Ltd. | Blind diarization of recorded calls with arbitrary number of speakers |
CN105580038A (en) | 2013-07-24 | 2016-05-11 | 维萨国际服务协会 | Systems and methods for interoperable network token processing |
US9984706B2 (en) | 2013-08-01 | 2018-05-29 | Verint Systems Ltd. | Voice activity detection using a soft decision mechanism |
US9443268B1 (en) | 2013-08-16 | 2016-09-13 | Consumerinfo.Com, Inc. | Bill payment and reporting |
JP5485484B1 (en) | 2013-08-22 | 2014-05-07 | 楽天株式会社 | Information processing apparatus, information processing method, program, and storage medium |
US9898642B2 (en) | 2013-09-09 | 2018-02-20 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
USD767024S1 (en) | 2013-09-10 | 2016-09-20 | Dynamics Inc. | Interactive electronic card with contact connector |
USD737373S1 (en) | 2013-09-10 | 2015-08-25 | Dynamics Inc. | Interactive electronic card with contact connector |
US9380041B2 (en) * | 2013-09-30 | 2016-06-28 | Bank Of America Corporation | Identification, verification, and authentication scoring |
RU2691843C2 (en) * | 2013-10-11 | 2019-06-18 | Виза Интернэшнл Сервис Ассосиэйшн | Network token system |
US10325314B1 (en) | 2013-11-15 | 2019-06-18 | Consumerinfo.Com, Inc. | Payment reporting systems |
US9477737B1 (en) | 2013-11-20 | 2016-10-25 | Consumerinfo.Com, Inc. | Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules |
US9219723B1 (en) | 2013-12-20 | 2015-12-22 | Certify Global Inc. | Source device for systems and methods of verifying an authentication using dynamic scoring |
US10262362B1 (en) | 2014-02-14 | 2019-04-16 | Experian Information Solutions, Inc. | Automatic generation of code for attributes |
US10929858B1 (en) * | 2014-03-14 | 2021-02-23 | Walmart Apollo, Llc | Systems and methods for managing customer data |
US10108891B1 (en) | 2014-03-21 | 2018-10-23 | Dynamics Inc. | Exchange coupled amorphous ribbons for electronic stripes |
USD760256S1 (en) | 2014-03-25 | 2016-06-28 | Consumerinfo.Com, Inc. | Display screen or portion thereof with graphical user interface |
USD759690S1 (en) | 2014-03-25 | 2016-06-21 | Consumerinfo.Com, Inc. | Display screen or portion thereof with graphical user interface |
USD759689S1 (en) | 2014-03-25 | 2016-06-21 | Consumerinfo.Com, Inc. | Display screen or portion thereof with graphical user interface |
US9892457B1 (en) | 2014-04-16 | 2018-02-13 | Consumerinfo.Com, Inc. | Providing credit data in search results |
US10373240B1 (en) | 2014-04-25 | 2019-08-06 | Csidentity Corporation | Systems, methods and computer-program products for eligibility verification |
US9654469B1 (en) | 2014-05-02 | 2017-05-16 | Nok Nok Labs, Inc. | Web-based user authentication techniques and applications |
US20170109751A1 (en) * | 2014-05-02 | 2017-04-20 | Nok Nok Labs, Inc. | System and method for carrying strong authentication events over different channels |
US9483763B2 (en) | 2014-05-29 | 2016-11-01 | Apple Inc. | User interface for payments |
US9882891B2 (en) | 2014-06-04 | 2018-01-30 | Token One Pty. Ltd. | Identity verification |
US10592900B2 (en) | 2014-06-13 | 2020-03-17 | Sungard Avantgard Llc | Systems and methods for authenticating and providing payment to a supplier |
US9875347B2 (en) | 2014-07-31 | 2018-01-23 | Nok Nok Labs, Inc. | System and method for performing authentication using data analytics |
US10148630B2 (en) | 2014-07-31 | 2018-12-04 | Nok Nok Labs, Inc. | System and method for implementing a hosted authentication service |
CN105634771B (en) * | 2014-10-31 | 2020-04-14 | 索尼公司 | User side device and network side device in communication system and wireless communication method |
US10339527B1 (en) | 2014-10-31 | 2019-07-02 | Experian Information Solutions, Inc. | System and architecture for electronic fraud detection |
US10581843B2 (en) | 2014-11-25 | 2020-03-03 | Certify Global Inc. | Systems and methods of verifying an authenticated document biosignature encoding restricted access information |
US10726113B2 (en) | 2014-11-25 | 2020-07-28 | Certify Global Inc. | Systems and methods of verifying an authenticated document biosignature glyph containing a selected image |
US9652633B2 (en) | 2014-11-25 | 2017-05-16 | Certify Global Inc. | Systems and methods of verifying an authenticated document biosignature |
US10445152B1 (en) | 2014-12-19 | 2019-10-15 | Experian Information Solutions, Inc. | Systems and methods for dynamic report generation based on automatic modeling of complex data structures |
US9875743B2 (en) | 2015-01-26 | 2018-01-23 | Verint Systems Ltd. | Acoustic signature building for a speaker from multiple sessions |
US10853592B2 (en) | 2015-02-13 | 2020-12-01 | Yoti Holding Limited | Digital identity system |
US10692085B2 (en) | 2015-02-13 | 2020-06-23 | Yoti Holding Limited | Secure electronic payment |
US9858408B2 (en) | 2015-02-13 | 2018-01-02 | Yoti Holding Limited | Digital identity system |
US9953318B1 (en) | 2015-05-22 | 2018-04-24 | Intuit Inc. | Automatic transaction-based verification of account ownership |
US11151468B1 (en) | 2015-07-02 | 2021-10-19 | Experian Information Solutions, Inc. | Behavior analysis using distributed representations of event data |
US10853359B1 (en) | 2015-12-21 | 2020-12-01 | Amazon Technologies, Inc. | Data log stream processing using probabilistic data structures |
US10032049B2 (en) | 2016-02-23 | 2018-07-24 | Dynamics Inc. | Magnetic cards and devices for motorized readers |
EP3455998B1 (en) * | 2016-05-12 | 2021-09-01 | Boland, Michael, J. | Identity authentication and information exchange system and method |
DK179186B1 (en) | 2016-05-19 | 2018-01-15 | Apple Inc | REMOTE AUTHORIZATION TO CONTINUE WITH AN ACTION |
US10366389B2 (en) * | 2016-07-28 | 2019-07-30 | Visa International Service Association | Connected device transaction code system |
US10637853B2 (en) | 2016-08-05 | 2020-04-28 | Nok Nok Labs, Inc. | Authentication techniques including speech and/or lip movement analysis |
US10769635B2 (en) | 2016-08-05 | 2020-09-08 | Nok Nok Labs, Inc. | Authentication techniques including speech and/or lip movement analysis |
US20180089680A1 (en) * | 2016-09-28 | 2018-03-29 | Bank Of America Corporation | Partially completed resource geographic triggering and remediation system |
US10237070B2 (en) | 2016-12-31 | 2019-03-19 | Nok Nok Labs, Inc. | System and method for sharing keys across authenticators |
US10091195B2 (en) | 2016-12-31 | 2018-10-02 | Nok Nok Labs, Inc. | System and method for bootstrapping a user binding |
US10516754B1 (en) * | 2017-01-09 | 2019-12-24 | Sprint Communications Company L.P. | Systems and methods for identity confirmation and rapid response to third party identity queries |
US20180374151A1 (en) * | 2017-06-27 | 2018-12-27 | Intuit Inc. | Dynamic reputation score for a digital identity |
US20190042961A1 (en) * | 2017-08-07 | 2019-02-07 | Securiport Llc | Multi-mode data collection and traveler processing |
KR102143148B1 (en) | 2017-09-09 | 2020-08-10 | 애플 인크. | Implementation of biometric authentication |
KR102185854B1 (en) | 2017-09-09 | 2020-12-02 | 애플 인크. | Implementation of biometric authentication |
US10699028B1 (en) | 2017-09-28 | 2020-06-30 | Csidentity Corporation | Identity security architecture systems and methods |
US11276022B2 (en) * | 2017-10-20 | 2022-03-15 | Acuant, Inc. | Enhanced system and method for identity evaluation using a global score value |
US10896472B1 (en) | 2017-11-14 | 2021-01-19 | Csidentity Corporation | Security and identity verification system and architecture |
US11868995B2 (en) | 2017-11-27 | 2024-01-09 | Nok Nok Labs, Inc. | Extending a secure key storage for transaction confirmation and cryptocurrency |
US11068896B2 (en) * | 2017-11-30 | 2021-07-20 | International Business Machines Corporation | Granting requests for authorization using data of devices associated with requestors |
US11831409B2 (en) * | 2018-01-12 | 2023-11-28 | Nok Nok Labs, Inc. | System and method for binding verifiable claims |
US11146546B2 (en) | 2018-01-16 | 2021-10-12 | Acuant, Inc. | Identity proofing and portability on blockchain |
US11416863B2 (en) * | 2018-04-11 | 2022-08-16 | Wells Fargo Bank, N.A. | System and methods for assessing risk of fraud in an electronic transaction |
US11538128B2 (en) | 2018-05-14 | 2022-12-27 | Verint Americas Inc. | User interface for fraud alert management |
US11107157B1 (en) * | 2018-05-31 | 2021-08-31 | Square, Inc. | Intelligent modification of capital loan offerings at point-of-sale |
US11170085B2 (en) | 2018-06-03 | 2021-11-09 | Apple Inc. | Implementation of biometric authentication |
US10546444B2 (en) | 2018-06-21 | 2020-01-28 | Capital One Services, Llc | Systems and methods for secure read-only authentication |
US10911234B2 (en) | 2018-06-22 | 2021-02-02 | Experian Information Solutions, Inc. | System and method for a token gateway environment |
CN112508568A (en) * | 2018-08-15 | 2021-03-16 | 创新先进技术有限公司 | Core product pushing and core method and system |
US10880313B2 (en) | 2018-09-05 | 2020-12-29 | Consumerinfo.Com, Inc. | Database platform for realtime updating of user data from third party sources |
US11100349B2 (en) | 2018-09-28 | 2021-08-24 | Apple Inc. | Audio assisted enrollment |
US10860096B2 (en) | 2018-09-28 | 2020-12-08 | Apple Inc. | Device control using gaze information |
US10505738B1 (en) | 2018-10-02 | 2019-12-10 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
WO2020072670A1 (en) | 2018-10-02 | 2020-04-09 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
US10771254B2 (en) | 2018-10-02 | 2020-09-08 | Capital One Services, Llc | Systems and methods for email-based card activation |
WO2020072552A1 (en) | 2018-10-02 | 2020-04-09 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
US11210664B2 (en) | 2018-10-02 | 2021-12-28 | Capital One Services, Llc | Systems and methods for amplifying the strength of cryptographic algorithms |
US10607214B1 (en) | 2018-10-02 | 2020-03-31 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
US10554411B1 (en) | 2018-10-02 | 2020-02-04 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
KR20210068391A (en) | 2018-10-02 | 2021-06-09 | 캐피탈 원 서비시즈, 엘엘씨 | System and method for cryptographic authentication of contactless card |
US10511443B1 (en) | 2018-10-02 | 2019-12-17 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
US10909527B2 (en) | 2018-10-02 | 2021-02-02 | Capital One Services, Llc | Systems and methods for performing a reissue of a contactless card |
US10733645B2 (en) | 2018-10-02 | 2020-08-04 | Capital One Services, Llc | Systems and methods for establishing identity for order pick up |
US10581611B1 (en) | 2018-10-02 | 2020-03-03 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
US11368446B2 (en) * | 2018-10-02 | 2022-06-21 | International Business Machines Corporation | Trusted account revocation in federated identity management |
US10542036B1 (en) | 2018-10-02 | 2020-01-21 | Capital One Services, Llc | Systems and methods for signaling an attack on contactless cards |
WO2020072537A1 (en) | 2018-10-02 | 2020-04-09 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
US10565587B1 (en) | 2018-10-02 | 2020-02-18 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
US10582386B1 (en) | 2018-10-02 | 2020-03-03 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
US10579998B1 (en) | 2018-10-02 | 2020-03-03 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
JP2022508026A (en) | 2018-10-02 | 2022-01-19 | キャピタル・ワン・サービシーズ・リミテッド・ライアビリティ・カンパニー | Systems and methods for cryptographic authentication of non-contact cards |
US10748138B2 (en) | 2018-10-02 | 2020-08-18 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
JP2022511281A (en) | 2018-10-02 | 2022-01-31 | キャピタル・ワン・サービシーズ・リミテッド・ライアビリティ・カンパニー | Systems and methods for cryptographic authentication of non-contact cards |
US10592710B1 (en) | 2018-10-02 | 2020-03-17 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
US10771253B2 (en) | 2018-10-02 | 2020-09-08 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
WO2020072690A1 (en) | 2018-10-02 | 2020-04-09 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
US10949520B2 (en) | 2018-10-02 | 2021-03-16 | Capital One Services, Llc | Systems and methods for cross coupling risk analytics and one-time-passcodes |
US10841091B2 (en) | 2018-10-02 | 2020-11-17 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
US10992477B2 (en) | 2018-10-02 | 2021-04-27 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
SG11202101221WA (en) | 2018-10-02 | 2021-03-30 | Capital One Services Llc | Systems and methods for cryptographic authentication of contactless cards |
US10860814B2 (en) | 2018-10-02 | 2020-12-08 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
US10623393B1 (en) | 2018-10-02 | 2020-04-14 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
US10489781B1 (en) | 2018-10-02 | 2019-11-26 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
US10887452B2 (en) | 2018-10-25 | 2021-01-05 | Verint Americas Inc. | System architecture for fraud detection |
US11315179B1 (en) | 2018-11-16 | 2022-04-26 | Consumerinfo.Com, Inc. | Methods and apparatuses for customized card recommendations |
CN109800593B (en) * | 2018-12-07 | 2023-05-30 | 上海益政网络科技发展有限公司 | Information matching method and system |
US20200226581A1 (en) | 2019-01-11 | 2020-07-16 | Capital One Services, Llc | Systems and methods for touch screen interface interaction using a card overlay |
US11037136B2 (en) | 2019-01-24 | 2021-06-15 | Capital One Services, Llc | Tap to autofill card data |
US10467622B1 (en) | 2019-02-01 | 2019-11-05 | Capital One Services, Llc | Using on-demand applications to generate virtual numbers for a contactless card to securely autofill forms |
US10510074B1 (en) | 2019-02-01 | 2019-12-17 | Capital One Services, Llc | One-tap payment using a contactless card |
US11120453B2 (en) | 2019-02-01 | 2021-09-14 | Capital One Services, Llc | Tap card to securely generate card data to copy to clipboard |
US10672005B1 (en) * | 2019-02-19 | 2020-06-02 | Capital One Services, Llc | Updating a machine learning fraud model based on third party transaction information |
US11238656B1 (en) | 2019-02-22 | 2022-02-01 | Consumerinfo.Com, Inc. | System and method for an augmented reality experience via an artificial intelligence bot |
US10425129B1 (en) | 2019-02-27 | 2019-09-24 | Capital One Services, Llc | Techniques to reduce power consumption in near field communication systems |
US10523708B1 (en) | 2019-03-18 | 2019-12-31 | Capital One Services, Llc | System and method for second factor authentication of customer support calls |
US10535062B1 (en) | 2019-03-20 | 2020-01-14 | Capital One Services, Llc | Using a contactless card to securely share personal data stored in a blockchain |
US10643420B1 (en) | 2019-03-20 | 2020-05-05 | Capital One Services, Llc | Contextual tapping engine |
US10438437B1 (en) | 2019-03-20 | 2019-10-08 | Capital One Services, Llc | Tap to copy data to clipboard via NFC |
US10984416B2 (en) | 2019-03-20 | 2021-04-20 | Capital One Services, Llc | NFC mobile currency transfer |
US10970712B2 (en) | 2019-03-21 | 2021-04-06 | Capital One Services, Llc | Delegated administration of permissions using a contactless card |
US10467445B1 (en) | 2019-03-28 | 2019-11-05 | Capital One Services, Llc | Devices and methods for contactless card alignment with a foldable mobile device |
US11792024B2 (en) | 2019-03-29 | 2023-10-17 | Nok Nok Labs, Inc. | System and method for efficient challenge-response authentication |
US11521262B2 (en) | 2019-05-28 | 2022-12-06 | Capital One Services, Llc | NFC enhanced augmented reality information overlays |
US10516447B1 (en) | 2019-06-17 | 2019-12-24 | Capital One Services, Llc | Dynamic power levels in NFC card communications |
EP3987743A1 (en) | 2019-06-20 | 2022-04-27 | Verint Americas Inc. | Systems and methods for authentication and fraud detection |
US10871958B1 (en) | 2019-07-03 | 2020-12-22 | Capital One Services, Llc | Techniques to perform applet programming |
US11392933B2 (en) | 2019-07-03 | 2022-07-19 | Capital One Services, Llc | Systems and methods for providing online and hybridcard interactions |
US11694187B2 (en) | 2019-07-03 | 2023-07-04 | Capital One Services, Llc | Constraining transactional capabilities for contactless cards |
US10713649B1 (en) | 2019-07-09 | 2020-07-14 | Capital One Services, Llc | System and method enabling mobile near-field communication to update display on a payment card |
US10498401B1 (en) | 2019-07-15 | 2019-12-03 | Capital One Services, Llc | System and method for guiding card positioning using phone sensors |
US10885514B1 (en) | 2019-07-15 | 2021-01-05 | Capital One Services, Llc | System and method for using image data to trigger contactless card transactions |
US10733601B1 (en) | 2019-07-17 | 2020-08-04 | Capital One Services, Llc | Body area network facilitated authentication or payment authorization |
US10832271B1 (en) | 2019-07-17 | 2020-11-10 | Capital One Services, Llc | Verified reviews using a contactless card |
US11182771B2 (en) | 2019-07-17 | 2021-11-23 | Capital One Services, Llc | System for value loading onto in-vehicle device |
US11521213B2 (en) | 2019-07-18 | 2022-12-06 | Capital One Services, Llc | Continuous authentication for digital services based on contactless card positioning |
US10506426B1 (en) | 2019-07-19 | 2019-12-10 | Capital One Services, Llc | Techniques for call authentication |
US10541995B1 (en) | 2019-07-23 | 2020-01-21 | Capital One Services, Llc | First factor contactless card authentication system and method |
WO2021026736A1 (en) * | 2019-08-12 | 2021-02-18 | Advanced New Technologies Co., Ltd. | Blockchain-based judgment execution |
US11941065B1 (en) | 2019-09-13 | 2024-03-26 | Experian Information Solutions, Inc. | Single identifier platform for storing entity data |
AU2019469080A1 (en) | 2019-10-02 | 2022-04-21 | Capital One Services, Llc | Client device authentication using contactless legacy magnetic stripe data |
US11488214B2 (en) * | 2019-10-03 | 2022-11-01 | Capital One Services, Llc | High authentication layer to determine a person's location when considering sending a secure object |
US11144619B2 (en) * | 2019-10-11 | 2021-10-12 | East West Bank | Systems and methods for remotely verifying identity of non-resident aliens |
US11868453B2 (en) | 2019-11-07 | 2024-01-09 | Verint Americas Inc. | Systems and methods for customer authentication based on audio-of-interest |
US11651361B2 (en) | 2019-12-23 | 2023-05-16 | Capital One Services, Llc | Secure authentication based on passport data stored in a contactless card |
US10657754B1 (en) | 2019-12-23 | 2020-05-19 | Capital One Services, Llc | Contactless card and personal identification system |
US11113685B2 (en) | 2019-12-23 | 2021-09-07 | Capital One Services, Llc | Card issuing with restricted virtual numbers |
US10862540B1 (en) | 2019-12-23 | 2020-12-08 | Capital One Services, Llc | Method for mapping NFC field strength and location on mobile devices |
US10885410B1 (en) | 2019-12-23 | 2021-01-05 | Capital One Services, Llc | Generating barcodes utilizing cryptographic techniques |
US11615395B2 (en) | 2019-12-23 | 2023-03-28 | Capital One Services, Llc | Authentication for third party digital wallet provisioning |
US10733283B1 (en) | 2019-12-23 | 2020-08-04 | Capital One Services, Llc | Secure password generation and management using NFC and contactless smart cards |
US11200563B2 (en) | 2019-12-24 | 2021-12-14 | Capital One Services, Llc | Account registration using a contactless card |
US10853795B1 (en) | 2019-12-24 | 2020-12-01 | Capital One Services, Llc | Secure authentication based on identity data stored in a contactless card |
US10664941B1 (en) | 2019-12-24 | 2020-05-26 | Capital One Services, Llc | Steganographic image encoding of biometric template information on a card |
US10909544B1 (en) | 2019-12-26 | 2021-02-02 | Capital One Services, Llc | Accessing and utilizing multiple loyalty point accounts |
US10757574B1 (en) | 2019-12-26 | 2020-08-25 | Capital One Services, Llc | Multi-factor authentication providing a credential via a contactless card for secure messaging |
US11038688B1 (en) | 2019-12-30 | 2021-06-15 | Capital One Services, Llc | Techniques to control applets for contactless cards |
US10860914B1 (en) | 2019-12-31 | 2020-12-08 | Capital One Services, Llc | Contactless card and method of assembly |
US11455620B2 (en) | 2019-12-31 | 2022-09-27 | Capital One Services, Llc | Tapping a contactless card to a computing device to provision a virtual number |
US11210656B2 (en) | 2020-04-13 | 2021-12-28 | Capital One Services, Llc | Determining specific terms for contactless card activation |
US10861006B1 (en) | 2020-04-30 | 2020-12-08 | Capital One Services, Llc | Systems and methods for data access control using a short-range transceiver |
US11030339B1 (en) | 2020-04-30 | 2021-06-08 | Capital One Services, Llc | Systems and methods for data access control of personal user data using a short-range transceiver |
US11222342B2 (en) | 2020-04-30 | 2022-01-11 | Capital One Services, Llc | Accurate images in graphical user interfaces to enable data transfer |
US11455606B2 (en) * | 2020-04-30 | 2022-09-27 | Capital One Services, Llc | Tap to pay a credit bill via a computing device |
US10915888B1 (en) | 2020-04-30 | 2021-02-09 | Capital One Services, Llc | Contactless card with multiple rotating security keys |
US11823175B2 (en) | 2020-04-30 | 2023-11-21 | Capital One Services, Llc | Intelligent card unlock |
US10963865B1 (en) | 2020-05-12 | 2021-03-30 | Capital One Services, Llc | Augmented reality card activation experience |
US11100511B1 (en) | 2020-05-18 | 2021-08-24 | Capital One Services, Llc | Application-based point of sale system in mobile operating systems |
US11063979B1 (en) | 2020-05-18 | 2021-07-13 | Capital One Services, Llc | Enabling communications between applications in a mobile operating system |
US11062098B1 (en) | 2020-08-11 | 2021-07-13 | Capital One Services, Llc | Augmented reality information display and interaction via NFC based authentication |
US11165586B1 (en) | 2020-10-30 | 2021-11-02 | Capital One Services, Llc | Call center web-based authentication using a contactless card |
US11482312B2 (en) | 2020-10-30 | 2022-10-25 | Capital One Services, Llc | Secure verification of medical status using a contactless card |
US11373169B2 (en) | 2020-11-03 | 2022-06-28 | Capital One Services, Llc | Web-based activation of contactless cards |
TWI770676B (en) * | 2020-11-17 | 2022-07-11 | 玉山商業銀行股份有限公司 | System and method for online transaction processing |
US11216799B1 (en) | 2021-01-04 | 2022-01-04 | Capital One Services, Llc | Secure generation of one-time passcodes using a contactless card |
US11682012B2 (en) | 2021-01-27 | 2023-06-20 | Capital One Services, Llc | Contactless delivery systems and methods |
US11562358B2 (en) | 2021-01-28 | 2023-01-24 | Capital One Services, Llc | Systems and methods for near field contactless card communication and cryptographic authentication |
US11792001B2 (en) | 2021-01-28 | 2023-10-17 | Capital One Services, Llc | Systems and methods for secure reprovisioning |
US11687930B2 (en) | 2021-01-28 | 2023-06-27 | Capital One Services, Llc | Systems and methods for authentication of access tokens |
US11438329B2 (en) | 2021-01-29 | 2022-09-06 | Capital One Services, Llc | Systems and methods for authenticated peer-to-peer data transfer using resource locators |
US11777933B2 (en) | 2021-02-03 | 2023-10-03 | Capital One Services, Llc | URL-based authentication for payment cards |
US11637826B2 (en) | 2021-02-24 | 2023-04-25 | Capital One Services, Llc | Establishing authentication persistence |
US11245438B1 (en) | 2021-03-26 | 2022-02-08 | Capital One Services, Llc | Network-enabled smart apparatus and systems and methods for activating and provisioning same |
US11935035B2 (en) | 2021-04-20 | 2024-03-19 | Capital One Services, Llc | Techniques to utilize resource locators by a contactless card to perform a sequence of operations |
US11902442B2 (en) | 2021-04-22 | 2024-02-13 | Capital One Services, Llc | Secure management of accounts on display devices using a contactless card |
US11354555B1 (en) | 2021-05-04 | 2022-06-07 | Capital One Services, Llc | Methods, mediums, and systems for applying a display to a transaction card |
US20230214822A1 (en) * | 2022-01-05 | 2023-07-06 | Mastercard International Incorporated | Computer-implemented methods and systems for authentic user-merchant association and services |
Citations (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5826245A (en) * | 1995-03-20 | 1998-10-20 | Sandberg-Diment; Erik | Providing verification information for a transaction |
US6018724A (en) * | 1997-06-30 | 2000-01-25 | Sun Micorsystems, Inc. | Method and apparatus for authenticating on-line transaction data |
US20020040346A1 (en) * | 2000-09-27 | 2002-04-04 | Kwan Khai Hee | Computer system and method for on-line generating a password protected and barcode prepaid instrument of entitlement and activating said instrument on presentation over a computer network |
US20020099667A1 (en) * | 2001-01-23 | 2002-07-25 | Diamandis Peter H. | Mehtod and apparatus for making purchases over the internet using pre-paid cards |
US20020190124A1 (en) * | 2001-06-15 | 2002-12-19 | Koninklijke Philips Electronics N.V. | Point-of-sale (POS) voice authentication transaction system |
US20040185830A1 (en) * | 1996-08-08 | 2004-09-23 | Joao Raymond Anthony | Apparatus and method for providing account security |
US20040260615A1 (en) * | 2003-06-18 | 2004-12-23 | Phillips Brian A. | Method and system for facilitating shipping via third-party payment service |
US20050015332A1 (en) * | 2003-07-18 | 2005-01-20 | Grace Chen | Cashless payment system |
US20050071244A1 (en) * | 2003-06-18 | 2005-03-31 | Phillips Brian Andrew | Method and system for facilitating shipping via a third-party payment service |
US6925565B2 (en) * | 2001-05-25 | 2005-08-02 | Pen-One, Inc | Pen-based transponder identity verification system |
US20050199706A1 (en) * | 2004-03-12 | 2005-09-15 | American Express Travel Related Services Company, | Systems, methods, and devices for selling transaction instruments via web-based tool |
US20060018450A1 (en) * | 2004-07-26 | 2006-01-26 | Erik Sandberg-Diment | Mobile telephone transaction system employing electronic account card |
US20060026108A1 (en) * | 2004-07-30 | 2006-02-02 | Paul Wilson | Voice/data financial transaction monitoring methods and systems |
US20070100751A1 (en) * | 2005-11-01 | 2007-05-03 | Lorenzo Carver | Method and system for processing and preventing credit card fraud in simultaneous remote wholesale exchange and local fullfillment of retail transactions by third party retailers |
US20070124211A1 (en) * | 2000-03-27 | 2007-05-31 | Smith Steven B | Methods and apparatus for wireless point-of-sale transactions |
US7379920B2 (en) * | 2001-12-04 | 2008-05-27 | Gary Leung | System and method for facilitating electronic financial transactions using a mobile telecommunication device |
US20080141033A1 (en) * | 1995-02-13 | 2008-06-12 | Intertrust Technologies Corporation | Trusted and secure techniques, systems and methods for item delivery and execution |
US7437330B1 (en) * | 2002-09-20 | 2008-10-14 | Yt Acquisition Corp. | System and method for categorizing transactions |
US7502760B1 (en) * | 2004-07-19 | 2009-03-10 | Amazon Technologies, Inc. | Providing payments automatically in accordance with predefined instructions |
US7500606B2 (en) * | 2006-04-14 | 2009-03-10 | Harexinfotech, Inc. | Method of settling signatureless payment of bank card sales slip in mobile terminal, and system therefor |
US7810720B2 (en) * | 2005-06-13 | 2010-10-12 | Robert Lovett | Account payment using barcode information exchange |
US7907896B2 (en) * | 2006-04-28 | 2011-03-15 | Motorola Mobility, Inc. | Mobile commerce method and device |
USRE45409E1 (en) * | 2004-03-12 | 2015-03-10 | Sharecomm Limited Liability Company | Systems, methods and devices for selling transaction instruments |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US38707A (en) | 1863-05-26 | Improvement in water-wheels | ||
IL135150A0 (en) * | 2000-03-17 | 2001-05-20 | Avner Geller | A method and a system for secured identification of user's identity |
EP1316171A4 (en) * | 2000-08-04 | 2006-05-03 | First Data Corp | Person-centric account-based digital signature system |
US7558965B2 (en) * | 2000-08-04 | 2009-07-07 | First Data Corporation | Entity authentication in electronic communications by providing verification status of device |
US7337144B1 (en) * | 2000-09-28 | 2008-02-26 | Microsoft Corporation | Method and system for restricting the usage of payment accounts |
US20020087460A1 (en) * | 2001-01-04 | 2002-07-04 | Hornung Katharine A. | Method for identity theft protection |
US7801828B2 (en) * | 2001-07-06 | 2010-09-21 | Candella George J | Method and system for detecting identity theft in non-personal and personal transactions |
US20030061163A1 (en) * | 2001-09-27 | 2003-03-27 | Durfield Richard C. | Method and apparatus for verification/authorization by credit or debit card owner of use of card concurrently with merchant transaction |
US20030070101A1 (en) * | 2001-10-09 | 2003-04-10 | Buscemi James S. | Method and apparatus for protecting personal information and for verifying identities |
US8255978B2 (en) * | 2003-03-11 | 2012-08-28 | Innovatrend, Inc. | Verified personal information database |
US20050027983A1 (en) * | 2003-08-01 | 2005-02-03 | Klawon Kevin T. | Integrated verification system |
JP2005079926A (en) * | 2003-08-29 | 2005-03-24 | Brother Ind Ltd | Image reader and copying machine equipped with the same |
WO2005048145A1 (en) * | 2003-10-13 | 2005-05-26 | Starbucks Corporation D/B/A Starbucks Coffee Company | Dual card |
US8321946B2 (en) * | 2003-12-05 | 2012-11-27 | Hewlett-Packard Development Company, L.P. | Method and system for preventing identity theft in electronic communications |
US20050154671A1 (en) * | 2004-01-08 | 2005-07-14 | International Business Machines Corporation | Systems and methods for mitigating identity theft associated with use of credit and debit cards |
US20050165797A1 (en) * | 2004-01-16 | 2005-07-28 | Girish Nair | Profile verification system |
US7590232B2 (en) * | 2004-07-21 | 2009-09-15 | Carter John A | System and method for tracking individuals |
US8065525B2 (en) * | 2004-09-22 | 2011-11-22 | Bekad Mgmt. Ii, Llc | Device with built-in user authentication and method for user authentication and identity theft protection |
US20060282270A1 (en) * | 2005-06-09 | 2006-12-14 | First Data Corporation | Identity verification noise filter systems and methods |
-
2005
- 2005-12-07 WO PCT/US2005/044161 patent/WO2006062998A2/en active Application Filing
- 2005-12-07 US US11/295,516 patent/US8224753B2/en active Active
- 2005-12-07 TW TW094143293A patent/TW200642408A/en unknown
-
2007
- 2007-07-03 GB GBGB0712870.5A patent/GB0712870D0/en not_active Ceased
-
2012
- 2012-06-15 US US13/524,312 patent/US20120290482A1/en not_active Abandoned
Patent Citations (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080141033A1 (en) * | 1995-02-13 | 2008-06-12 | Intertrust Technologies Corporation | Trusted and secure techniques, systems and methods for item delivery and execution |
US5826245A (en) * | 1995-03-20 | 1998-10-20 | Sandberg-Diment; Erik | Providing verification information for a transaction |
US20040185830A1 (en) * | 1996-08-08 | 2004-09-23 | Joao Raymond Anthony | Apparatus and method for providing account security |
US6018724A (en) * | 1997-06-30 | 2000-01-25 | Sun Micorsystems, Inc. | Method and apparatus for authenticating on-line transaction data |
US20070124211A1 (en) * | 2000-03-27 | 2007-05-31 | Smith Steven B | Methods and apparatus for wireless point-of-sale transactions |
US20020040346A1 (en) * | 2000-09-27 | 2002-04-04 | Kwan Khai Hee | Computer system and method for on-line generating a password protected and barcode prepaid instrument of entitlement and activating said instrument on presentation over a computer network |
US20020099667A1 (en) * | 2001-01-23 | 2002-07-25 | Diamandis Peter H. | Mehtod and apparatus for making purchases over the internet using pre-paid cards |
US6925565B2 (en) * | 2001-05-25 | 2005-08-02 | Pen-One, Inc | Pen-based transponder identity verification system |
US20020190124A1 (en) * | 2001-06-15 | 2002-12-19 | Koninklijke Philips Electronics N.V. | Point-of-sale (POS) voice authentication transaction system |
US7379920B2 (en) * | 2001-12-04 | 2008-05-27 | Gary Leung | System and method for facilitating electronic financial transactions using a mobile telecommunication device |
US7437330B1 (en) * | 2002-09-20 | 2008-10-14 | Yt Acquisition Corp. | System and method for categorizing transactions |
US20050071244A1 (en) * | 2003-06-18 | 2005-03-31 | Phillips Brian Andrew | Method and system for facilitating shipping via a third-party payment service |
US20040260615A1 (en) * | 2003-06-18 | 2004-12-23 | Phillips Brian A. | Method and system for facilitating shipping via third-party payment service |
US20050015332A1 (en) * | 2003-07-18 | 2005-01-20 | Grace Chen | Cashless payment system |
US20050199706A1 (en) * | 2004-03-12 | 2005-09-15 | American Express Travel Related Services Company, | Systems, methods, and devices for selling transaction instruments via web-based tool |
USRE45409E1 (en) * | 2004-03-12 | 2015-03-10 | Sharecomm Limited Liability Company | Systems, methods and devices for selling transaction instruments |
US7502760B1 (en) * | 2004-07-19 | 2009-03-10 | Amazon Technologies, Inc. | Providing payments automatically in accordance with predefined instructions |
US20060018450A1 (en) * | 2004-07-26 | 2006-01-26 | Erik Sandberg-Diment | Mobile telephone transaction system employing electronic account card |
US20060026108A1 (en) * | 2004-07-30 | 2006-02-02 | Paul Wilson | Voice/data financial transaction monitoring methods and systems |
US7810720B2 (en) * | 2005-06-13 | 2010-10-12 | Robert Lovett | Account payment using barcode information exchange |
US20070100751A1 (en) * | 2005-11-01 | 2007-05-03 | Lorenzo Carver | Method and system for processing and preventing credit card fraud in simultaneous remote wholesale exchange and local fullfillment of retail transactions by third party retailers |
US7500606B2 (en) * | 2006-04-14 | 2009-03-10 | Harexinfotech, Inc. | Method of settling signatureless payment of bank card sales slip in mobile terminal, and system therefor |
US7907896B2 (en) * | 2006-04-28 | 2011-03-15 | Motorola Mobility, Inc. | Mobile commerce method and device |
Cited By (80)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130066767A1 (en) * | 2011-03-30 | 2013-03-14 | Douglas D. Fusco | System and Method for Credit Information Acquisition, Aggregation, and Funding |
US20120254017A1 (en) * | 2011-03-30 | 2012-10-04 | Fusco Douglas D | System and Method for Credit Information Acquisition, Aggregation, and Maintenance |
US8972298B2 (en) * | 2012-07-31 | 2015-03-03 | Google Inc. | Merchant category codes in a proxy card transaction |
US20140040130A1 (en) * | 2012-07-31 | 2014-02-06 | Google Inc. | Merchant category codes in a proxy card transaction |
US8676709B2 (en) * | 2012-07-31 | 2014-03-18 | Google Inc. | Merchant category codes in a proxy card transaction |
US20140149292A1 (en) * | 2012-07-31 | 2014-05-29 | Google Inc. | Merchant category codes in a proxy card transaction |
US10026119B2 (en) * | 2012-09-10 | 2018-07-17 | Google Llc | Efficient transfer of funds between accounts |
US20140172690A1 (en) * | 2012-12-17 | 2014-06-19 | Sas Institute Inc. | Systems and Methods For Matching Domain Specific Transactions |
US20140297435A1 (en) * | 2013-03-28 | 2014-10-02 | Hoiling Angel WONG | Bank card secured payment system and method using real-time communication technology |
WO2014182785A1 (en) * | 2013-05-07 | 2014-11-13 | Ramalingam Krishnamurthi Anand | Fraud prevention for transactions |
US9020859B2 (en) | 2013-05-13 | 2015-04-28 | Ramalingam Krishnamurthi Anand | Fraud prevention for transactions |
US10678898B2 (en) * | 2013-05-13 | 2020-06-09 | Veridium Ip Limited | System and method for authorizing access to access-controlled environments |
US11210380B2 (en) * | 2013-05-13 | 2021-12-28 | Veridium Ip Limited | System and method for authorizing access to access-controlled environments |
US20160203531A1 (en) * | 2013-10-01 | 2016-07-14 | Amadellas Corporation | Devices and methods for information processing and access control |
US10762541B2 (en) * | 2013-10-01 | 2020-09-01 | Amadellas Corporation | Devices and methods for information processing and access control |
US9525685B2 (en) | 2014-02-07 | 2016-12-20 | Bank Of America Corporation | User authentication based on other applications |
US10050962B2 (en) | 2014-02-07 | 2018-08-14 | Bank Of America Corporation | Determining user authentication requirements along a continuum based on a current state of the user and/or the attributes related to the function requiring authentication |
US9628495B2 (en) | 2014-02-07 | 2017-04-18 | Bank Of America Corporation | Self-selected user access based on specific authentication types |
US9819680B2 (en) | 2014-02-07 | 2017-11-14 | Bank Of America Corporation | Determining user authentication requirements based on the current location of the user in comparison to the users's normal boundary of location |
US9647999B2 (en) | 2014-02-07 | 2017-05-09 | Bank Of America Corporation | Authentication level of function bucket based on circumstances |
US9965606B2 (en) | 2014-02-07 | 2018-05-08 | Bank Of America Corporation | Determining user authentication based on user/device interaction |
US9721248B2 (en) | 2014-03-04 | 2017-08-01 | Bank Of America Corporation | ATM token cash withdrawal |
US10140610B2 (en) | 2014-03-04 | 2018-11-27 | Bank Of America Corporation | Customer token preferences interface |
US10762483B2 (en) | 2014-03-04 | 2020-09-01 | Bank Of America Corporation | ATM token cash withdrawal |
US9721268B2 (en) | 2014-03-04 | 2017-08-01 | Bank Of America Corporation | Providing offers associated with payment credentials authenticated in a specific digital wallet |
US9830597B2 (en) | 2014-03-04 | 2017-11-28 | Bank Of America Corporation | Formation and funding of a shared token |
US9406065B2 (en) | 2014-03-04 | 2016-08-02 | Bank Of America Corporation | Customer token preferences interface |
US9424572B2 (en) | 2014-03-04 | 2016-08-23 | Bank Of America Corporation | Online banking digital wallet management |
US9652764B2 (en) | 2014-03-04 | 2017-05-16 | Bank Of America Corporation | Online banking digital wallet management |
US10002352B2 (en) | 2014-03-04 | 2018-06-19 | Bank Of America Corporation | Digital wallet exposure reduction |
US9639836B2 (en) | 2014-03-04 | 2017-05-02 | Bank Of America Corporation | Online banking digital wallet management |
US9600817B2 (en) | 2014-03-04 | 2017-03-21 | Bank Of America Corporation | Foreign exchange token |
US9600844B2 (en) | 2014-03-04 | 2017-03-21 | Bank Of America Corporation | Foreign cross-issued token |
US10134030B2 (en) | 2014-03-04 | 2018-11-20 | Bank Of America Corporation | Customer token preferences interface |
US10176542B2 (en) * | 2014-03-24 | 2019-01-08 | Mastercard International Incorporated | Systems and methods for identity validation and verification |
WO2015191741A1 (en) * | 2014-06-10 | 2015-12-17 | Board Of Trustees Of The Leland Stanford Junior University Office Of The General Counsel | Systems and methods for conducting relationship dependent online transactions |
US10614452B2 (en) | 2014-09-16 | 2020-04-07 | Mastercard International Incorporated | Systems and methods for providing risk based decisioning service to a merchant |
US10657521B2 (en) | 2014-09-16 | 2020-05-19 | Mastercard International Incorporated | Systems and methods for determining fraudulent transactions using digital wallet data |
US11501286B2 (en) | 2014-09-16 | 2022-11-15 | Mastercard International Incorporated | Systems and methods for providing fraud indicator data within an authentication protocol |
US11815864B2 (en) | 2014-10-07 | 2023-11-14 | State Farm Mutual Automobile Insurance Company | Systems and methods for managing building code compliance for a property |
US11423754B1 (en) | 2014-10-07 | 2022-08-23 | State Farm Mutual Automobile Insurance Company | Systems and methods for improved assisted or independent living environments |
US11551235B1 (en) * | 2014-10-07 | 2023-01-10 | State Farm Mutual Automobile Insurance Company | Systems and methods for managing building code compliance for a property |
US10872329B2 (en) * | 2015-09-03 | 2020-12-22 | Mobile Elements Corp | Contactless mobile payment system |
US20180276652A1 (en) * | 2015-09-03 | 2018-09-27 | Dionisios A. Sofronas | Contactless mobile payment system |
US9965523B2 (en) | 2015-10-30 | 2018-05-08 | Bank Of America Corporation | Tiered identification federated authentication network system |
US9729536B2 (en) | 2015-10-30 | 2017-08-08 | Bank Of America Corporation | Tiered identification federated authentication network system |
US10460367B2 (en) | 2016-04-29 | 2019-10-29 | Bank Of America Corporation | System for user authentication based on linking a randomly generated number to the user and a physical item |
EP3465418A4 (en) * | 2016-06-06 | 2019-09-25 | Financial & Risk Organisation Limited | Systems and methods for providing identity scores |
US11063765B2 (en) | 2016-06-06 | 2021-07-13 | Refinitiv Us Organization Llc | Systems and methods for providing identity scores |
WO2017213719A1 (en) | 2016-06-06 | 2017-12-14 | Thomson Reuters Global Resources | Systems and methods for providing identity scores |
US10469263B2 (en) | 2016-06-06 | 2019-11-05 | Refinitiv Us Organization Llc | Systems and methods for providing identity scores |
AU2020200880B2 (en) * | 2016-06-06 | 2021-11-04 | Financial & Risk Organisation Limited | Systems and methods for providing identity scores |
US10268635B2 (en) | 2016-06-17 | 2019-04-23 | Bank Of America Corporation | System for data rotation through tokenization |
US10574643B2 (en) | 2016-09-09 | 2020-02-25 | Trusona, Inc. | Systems and methods for distribution of selected authentication information for a network of devices |
US10313480B2 (en) | 2017-06-22 | 2019-06-04 | Bank Of America Corporation | Data transmission between networked resources |
US10986541B2 (en) | 2017-06-22 | 2021-04-20 | Bank Of America Corporation | Dynamic utilization of alternative resources based on token association |
US10511692B2 (en) | 2017-06-22 | 2019-12-17 | Bank Of America Corporation | Data transmission to a networked resource based on contextual information |
US11190617B2 (en) | 2017-06-22 | 2021-11-30 | Bank Of America Corporation | Data transmission to a networked resource based on contextual information |
US10524165B2 (en) | 2017-06-22 | 2019-12-31 | Bank Of America Corporation | Dynamic utilization of alternative resources based on token association |
US10469504B1 (en) | 2017-09-08 | 2019-11-05 | Stripe, Inc. | Systems and methods for using one or more networks to assess a metric about an entity |
US11503033B2 (en) | 2017-09-08 | 2022-11-15 | Stripe, Inc. | Using one or more networks to assess one or more metrics about an entity |
US11323420B2 (en) * | 2017-11-16 | 2022-05-03 | Visa International Service Association | Providing assertions regarding entities |
US11824838B2 (en) * | 2017-11-16 | 2023-11-21 | Visa International Service Association | Providing assertions regarding entities |
US20220303248A1 (en) * | 2017-11-16 | 2022-09-22 | Visa International Service Association | Providing assertions regarding entities |
US11869328B2 (en) | 2018-04-09 | 2024-01-09 | State Farm Mutual Automobile Insurance Company | Sensing peripheral heuristic evidence, reinforcement, and engagement system |
US11670153B2 (en) | 2018-04-09 | 2023-06-06 | State Farm Mutual Automobile Insurance Company | Sensing peripheral heuristic evidence, reinforcement, and engagement system |
US11462094B2 (en) | 2018-04-09 | 2022-10-04 | State Farm Mutual Automobile Insurance Company | Sensing peripheral heuristic evidence, reinforcement, and engagement system |
US11423758B2 (en) | 2018-04-09 | 2022-08-23 | State Farm Mutual Automobile Insurance Company | Sensing peripheral heuristic evidence, reinforcement, and engagement system |
US11887461B2 (en) | 2018-04-09 | 2024-01-30 | State Farm Mutual Automobile Insurance Company | Sensing peripheral heuristic evidence, reinforcement, and engagement system |
US11222340B2 (en) * | 2018-05-15 | 2022-01-11 | Capital One Services, Llc | Generating a random verification code for a transaction |
US20200104853A1 (en) * | 2018-05-15 | 2020-04-02 | Capital One Services, Llc | Generating a random verification code for a transaction |
US20220129902A1 (en) * | 2018-05-15 | 2022-04-28 | Capital One Services, Llc | Generating a random verification code for a transaction |
US10496998B1 (en) * | 2018-05-15 | 2019-12-03 | Capital One Services, Llc | Generating a random verification code for a transaction |
US10402817B1 (en) * | 2018-10-12 | 2019-09-03 | Capital One Services, Llc | Relaxed fraud detection for transactions using virtual transaction cards |
US20220237589A1 (en) * | 2018-10-12 | 2022-07-28 | Capital One Services, Llc | Relaxed fraud detection for transactions using virtual transaction cards |
US11836707B2 (en) * | 2018-10-12 | 2023-12-05 | Capital One Services, Llc | Relaxed fraud detection for transactions using virtual transaction cards |
US11315106B2 (en) * | 2018-10-12 | 2022-04-26 | Capital One Services, Llc | Relaxed fraud detection for transactions using virtual transaction cards |
US11321716B2 (en) | 2019-02-15 | 2022-05-03 | Visa International Service Association | Identity-based transaction processing |
TWI767254B (en) * | 2020-06-17 | 2022-06-11 | 玉山商業銀行股份有限公司 | Authorization system and method thereof |
US11706225B1 (en) | 2022-05-02 | 2023-07-18 | Bank Of America Corporation | System for source independent but source value dependent transfer monitoring |
Also Published As
Publication number | Publication date |
---|---|
GB0712870D0 (en) | 2007-08-08 |
WO2006062998A3 (en) | 2007-03-29 |
US8224753B2 (en) | 2012-07-17 |
WO2006062998A9 (en) | 2006-07-20 |
WO2006062998A2 (en) | 2006-06-15 |
US20060161435A1 (en) | 2006-07-20 |
TW200642408A (en) | 2006-12-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8224753B2 (en) | System and method for identity verification and management | |
US20220180361A1 (en) | Transactional approval system | |
RU2438172C2 (en) | Method and system for performing two-factor authentication in mail order and telephone order transactions | |
US9582802B2 (en) | Identity theft and fraud protection system and method | |
JP5663487B2 (en) | System and method for processing transactions with online merchants | |
US8239677B2 (en) | Verification and authentication systems and methods | |
US8719106B2 (en) | Identity theft and fraud protection system and method | |
US7376628B2 (en) | Methods and systems for carrying out contingency-dependent payments via secure electronic bank drafts supported by online letters of credit and/or online performance bonds | |
AU2004319618B2 (en) | Multiple party benefit from an online authentication service | |
US20060273155A1 (en) | System and method for on-line commerce operations | |
US20020099648A1 (en) | Method of reducing fraud in credit card and other E-business | |
US20100179906A1 (en) | Payment authorization method and apparatus | |
US20060173776A1 (en) | A Method of Authentication | |
US20080114670A1 (en) | Systems and methods for a transaction vetting service | |
US20100100482A1 (en) | Intermediate Data Generation For Transaction Processing | |
US20080015988A1 (en) | Proxy card authorization system | |
US6941282B1 (en) | Methods and systems for carrying out directory-authenticated electronic transactions including contingency-dependent payments via secure electronic bank drafts | |
KR20080067641A (en) | Identity theft and fraud protection system and method | |
JP2005517252A (en) | Method and system for verifying authority of holder of digital certificate issued by certificate authority | |
KR20030019466A (en) | Method and system of securely collecting, storing, and transmitting information | |
US20080071674A1 (en) | System and method for on-line commerce operations including payment transactions | |
EP1134707A1 (en) | Payment authorisation method and apparatus | |
KR20180029227A (en) | Security and user authentication for electronic transactions | |
GB2360383A (en) | Payment authorisation | |
Mazitova | Consumer liability in case of fraud with electronic payment instruments: an analysis of European and Russian rules |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |