Authentication alerts
First Claim
1. A computing system comprising:
- a data store that stores contact information associated with one or more individuals enrolled in a monitoring service; and
a computing device, comprising at least one physical processor, that is in communication with the data store and that configured to;
receive, by the computing device, information identifying an individual for whom an authentication request has been received in association with a request from a requesting entity that received the information in real time from a person alleging to be the individual, wherein the received information includes a vendor identifier identifying the requesting entity and wherein the person alleging to be the individual is present in real time at a place of business of the vendor;
retrieve, by the computing device, contact information associated with the individual from the data store;
retrieve, by the computing device, vendor contact information associated with the requesting entity based on the vendor identifier;
send, from the computing device, an electronic notification to a mobile device of the individual based at least in part on the retrieved contact information, wherein the electronic notification provides notification to the individual that an authentication request was received regarding the individual and includes at least a vendor name from the retrieved vendor contact information, wherein the electronic notification provides the individual with a selectable option to indicate whether the person alleging to be the individual is actually the individual,wherein the electronic notification is provided as a push alert delivered via an application executed on the mobile device, wherein sending the electronic notification as the push alert causes the mobile device to launch the application executed on the mobile device, wherein the application causes display of the vendor name and the selectable option;
receive, by the computing device as a result of a selection of the selectable option in the electronic notification, an indication that the person alleging to be the individual is not actually the individual; and
in response to receiving the indication, substantially in real time after receiving the indication, and substantially while the person is still at the place of business, providing a notification to the requesting entity indicating fraudulent use of identity information of the individual in association with the authentication request, wherein the notification is provided based at least in part on the retrieved vendor contact information.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are provided for generating alerts in association with a request to open an account for an individual. For example, information identifying an individual may be received from a financial entity in association with the financial entity receiving a request to open an account for the individual from a requesting entity. The requesting entity may be a vendor or service provider associated with the financial entity. An electronic notification may then be sent to the individual, which may include a selectable option to indicate that the individual does not authorize opening of the account. In response to receiving an indication that the individual does not authorize opening of the account, notifications may be sent to both the financial entity and the requesting entity indicating that the individual has not authorized opening of the account.
1525 Citations
20 Claims
-
1. A computing system comprising:
-
a data store that stores contact information associated with one or more individuals enrolled in a monitoring service; and a computing device, comprising at least one physical processor, that is in communication with the data store and that configured to; receive, by the computing device, information identifying an individual for whom an authentication request has been received in association with a request from a requesting entity that received the information in real time from a person alleging to be the individual, wherein the received information includes a vendor identifier identifying the requesting entity and wherein the person alleging to be the individual is present in real time at a place of business of the vendor; retrieve, by the computing device, contact information associated with the individual from the data store; retrieve, by the computing device, vendor contact information associated with the requesting entity based on the vendor identifier; send, from the computing device, an electronic notification to a mobile device of the individual based at least in part on the retrieved contact information, wherein the electronic notification provides notification to the individual that an authentication request was received regarding the individual and includes at least a vendor name from the retrieved vendor contact information, wherein the electronic notification provides the individual with a selectable option to indicate whether the person alleging to be the individual is actually the individual, wherein the electronic notification is provided as a push alert delivered via an application executed on the mobile device, wherein sending the electronic notification as the push alert causes the mobile device to launch the application executed on the mobile device, wherein the application causes display of the vendor name and the selectable option; receive, by the computing device as a result of a selection of the selectable option in the electronic notification, an indication that the person alleging to be the individual is not actually the individual; and in response to receiving the indication, substantially in real time after receiving the indication, and substantially while the person is still at the place of business, providing a notification to the requesting entity indicating fraudulent use of identity information of the individual in association with the authentication request, wherein the notification is provided based at least in part on the retrieved vendor contact information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-implemented method comprising:
-
receiving, by one or more computing devices that are configured with specific executable instructions, information identifying an individual for whom an authentication request has been received in association with a request from a requesting entity that received the information in real time from a person alleging to be the individual, wherein the received information includes a vendor identifier identifying the requesting entity; retrieving, by the one or more computing devices, contact information associated with the individual from a data store, wherein the retrieved contact information includes a phone number associated with a mobile device of the individual, wherein the contact information is retrieved based at least in part by matching information stored in the data store with the information identifying the individual received in association with the authentication request; retrieving, by the one or more computing devices, vendor contact information associated with the requesting entity based on the vendor identifier; sending, by the one or more computing devices, an electronic notification to the mobile device of the individual based at least in part on the retrieved contact information, wherein the electronic notification provides notification to the individual that an authentication request was received regarding the individual and includes at least a vendor name from the retrieved vendor contact information, wherein the electronic notification provides the individual with a selectable option to indicate whether the person alleging to be the individual is actually the individual; receiving, by the one or more computing devices as a result of a selection of the selectable option in the electronic notification, an indication that the person alleging to be the individual is not actually the individual; and in response to receiving the indication, and substantially in real time after receiving the indication, providing a notification to the requesting entity indicating fraudulent use of identity information of the individual in association with the authentication request, wherein the notification is provided based at least in part on the retrieved vendor contact information. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory, computer-readable medium having stored thereon computer-executable instructions configured to cause a processor of a computing system to perform operations comprising:
-
receiving information identifying an individual for whom an authentication request has been received in association with a request from a requesting entity that received the information in real time from a person alleging to be the individual, wherein the received information includes a vendor identifier identifying the requesting entity; retrieving contact information associated with the individual from a data store, wherein the retrieved contact information includes a phone number associated with a mobile device of the individual, wherein the contact information is retrieved based at least in part by matching information stored in the data store with the information identifying the individual received in association with the authentication request; retrieving vendor contact information associated with the requesting entity based on the vendor identifier; sending an electronic notification to the mobile device of the individual based at least in part on the retrieved contact information, wherein the electronic notification provides notification to the individual that an authentication request was received regarding the individual and includes at least a vendor name from the retrieved vendor contact information, wherein the electronic notification provides the individual with a selectable option to indicate whether the person alleging to be the individual is actually the individual; receiving, based on a selection of the selectable option in the electronic notification, an indication that the person alleging to be the individual is not actually the individual; and in response to receiving the indication, and substantially in real time after receiving the indication, providing a notification to the requesting entity indicating fraudulent use of identity information of the individual in association with the authentication request, wherein the notification is provided based at least in part on the retrieved vendor contact information. - View Dependent Claims (20)
-
Specification