Methods and apparatus for protecting against credit card fraud, check fraud, and identity theft
First Claim
Patent Images
1. A method comprising the steps of:
- storing, using a telecommunications network, special database listing information for transactions (SLI) specifying the initiating location of a transaction class (TC), the amount of the TC, the characteristics of the TC, and any other information relevant to the TC, within a specified date range;
transmitting notifications to customers, using a Virtual Assistant (VA) that connects to a unified messaging system with a plurality of access points to speech, telephony, Internet, database and third-party objects;
accepting queries from customers, for specified TC'"'"'s and to provide the amount of the TC, the characteristics of the TC, and any other information relevant to the TC, within a specified date range; and
receiving real-time transaction-based information for a specified TC (RI) from a committed third party not confined to said transaction activity.
0 Assignments
0 Petitions
Accused Products
Abstract
A notification of an electronic transaction representing a debit or credit card, altered check amount or creation new credit/loan by other person using a stolen identity on a money transaction to be processed later, by the ATM machine, bank service, or credit/loan approval respectively for a fraudulent transaction is disclosed. A method detects a fraudulent transaction. It includes notifying customers of transactions being executed; examining a set of transaction classes (TC) which would fulfill the terms of a threshold transaction list (TTL) to determine if specified TC is a fraudulent transaction; and providing threshold transaction parameter(s) exceeded prior to realizing specified TC.
-
Citations
20 Claims
-
1. A method comprising the steps of:
-
storing, using a telecommunications network, special database listing information for transactions (SLI) specifying the initiating location of a transaction class (TC), the amount of the TC, the characteristics of the TC, and any other information relevant to the TC, within a specified date range;
transmitting notifications to customers, using a Virtual Assistant (VA) that connects to a unified messaging system with a plurality of access points to speech, telephony, Internet, database and third-party objects;
accepting queries from customers, for specified TC'"'"'s and to provide the amount of the TC, the characteristics of the TC, and any other information relevant to the TC, within a specified date range; and
receiving real-time transaction-based information for a specified TC (RI) from a committed third party not confined to said transaction activity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising the steps of:
-
receiving RI'"'"'s of TC'"'"'s from a specified starting location within a specified date range;
querying, using a computer, voice, fax, or e-mail to a Virtual Assistant (VA), that supports a plurality of access points to speech, telephony, Internet, database and third-party objects;
notifying, using a unified messaging system (computer, fax, or e-mail) of said SLI to a specified customer;
accepting requests of TC'"'"'s relating to a specified date range or threshold characteristic;
transmitting, at a time subsequent to said received RI of said executed transaction, a standard notification or an alarm threshold violation notification. - View Dependent Claims (12, 13, 14, 15, 16, 17, 19, 20)
-
-
18. A system comprising:
-
an intelligent telecommunication network having embodied therein the power of information-on-demand, real-time, instant access to data, automated event and notification relating to a plurality of threshold parameters, and transaction information relating to a plurality of TC'"'"'s; and
a Virtual Assistant (VA) connected to said intelligent telecommunication network and configured to transmit through a VPN network and reach the customer via a unified messaging system.
-
Specification