Method and system for detecting identify theft in non-personal and personal transactions
First Claim
1. A method of detecting identity theft comprising the steps of:
- receiving identity data, the identity data including at least an address;
comparing the address to an external address database to determine whether the address is potentially fraudulent;
checking the address against a known fraud address table database to determine whether the address is fraudulent;
checking the address against a known good address table database to determine whether the address is potentially fraudulent;
querying at least one database for available incidental data associated with the address; and
asking a user a question based upon the incidental data retrieved from the database, whereby verifying the identity of the user.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system of detecting identity theft is disclosed. The method and system includes receiving identity data, the identity data including at least an address. Then, the address is compared to an external address database to determine whether the address is potentially fraudulent. The address is checked against a known fraud address table database to determine whether the address is fraudulent. The address may also be checked against a known good address table database to determine whether the address is potentially fraudulent. At least one database is queried for available incidental data associated with the address. And, a user is asked a question based upon the incidental data retrieved from the database, whereby the identity of the user is verified.
-
Citations
6 Claims
-
1. A method of detecting identity theft comprising the steps of:
-
receiving identity data, the identity data including at least an address;
comparing the address to an external address database to determine whether the address is potentially fraudulent;
checking the address against a known fraud address table database to determine whether the address is fraudulent;
checking the address against a known good address table database to determine whether the address is potentially fraudulent;
querying at least one database for available incidental data associated with the address; and
asking a user a question based upon the incidental data retrieved from the database, whereby verifying the identity of the user. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification