Credit and identity protection network
First Claim
1. A computerized method for using a networked computer system to maintain accurate credit and identity data associated with individuals, organizations, or other entities affiliated with participating organizations, comprising:
- collecting financial transaction information over a computer network, said information including details of requests for credit checks, reported credit denials, and any available reports of suspected fraudulent transactions;
performing a computer analysis on the collected information to detect possibly fraudulent activities;
compiling a computer generated list of possible victims of the detected possibly fraudulent activities;
sending the compiled list of possible victims over the computer network to at least some of the participating organizations;
comparing the list of possible victims with a respective database maintained by each of the recipient participating organizations to match and identify any potential victim with respective contact information maintained by the recipient participating organization;
using said contact information to thereby inform said matched potential victim as to the detected activities;
requesting the matched potential victim to verify whether any of the suspicious activities involved in said potential case are accurate; and
taking appropriate action based on the potential victim'"'"'s response.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer network, Credit and Identity Protection Network (“CIPN”), is established to detect credit damage and identity theft occurring to individuals, organizations, and other entities. It automatically advises the potential victims to verify the possible fraudulent activities and helps them to take proper actions to protect their credit and identity. In addition, this computer network provides the potential victim with assistance in notifying financial institutions, credit bureaus, merchants, and government agencies of suspicious activities and/or of confirmed fraudulent cases so that these organizations can take proper actions to protect themselves and the victims.
-
Citations
48 Claims
-
1. A computerized method for using a networked computer system to maintain accurate credit and identity data associated with individuals, organizations, or other entities affiliated with participating organizations, comprising:
-
collecting financial transaction information over a computer network, said information including details of requests for credit checks, reported credit denials, and any available reports of suspected fraudulent transactions;
performing a computer analysis on the collected information to detect possibly fraudulent activities;
compiling a computer generated list of possible victims of the detected possibly fraudulent activities;
sending the compiled list of possible victims over the computer network to at least some of the participating organizations;
comparing the list of possible victims with a respective database maintained by each of the recipient participating organizations to match and identify any potential victim with respective contact information maintained by the recipient participating organization;
using said contact information to thereby inform said matched potential victim as to the detected activities;
requesting the matched potential victim to verify whether any of the suspicious activities involved in said potential case are accurate; and
taking appropriate action based on the potential victim'"'"'s response. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44)
-
-
45. A computerized method for using a networked computer system to maintain accurate credit and identity data associated with individuals, organizations, or other entities affiliated with participating organizations, comprising:
-
collecting financial transaction information over a computer network, said information including details of requests for credit checks, reported credit denials, and any available reports of suspected fraudulent transactions;
performing a computer analysis on the collected information to detect possibly fraudulent activities;
compiling a computer generated list of possible victims of the detected possibly fraudulent activities;
sending the compiled list of possible victims over the computer network to at least some of the participating organizations;
comparing the list of possible victims with a respective database maintained by each of the recipient participating organizations to match and identify any potential victim with respective contact information maintained by the recipient participating organization;
using said contact information to thereby inform said matched potential victim as to the detected activities;
requesting the matched potential victim to verify whether any of the suspicious activities involved in said potential case are accurate; and
taking appropriate action based on the potential victim'"'"'s response. performing a further computer analysis to determine whether the detected suspicious activities related to a particular matched individual are consistent with a potential case of identity theft to the matched individual;
informing said matched potential victim as to any detected activities that are so determined to be consistent with said potential case; and
if the potential victim verifies said potential case of identity theft, providing computerized assistance to the potential victim for limiting further use of the stolen identity. wherein said appropriate action includes if all the suspicious activities are verified as authentic by the potential victim, dismissing the case and if any of the suspicious activities are identified by the potential victim as inaccurate, assisting the potential victim to make appropriate notification to the source of the erroneous information. and if the detected cases are fraudulent activities conducted by third parties, helping the victim take proper actions to prevent losses and damages, and reporting the cases to participating organizations, which can take proper actions to prevent losses and damages that could be caused by the identity theft or fraudulent activities related to the said victim;
the collecting of said information is accomplished through at least one or more organizations selected from the group consisting essentially of credit bureaus, the agents of credit bureaus which provide services by using the data from credit bureaus, the applicants who may need to go through credit checks to get some kind of approval, and merchants including retail stores, financial institutions, and government agencies;
the list of possible victims is sent to at least one participating organization, which compares the list with at least one database selected from the group consisting of a member database, a customer database, and an employee database;
the informing of said potential victim is accomplished at least through e-mail, fax, phone, or other communication methods;
said potential victim verifies the suspicious actives by logging into the computer system, calling a service center, visiting a service center in person, or using a self-service terminal;
once the potential victim has verified that the detected cases are fraudulent, the computer system will at least report the case to credit bureaus, police departments, government agencies, financial institutions, and merchants including retail stores, provide the victim with network links to credit bureaus, police departments, government agencies, non-profit organizations, commercial service providers, and law firms, and provide action guidelines to the victim. - View Dependent Claims (46, 47, 48)
-
Specification