FRAUD DETERRENCE IN CONNECTION WITH IDENTITY DOCUMENTS
First Claim
1. An improved method for identity credential issuance, in which applicants submit one or more collateral documents to evidence their identities, the method comprising:
- collecting historical information about fraud associated with different classes of collateral documents used by applicants to evidence their identities;
in connection with issuance of a new identity credential to an applicant, referring to said collected information to assess a risk associated with one or more particular collateral documents presented by said applicant; and
adapting a workflow for issuing said new identity credential to said applicant based on said assessed risk.
3 Assignments
0 Petitions
Accused Products
Abstract
According to one aspect, an air travel agent who reviews photo IDs of prospective travelers is advised by an expert system that directs the agent to give certain travelers more or less (or different) scrutiny, depending on the type of photo ID they present (e.g., depending on the jurisdiction from which their driver'"'"'s license was issued). The system relies on a database in which historical incidents of fraud associated with different types of identification documents are logged, thereby serving as a resource by which future frauds might be better identified. Events that may signal increases in fraud beyond historical norms for particular types of ID documents, such as reported thefts of security laminates or other consumables used in their production, can also (or alternatively) be tracked in the database, and considered by the expert system. Such techniques allow security personnel to focus their efforts where they will do the most good. A variety of other technologies for mitigating fraud risks are also detailed.
-
Citations
29 Claims
-
1. An improved method for identity credential issuance, in which applicants submit one or more collateral documents to evidence their identities, the method comprising:
-
collecting historical information about fraud associated with different classes of collateral documents used by applicants to evidence their identities;
in connection with issuance of a new identity credential to an applicant, referring to said collected information to assess a risk associated with one or more particular collateral documents presented by said applicant; and
adapting a workflow for issuing said new identity credential to said applicant based on said assessed risk. - View Dependent Claims (29)
-
-
2-6. -6. (canceled)
-
7. A method comprising:
-
collecting historical information about fraud related to different classes of identification documents;
referring to said collected information to identify a risk associated with a particular class of documents; and
instituting at least one countermeasure to mitigate said identified risk, said countermeasure serving to redress a particular security vulnerability that gives rise to said identified risk;
wherein said countermeasure entails a change in a procedure used to issue a state'"'"'s driver'"'"'s licenses.
-
-
8. A method comprising:
-
as part of a security check, receiving from a person a photo identification document, said photo identification document being associated with a particular issuing authority;
providing information to an automated system including data identifying said issuing authority; and
receiving from the automated system guidance concerning vetting the person or the document, said guidance being based at least in part on historical fraud data associated with other identification documents associated with said issuing authority. - View Dependent Claims (9)
-
-
10. As part of a security check wherein a person presents a photo identification document, said photo identification document being associated with a particular issuing authority, a method performed using an automated system comprising:
-
receiving information including data identifying said issuing authority;
consulting a database containing information relevant to risks corresponding to different classes of photo identification documents, to obtain information relevant to documents issued by said identified issuing authority; and
issuing guidance to an operator concerning vetting of said person or said document based thereon. - View Dependent Claims (11, 12, 13, 14, 15)
-
- 16. An expert system that helps guide an air travel agent in clearing prospective travelers for air travel, the system receiving data identifying a type of photo ID presented by a traveler, and advising the agent how to process the traveler, said advice being based at least in part on the type of presented photo ID.
-
22. A method comprising:
-
collecting historical information about fraud related to different classes of identification documents, said classes comprising driver'"'"'s licenses that are issued based on applicant presentation of different types of collateral documents;
referring to said collected information to identify a risk associated with a particular class of documents; and
instituting at least one countermeasure to mitigate said identified risk;
wherein said countermeasure entails a change in a state procedure concerning issuance of driver'"'"'s licenses based on certain collateral documents.
-
-
23. A method comprising:
-
collecting information about fraud related to different general types of government-issued identification documents;
when presented with a particular government-issued identification document, referring to said collected information to identify a risk associated with a general type of government-issued identification document to which said particular document belongs; and
instituting at least one countermeasure to mitigate said identified risk. - View Dependent Claims (24, 25, 26)
-
-
27. An improved method of identity credential issuance, in which applicants employ one or more options set forth in a defined procedure to evidence their identities, the method comprising:
-
collecting historical data about identity credential frauds, including compiling data indicating particular options employed by applicants involved in said frauds to evidence their identities;
referring to said collected data to assess a risk associated with one or more of said options; and
revising said defined procedure based on said risk assessment. - View Dependent Claims (28)
-
Specification