Comprehensive Identity Protection System
First Claim
1. A method of protecting a subject'"'"'s identity, the method comprising:
- defining one or more neural network models, each neural network model being configured to handle a class of cases related to the subject and a specific data configuration describing a case of the class;
running the one or more neural network models to generate data requests about the subject'"'"'s identity; and
passing the data requests to a detection system that monitor transactions associated with the subject.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for protecting identity fraud are disclosed. A system includes a detection subsystem to identify applications and/or accounts at risk of identity fraud, and a disposition subsystem to process data provided by the detection system and to determine whether identity fraud exists in the applications and/or accounts. According to an implementation, one or more neural network models are defined, each neural network model being configured to handle a class of cases related to the subject and a specific data configuration describing a case of the class. The one or more neural network models are run to generate data requests about the subject'"'"'s identity, and the data requests are passed to a detection system that monitor transactions associated with the subject. Additional data associated with the transactions is requested until a threshold certainty is achieved or until available data or models are exhausted.
-
Citations
20 Claims
-
1. A method of protecting a subject'"'"'s identity, the method comprising:
-
defining one or more neural network models, each neural network model being configured to handle a class of cases related to the subject and a specific data configuration describing a case of the class;
running the one or more neural network models to generate data requests about the subject'"'"'s identity; and
passing the data requests to a detection system that monitor transactions associated with the subject. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-implemented method to identify fraud in transactions on one or more systems used by a subject, the method comprising:
-
running one or more neural network models from a set of neural network models to request data associated with the transactions; and
requesting additional data associated with the transactions until a threshold certainty is achieved or until available data or models are exhausted. - View Dependent Claims (10, 13, 14, 15)
-
- 11. A method in accordance with 9, wherein the transactions include telecommunications.
-
16. An identity protection system comprising:
-
a detection subsystem to identify applications and/or accounts at risk of identity fraud; and
a disposition subsystem to process data provided by the detection system and to determine whether identity fraud exists in the applications and/or accounts. - View Dependent Claims (17, 18, 19, 20)
-
Specification