Strategy-driven methodology for reducing identity theft
First Claim
Patent Images
1. A strategy-driven methodology for reducing identity theft, comprising the steps of:
- attempting to gain system access;
presenting at least one list of user choices instead of granting system access, said at least one list containing at least one choice that is preset by a registered user;
selecting at least one choice from said at least one list; and
granting system access if said at least one selected choice matches said at least one preset choice.
0 Assignments
0 Petitions
Accused Products
Abstract
A strategy-driven methodology for reducing identity theft comprises the steps of attempting to gain system access, and presenting at least one list of user choices instead of granting system access, as practiced conventionally. The presented list contains at least one choice that is preset by a registered user. Other steps include selecting at least one choice from the presented list, and granting system access if the selected choice matches the preset choice.
-
Citations
128 Claims
-
1. A strategy-driven methodology for reducing identity theft, comprising the steps of:
-
attempting to gain system access;
presenting at least one list of user choices instead of granting system access, said at least one list containing at least one choice that is preset by a registered user;
selecting at least one choice from said at least one list; and
granting system access if said at least one selected choice matches said at least one preset choice. - View Dependent Claims (2, 3, 4, 127, 128)
-
-
5. A strategy-driven methodology for reducing identity theft, comprising the steps of:
-
inputting a password in an attempt to gain system access;
checking the input password for accuracy;
inputting a response to at least one system query preset by a registered user if the input password is accurate;
checking the input response for accuracy; and
granting system access if the input response to said at least one preset system query is accurate. - View Dependent Claims (6, 7, 8)
-
-
9. A strategy-driven methodology for reducing identity theft, comprising the steps of:
-
operatively coupling a computer to a secure system website over a network;
inputting a system password via said computer;
checking the input system password for accuracy;
inputting a response to at least one system query preset by a registered user if the input system password is accurate;
checking the input response for accuracy; and
granting access to the secure system website if the input response to said at least one preset system query is accurate. - View Dependent Claims (10, 11)
-
-
12. A strategy-driven methodology for reducing identity theft, comprising the steps of:
-
inputting a user name as part of a system login sequence;
checking the input user name for accuracy;
inputting a system password if the input user name is accurate;
checking whether the input system password is correct;
selecting at least one choice from an option list preset by a registered user if the input system password is correct;
checking said at least one selected choice for accuracy; and
granting system access if said at least one selected choice from said preset option list is accurate. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A strategy-driven methodology for reducing identity theft, comprising the steps of:
-
inputting a user name as part of a system login sequence;
checking the input user name for accuracy;
inputting a system password if the input user name is accurate;
checking whether the input system password is correct;
selecting at least one choice from a first option list preset by a registered user if the input system password is correct;
checking said at least one selected choice from said first preset option list for accuracy;
selecting at least one choice from a second option list if said at least one selected choice from said first preset option list is not accurate, said second option list containing randomly generated system choices and choices preset by a registered user;
checking said at least one selected choice from said second option list for accuracy; and
granting system access if said at least one selected choice from said second option list is accurate. - View Dependent Claims (19, 20, 21, 22, 23, 24)
-
-
25. A method for reducing credit card transaction fraud, said method comprising the steps of:
-
providing credit card information to an online merchant or bank;
utilizing the online merchant or bank to verify the credit card CVV (Card Verification Value);
selecting at least one choice from a first option list presented by the online merchant or bank if the credit card CVV is verified, said first option list containing randomly generated system choices and choices preset by the credit card owner;
utilizing the online merchant or bank to check said at least one selected choice from said first option list for accuracy;
selecting at least one choice from a second option list if said at least one selected choice from said first option list is not accurate, said second option list containing randomly generated system choices and choices preset by the credit card owner;
utilizing the online merchant or bank to check said at least one selected choice from said second option list for accuracy; and
processing the credit card transaction if said at least one selected choice from said second option list is accurate. - View Dependent Claims (26, 27, 28, 29, 30, 31)
-
-
32. A method for reducing credit card transaction fraud, said method comprising the steps of:
-
swiping a credit card or manually entering credit card information via an interface device employed by a merchant credit card processing system;
inputting at least one credit card identifier requested by the merchant credit card processing system;
utilizing the merchant credit card processing system to verify said at least one input credit card identifier;
selecting at least one choice from an option list presented by the merchant credit card processing system if said at least one input credit card identifier is verified, said option list containing choices preset by the credit card owner;
utilizing the merchant credit card processing system to check said at least one selected choice for accuracy; and
processing the credit card transaction if said at least one selected choice is accurate. - View Dependent Claims (33, 34, 35, 36, 37)
-
-
38. A method for reducing checking transaction fraud, said method comprising the steps of:
-
swiping a check via a check processing system interface device employed by a business entity, said check containing at least one cryptographically stored password;
utilizing said business entity check processing system to decrypt said at least one stored password;
using said business entity check processing system to verify said at least one decrypted password;
clearing said check if password verification succeeds; and
returning said check if password verification fails. - View Dependent Claims (39, 40, 41, 42, 43, 44)
-
-
45. A method for reducing checking transaction fraud, said method comprising the steps of:
-
swiping a check via a check processing system interface device employed by a business entity, said check containing at least one cryptographically stored password;
utilizing said business entity check processing system to decrypt said at least one stored password;
using said business entity check processing system to verify said at least one decrypted password;
inputting a security identifier associated with said swiped check if password verification succeeds;
using said business entity check processing system to verify said input security identifier; and
clearing said check if security identifier verification succeeds. - View Dependent Claims (46, 47, 48)
-
-
49. A method for reducing checking transaction fraud, said method comprising the steps of:
-
swiping a check via a check processing system interface device employed by a business entity;
utilizing said business entity check processing system to verify said swiped check;
inputting at least one check password preset by the checking account owner if said swiped check verification succeeds;
using said business entity check processing system to verify said at least one input check password; and
clearing said check if said preset check password verification succeeds. - View Dependent Claims (50, 51, 52, 53)
-
-
54. A method for reducing checking transaction fraud, said method comprising the steps of:
-
swiping a check via a check processing system interface device employed by a business entity;
utilizing said business entity check processing system to verify said swiped check;
selecting at least one user choice from an option list preset by the checking account owner if said swiped check verification succeeds;
using said business entity check processing system to check said at least one selected choice for accuracy; and
clearing said check if said at least one selected choice is accurate. - View Dependent Claims (55, 56, 57, 58, 59, 60, 61, 62)
-
-
63. A method for reducing checking transaction fraud, said method comprising the steps of:
-
swiping a check via a check processing system interface device employed by a business entity, said check containing at least one cryptographically stored password;
utilizing said business entity check processing system to decrypt said at least one stored password;
using said business entity check processing system to verify said at least one decrypted password;
selecting at least one user choice from an option list if said decrypted password verification succeeds, said option list containing at least one user choice being preset by the checking account owner;
using said business entity check processing system to check said at least one selected choice for accuracy;
inputting a security identifier associated with said swiped check if said at least one selected choice is accurate;
using said business entity check processing system to verify said input security identifier; and
clearing said check if security identifier verification succeeds. - View Dependent Claims (64, 65, 66, 67, 68, 69, 70, 71, 72)
-
-
73. A method for reducing checking transaction fraud, said method comprising the steps of:
-
swiping a check via an interface device employed by a check cashing terminal, said check containing at least one cryptographically stored password;
utilizing said check cashing terminal to decrypt said at least one stored password;
inputting at least one password stored on said check;
using said check cashing terminal to check said at least one input password against said at least one decrypted password;
utilizing said check cashing terminal to measure the intensity of light reflected from said swiped check and compare the measured intensity against an associated database of preset light reflection intensities for checks issued by banking institutions if said password check succeeds;
using said check cashing terminal to verify the measured intensity; and
clearing said check if said measured intensity verification succeeds. - View Dependent Claims (74, 75, 76, 77)
-
-
78. A secure system access method, said method comprising the steps of:
-
selecting at least one question from a system list of questions, each question from said system list being presented with an associated list of responses, each of said responses and questions being respectively preset by an authorized user;
selecting at least one response to said at least one selected question from said associated list of responses;
checking said at least one selected response for accuracy; and
granting system access if said at least one selected response is accurate. - View Dependent Claims (79, 80, 81, 82, 83, 84, 85, 86, 87, 88)
-
-
89. A method for securely providing personal identification information, said method comprising the steps of:
-
establishing a communication link by a commercial entity with a consumer;
requesting personal identification information from the consumer over the communication link;
requesting a “
for call”
password from the commercial entity over the communication link;
checking the provided “
for call”
password for accuracy, said password checking being performed by the consumer; and
providing the requested personal identification information by the consumer over the communication link if the provided “
for call”
password is accurate. - View Dependent Claims (90)
-
-
91. A method for securely providing personal identification information, said method comprising the steps of:
-
establishing a communication link by a commercial entity with a consumer;
requesting consumer to provide personal identification information over the communication link;
requesting commercial entity to provide a “
for call”
password over the communication link, said “
for call”
password being set up in advance by an authorized user with the commercial entity;
checking the provided “
for call”
password for accuracy, said password checking being performed by the consumer;
requesting consumer to attempt a system login if the provided “
for call”
password is accurate, said system being maintained by the commercial entity;
utilizing said commercial entity system to check whether the attempted login is successful;
requesting consumer to input at least one instant password provided by said commercial entity system if said system login is successful;
using said commercial entity system to check whether said at least one input instant password is correct; and
providing the requested personal identification information over the communication link if said at least one input instant password is accurate. - View Dependent Claims (92, 93)
-
-
94. A method for securely providing personal identification information, said method comprising the steps of:
-
establishing a communication link by a consumer with a commercial entity;
requesting personal identification information from the consumer over the communication link;
checking the provided consumer personal identification information for accuracy, said information checking being performed by a personal identification processing system maintained by the commercial entity;
requesting consumer to attempt a system login using at least one instant password provided by the commercial entity if the provided personal identification information is accurate;
utilizing said commercial entity system to check whether said at least one instant password input is correct; and
using said commercial entity system to complete consumer identity verification if said at least one input instant password is correct. - View Dependent Claims (95, 96)
-
-
97. A secure port access method, said method comprising the steps of:
-
inputting a first password by a person desiring to gain local port access, a “
correct”
first password having been set in advance of travel to at least one destination by a verified user;
checking said first input password for accuracy;
inputting a second password by the person desiring to gain local port access if said first input password is accurate, a “
correct”
second password having been set in advance of travel to said at least one destination by the verified user;
checking said second input password for accuracy; and
granting local port access if said second input password is accurate. - View Dependent Claims (98, 99, 100, 101, 102, 103, 104)
-
-
105. A secure port access method, said method comprising the steps of:
-
setting up first and second port entry passwords before travel to a foreign port;
inputting two passwords upon arrival in the foreign port;
checking whether said two input passwords match the preset first and second port entry passwords; and
granting foreign port entry if said two input passwords match the preset first and second port entry passwords. - View Dependent Claims (106, 107, 108, 109, 110, 111, 112, 113)
-
-
114. A secure account solicitation method, said method comprising the steps of:
-
setting up a password for new account solicitation with an independent third party;
filling out a new account application;
listing a password on said new account application;
checking for a match between said listed password and said preset new account solicitation password; and
establishing a new account if said listed password matches said preset new account solicitation password. - View Dependent Claims (115)
-
-
116. A method for reducing credit card transaction fraud, said method comprising the steps of:
-
waving a contactless credit card in proximity to an interface device employed by a contactless credit card processing system to input credit card information;
selecting at least one choice from an option list presented by the contactless credit card processing system if the input credit card information is correct, said option list containing choices preset by the contactless credit card owner;
utilizing the contactless credit card processing system to check said at least one selected choice for accuracy; and
processing the credit card transaction if said at least one selected choice is accurate. - View Dependent Claims (117, 118, 119, 120, 121)
-
-
122. A secure e-mail access method, said method comprising the steps of:
-
selecting at least one choice from an option list presented by an e-mail processing system in an attempt to access at least one portion of a received e-mail, said option list containing one or more choices preset by an authorized system user;
checking said at least one selected choice for accuracy; and
granting access to said at least one portion of said received e-mail if said at least one selected choice is accurate.
-
-
123. A secure ATM access method, comprising the steps of:
-
inputting a user PIN (Personal Identification Number) as part of an ATM (Automated Teller Machine) system login sequence;
checking the input user PIN for accuracy;
selecting at least one choice from an option list preset by a bank account owner if the input user PIN is correct;
checking said at least one selected choice for accuracy; and
granting ATM system access if said at least one selected choice from said preset option list is accurate. - View Dependent Claims (124, 125)
-
-
126. A method for securely issuing an online boarding pass, said method comprising the steps of:
-
selecting at least one choice from an option list presented by an online boarding pass issuing system, said option list containing one or more choices preset by an authorized system user;
checking said at least one selected choice for accuracy; and
issuing an online boarding pass if said at least one selected choice is accurate.
-
Specification