RED FLAG IDENTIFICATION VERIFICATION SYSTEM AND METHOD
First Claim
1. A system for verifying an individual'"'"'s identify and preventing identify theft, the system comprising:
- a. at least one input device for entering an individual'"'"'s consumer identity information;
b. third party databases storing identity data;
c. a network communicating with the third party databases and the at least one input device; and
d. a processing unit communicating with at least one of the input devices, the third party databases and the network, the processing unit containing instructions operating thereon for;
i. receiving the individual'"'"'s consumer identify information from the at least one input device;
ii. searching the third party databases using the received individual'"'"'s consumer identify information to identify at least one pattern of interest in at least one alert category;
iii. scoring at least the one pattern of interest as a function of at least one Red Flag Rule; and
iv. communicating the score to a user.
0 Assignments
0 Petitions
Accused Products
Abstract
Embodiments relate to systems and methods for verifying an individual'"'"'s identify and preventing identify theft. The system comprises at least one input device, third party databases, network and processing unit. The input device is used to enter an individual'"'"'s consumer identity information, while the third party databases stores identity data. The network communicates with the third party databases and the at least one input device, while the processing unit communicates with at least one of the input devices, third-party databases and the network. The processing unit contains instructions for receiving the individual'"'"'s consumer identify information from the at least one input device; searching the third party databases using the received identify information to identify at least one pattern of interest in at least one alert category; scoring at least the one pattern of interest as a function of at least one Red Flag Rule; and communicating the score.
-
Citations
20 Claims
-
1. A system for verifying an individual'"'"'s identify and preventing identify theft, the system comprising:
-
a. at least one input device for entering an individual'"'"'s consumer identity information; b. third party databases storing identity data; c. a network communicating with the third party databases and the at least one input device; and d. a processing unit communicating with at least one of the input devices, the third party databases and the network, the processing unit containing instructions operating thereon for; i. receiving the individual'"'"'s consumer identify information from the at least one input device; ii. searching the third party databases using the received individual'"'"'s consumer identify information to identify at least one pattern of interest in at least one alert category; iii. scoring at least the one pattern of interest as a function of at least one Red Flag Rule; and iv. communicating the score to a user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 15, 16)
-
-
9. A system for verifying an individual'"'"'s identity and preventing identify theft, the system comprising:
-
a. at least one input device for entering an individual'"'"'s consumer identity information; b. third party databases storing identity data; c. a network communicating with third party databases and the at least one input device; and d. a processing unit communicating with at least one of the input device, the third party databases and the network, the processing unit containing instructions operating thereon for; i. verifying the individual'"'"'s identity; ii. identifying a theft prevention plan; iii. providing user training; iv. providing reports; v. providing red flag notification; vi. enabling user administration; and vii. enabling partnering with other users and administering such partnering. - View Dependent Claims (10, 12, 13, 14, 17)
-
-
18. A method for verifying an individual'"'"'s identify and preventing identify theft, the method comprising:
-
a. entering an individual'"'"'s consumer identity information using at least one input device; b. communicating with third party databases storing identity data using a network communicating with at least the one input device; and c. processing the entered individual'"'"'s consumer identity information using a processing unit communicating with at least one of the input devices, third party databases and the network, the processing unit containing instructions operating thereon for; i. receiving the individual'"'"'s consumer identify information from the input device; ii. searching the third part databases using the received individual'"'"'s consumer identify information to identify at least one pattern of interest in at least one alert category; iii. scoring at least the one pattern of interest as a function of at least one Red Flag Rule; and iv. communicating the score to a user. - View Dependent Claims (19, 20)
-
Specification