SYSTEM AND METHOD TO SUPPORT IDENTITY THEFT PROTECTION AS PART OF A DISTRIBUTED SERVICE ORIENTED ECOSYSTEM
First Claim
Patent Images
1. A system comprising:
- an identity session initiation protocol (SIP) application server configured to act as a security assertion markup language (SAML) bridge allowing a SIP enabled device or a non-SIP enabled device to attach to a telecommunications service provider network and to notify a user of a login attempt.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method to support identity theft protection and, in particular, to a system and method for supporting identity theft protection as part of a distributed service oriented ecosystem in information management systems (IMS) and non-IMS networks. The system includes an identity session initiation protocol (SIP) application server configured to act as a security assertion markup language (SAML) bridge, which allows an SIP enabled device or a non-SIP enabled device to attach to a telecommunications service provider network. A user may accept or reject an authorization request using the SIP enabled device or non-SIP enabled device.
282 Citations
25 Claims
-
1. A system comprising:
an identity session initiation protocol (SIP) application server configured to act as a security assertion markup language (SAML) bridge allowing a SIP enabled device or a non-SIP enabled device to attach to a telecommunications service provider network and to notify a user of a login attempt. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
9. A computer implemented method comprising a computer usable storage medium for supporting identity theft protection comprising:
-
receiving one or more credentials via a login attempt on a first device; processing the one or more credentials to identify a subscriber having the one or more credentials; and sending a message to the subscriber on a second device to notify the subscriber of the login attempt on the first device. - View Dependent Claims (10, 11, 12)
-
-
13. A computer program product comprising a computer usable storage medium having readable program code embodied in the storage medium, the computer program product includes at least one component operable to:
-
process an authentication request comprising one or more credentials; process the one or more credentials to identify a subscriber; determine that the subscriber has an information management system (IMS) device; and send a message to the subscriber to notify the subscriber of the authentication request. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A method for deploying an application for supporting identity theft protection, comprising:
providing a computer infrastructure being operable to; receive one or more credentials via a login attempt on a first device; process the one or more credentials to identify a subscriber having the one or more credentials; and send a message to the subscriber on a second device to notify the subscriber of the login attempt on the first device. - View Dependent Claims (21, 22, 23, 24, 25)
Specification