Privacy Protected Anti Identity Theft and Payment Network
First Claim
1. A computer system to prevent identity theft, comprising:
- a computer processor and a memory device coupled to a network;
a database stored on the memory device adapted to store at least a first set of data derived from a consumer'"'"'s personal information in a manner in which the consumer'"'"'s personal information cannot be recovered from the first set of data, the database further being adapted to store, associated with the first set of data, at least one of a photo of a consumer and a challenge question and corresponding answer created by the consumer; and
a communications device transmitting in response to instructions from the processor at least one of the photo and the challenge question to a user via the network when the processor receives from the user a second set of data from the network, the second set of data corresponding to the first set of data and being associated with a subject.
2 Assignments
0 Petitions
Accused Products
Abstract
A computerized and networked system protects individuals against identity theft without the need to disclose the detailed personal information of the individuals. Furthermore, the system helps prevent loss and damage to consumers, financial institutions and merchants caused by financial crimes related to identity theft. In addition, users can conduct payments in a secure manner without the need to use any traditional financial instrument. A pass code can be generated for each transaction and sent to a user'"'"'s personal communications device. When the correct pass code is received from the user, the transaction is then authorized.
-
Citations
30 Claims
-
1. A computer system to prevent identity theft, comprising:
-
a computer processor and a memory device coupled to a network; a database stored on the memory device adapted to store at least a first set of data derived from a consumer'"'"'s personal information in a manner in which the consumer'"'"'s personal information cannot be recovered from the first set of data, the database further being adapted to store, associated with the first set of data, at least one of a photo of a consumer and a challenge question and corresponding answer created by the consumer; and a communications device transmitting in response to instructions from the processor at least one of the photo and the challenge question to a user via the network when the processor receives from the user a second set of data from the network, the second set of data corresponding to the first set of data and being associated with a subject. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer system to prevent identity theft, comprising:
-
a computer processor and a memory device coupled to a network; a pass code generator operable on the computer processor to create a new single use, expiring pass code in response to each log in attempt from a user at a source application; a first communications device, responsive to generation of the pass code, that transmits the pass code to the user at a destination other than the source application, in substantially real-time, and a second communications device transmitting a login authorization for the source application when the pass code is received from the user at the source application before the pass code expires. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A computer system to prevent identity theft during a financial transaction between a payer and a payee, comprising:
-
a computer processor and a memory device coupled to a network; a pass code generator operable on the computer processor to create a pass code, in response to initiation of the financial transaction; and a communications device, responsive to initiation of the financial transaction, transmitting the pass code to a personal communications device of the payer in substantially real-time, the computer processor generating instructions to transfer a transaction amount from a payer account to a payee account when the pass code is received back from the payee.
-
-
18. A computer system to prevent identity fraud during a financial transaction between a payer and a payee, comprising:
-
a computer processor and a memory device coupled to a network; a pass code generator operable on the computer processor to create a new single use, expiring pass code, in response to initiation of the financial transaction and in response to receiving a transaction amount and an indication of whether an available amount of funds in a user account is sufficient for the transaction amount, the computer processor generating instructions to freeze the transaction amount in the user account; and a communications device, responsive to the freezing of the transaction amount, transmitting the pass code to the user in substantially real-time, the computer processor generating instructions to transfer the frozen transaction amount from the user account to an account associated with a payee when the pass code is received back from the payee before the pass code expires. - View Dependent Claims (19, 20, 21)
-
-
22. A computerized method to prevent identity theft during a financial transaction between a payer and a payee, comprising:
-
receiving a transaction amount and a payer'"'"'s identification information from a payee; generating a new pass code in response to receipt of the transaction amount when an available amount of funds in a payer'"'"'s account is sufficient for the transaction amount; freezing the transaction amount in the payer'"'"'s account, transmitting the new pass code to the payer in substantially real time in response to freezing of the transaction amount in the payer'"'"'s account; and transferring the frozen transaction amount to a payee'"'"'s account when the new pass code is received from the payee.
-
-
23. A computerized method to prevent identity theft during an account login process, comprising:
-
receiving a user ID and a password from a user attempting to login to an account; generating a new single use, expiring pass code, when the user ID and the password correspond to the account; transmitting, in substantially real time, the new pass code to a personal communications device associated with a registered holder of the account; and permitting the user to login to the account when the new pass code is received from the user before the pass code expires.
-
-
24. A computer system to prevent consumer identity theft, comprising:
-
a computer processor and a memory device coupled to a network; the computer processor receiving over the network from a consumer contact information, an expiration date of a fraud alert, and a desired early warning period to renew the fraud alert; the computer processor transmitting to the consumer on occurrence of the desired early warning period a reminder to post a new fraud alert with at least one credit report company; and the computer processor receiving from the consumer a new expiration date for the new fraud alert.
-
-
25. A computer system to prevent consumer identity theft, comprising:
-
a computer processor and a memory device coupled to a network; the computer processor receiving over the network from a consumer identification information recognized by at least one credit report company and a request to post a fraud alert; the computer processor requesting the credit report company to post the fraud alert on behalf of the consumer based on the identification information; and the computer processor requesting the credit report company to repeat the fraud alert post when the fraud alert is about to expire.
-
-
26. A computer system to prevent consumer identity theft, comprising:
-
a computer processor and a memory device coupled to a network; the computer processor receiving over the network from a consumer personal information and a request to post a fraud alert; the computer processor logging in to at least one credit report company on behalf of the consumer and submitting a request to post the fraud alert on behalf of the consumer; and the processor repeating the request to post the fraud alert when the fraud alert is about to expire.
-
-
27. A computer system to determine reliability of personal identification data, provided by a presumed consumer, based on analyses from a plurality of third parties comprising:
-
a computer processor and a memory device coupled to a network; a database stored on the memory device adapted to store at least the presumed consumer'"'"'s identification data and corresponding data to be verified; and a communications device transmitting the data to be verified to a third party when the processor receives the presumed consumer'"'"'s identification data from the third party, the communications device receiving a reply from the third party indicating whether the data to be verified is accurate; wherein the computer processor determines a degree of reliability of the presumed consumer'"'"'s personal identification information based on activities, patterns, and/or characteristics of the presumed consumer, which are based upon a plurality of replies received from the plurality of third parties and based upon activities, patterns, and/or characteristics of the plurality of third parties.
-
-
28. A computerized method to prevent identity theft, comprising:
-
receiving identification information from a presumed consumer; storing the identification information in a database; receiving a personal phone number from the presumed consumer; storing the personal phone number associated with the identification information of the presumed consumer in the database; searching the database to determine whether previously stored identification information has already been associated with the personal phone number received from the presumed consumer; and when previously stored identification information has already been associated with the personal phone number received from the presumed consumer, indicating a potential identity theft by the presumed consumer when the identification information received from the presumed consumer does not correspond to the previously stored identification information. - View Dependent Claims (29)
-
-
30. A privacy-protected computerized method to conduct a marketing campaign for merchants which may not have contact information of consumers, comprising:
-
opening an account for a merchant; opening an account for a consumer and storing consumer contact information and consumer identification information in a database; receiving identification information of a presumed consumer from the merchant; conducting identity verification on the presumed consumer for the merchant based on the presumed consumer identification information; storing a link between the consumer account and the merchant account in a database when the presumed consumer identification information corresponds to consumer identification information; and sending marketing information to the consumer on behalf of the merchant based on the link associated with the merchant and the stored contact information of the consumer.
-
Specification