System and method for thwarting identity theft and other identity misrepresentations
First Claim
Patent Images
1. A method of obstructing identity crimes, the method comprising:
- obtaining at a verification system a list of at least two identity verifiers, each identity verifier to be used for no more than one transaction;
linking at the verification system the list of identity verifiers to at least one numerical identifier associated with a registered user, the registered user selected from the group consisting of persons and entities;
providing the list of identity verifiers from the verification system to the registered user;
enabling the registered user to provide security messages to the verification system to be associated with the identity verifiers, each security message pertaining to an intended transaction;
receiving at the verification system a numerical identifier from a requesting party, the requesting party having obtained the numerical identifier from a transaction initiator claiming to be associated with the numerical identifier;
receiving at the verification system an identity verifier from the requesting party, the requesting party having obtained the identity verifier from the transaction initiator claiming to be associated with the numerical identifier;
determining at the verification system whether the received identity verifier is within the list of identity verifiers linked to the received numerical identifier;
communicating information from the verification system to the requesting party indicating whether the received identity verifier is within the list of identity verifiers linked to the received numerical identifier; and
sending from the verification system to the requesting party any security message associated with the received identity verifier to enable the requesting party to compare the security message with a transaction being conducted by the transaction initiator.
0 Assignments
0 Petitions
Accused Products
Abstract
Registered users including businesses attach a one-time-use identity verifier to as many financial and other transactions as they choose to protect themselves from identity thieves. They may also attach a security message to any identity verifier to ensure that a thief cannot steal a registered user'"'"'s check from a mailbox and use the unused identity verifier. By using one list for all of a person'"'"'s transactions, applications for new credit by identity thieves are also prevented. All of this is made possible by allowing the identity verifiers to be approved nonsequentially.
134 Citations
22 Claims
-
1. A method of obstructing identity crimes, the method comprising:
-
obtaining at a verification system a list of at least two identity verifiers, each identity verifier to be used for no more than one transaction; linking at the verification system the list of identity verifiers to at least one numerical identifier associated with a registered user, the registered user selected from the group consisting of persons and entities; providing the list of identity verifiers from the verification system to the registered user; enabling the registered user to provide security messages to the verification system to be associated with the identity verifiers, each security message pertaining to an intended transaction; receiving at the verification system a numerical identifier from a requesting party, the requesting party having obtained the numerical identifier from a transaction initiator claiming to be associated with the numerical identifier; receiving at the verification system an identity verifier from the requesting party, the requesting party having obtained the identity verifier from the transaction initiator claiming to be associated with the numerical identifier; determining at the verification system whether the received identity verifier is within the list of identity verifiers linked to the received numerical identifier; communicating information from the verification system to the requesting party indicating whether the received identity verifier is within the list of identity verifiers linked to the received numerical identifier; and sending from the verification system to the requesting party any security message associated with the received identity verifier to enable the requesting party to compare the security message with a transaction being conducted by the transaction initiator. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method of determining whether an identity verifier is required to be submitted in a particular transaction, the method comprising:
-
(a) obtaining a list of at least two identity verifiers, each identity verifier to be used for no more than one transaction; (b) linking the list of identity verifiers to at least one unique numerical identifier wherein the numerical identifier is associated with a registered user selected from a group consisting of persons and entities; (c) creating categories of transactions; (d) receiving instructions from the registered user designating the categories of transactions that require an identity verifier and designating the categories of transactions that do not require an identity verifier; (e) receiving a numerical identifier from a requesting party, the requesting party having obtained the numerical identifier from a transaction initiator claiming to be associated with the numerical identifier; (f) receiving information from the requesting party specifying the type of transaction occurring; (g) determining whether the transaction requires the use of an identity verifier; and (h) communicating information to the requesting party wherein the information communicated indicates whether an identity verifier is required for the specified transaction.
-
-
15. A method of obstructing identity crimes, the method comprising:
-
associating a plurality of identity verifiers with a registered user, each of the identity verifiers to be used for a single transaction; receiving from the registered user at least one security message, each security message corresponding to one of the plurality of identity verifiers; associating each security message provided by the registered user to the corresponding identity verifier; receiving one of the plurality of identity verifiers from a requesting party, the requesting party having received the one identity verifier from a transaction initiator; determining whether the one identity verifier received from the requesting party is associated with a corresponding security message; and transmitting to the requesting party any corresponding security message associated with the one identity verifier received from the requesting party to allow the requesting party to view the corresponding security message provided by the registered user. - View Dependent Claims (16)
-
-
17. A method of protecting numerical identifiers associated with registered users, the method comprising:
-
obtaining at least one registered user; obtaining a list for each registered user, each list including at least one numerical identifier, each numerical identifier included in the list associated with the registered user; obtaining at least two identity verifiers for each registered user, each identity verifier to be used in only one transaction; associating each of the at least two identity verifiers with the corresponding registered user; and transmitting to each registered user the at least two identity verifiers associated with the registered user, each of the identity verifiers enabling the registered user to verify to a requesting party via a verification system any numerical identifier selected from the list, and each of the identity verifiers capable of verifying the selected numerical identifier. - View Dependent Claims (18, 19, 20)
-
-
21. A system for protecting numerical identifiers of registered users, the system comprising:
-
an input device configured to obtain a corresponding list for each of a plurality of registered users, each list including at least one numerical identifier, the input device being further configured to obtain at least two identity verifiers for each of the plurality of registered users; a database configured to associate each of the plurality of registered users with the corresponding list of the at least one numerical identifier, the database being further configured to associate each of the at least two identity verifiers with the corresponding registered user; and a communications device configured to transmit to each registered user the at least two identity verifiers associated with the registered user, each of the identity verifiers enabling the registered user to verify to requesting parties any numerical identifier selected from the list by the registered user, and each of the identity verifiers being capable of verifying the selected numerical identifier in any one transaction.
-
-
22. A verification system configured to obstruct identity crimes, the verification system comprising:
-
an input device configured to obtain a list of at least two identity verifiers to be associated with a registered user, the registered user selected from the group consisting of persons and entities, each identity verifier to be used for no more than one transaction, the input device further configured to enable the registered user to provide a security message to be associated with one of the identity verifiers, the security message indicating information pertaining to an intended transaction; a database configured to link the list of identity verifiers to at least one numerical identifier associated with the registered user, the database further configured to link a security message to one of the identity verifiers if the registered user has provided such a security message; a communication device configured to receive a numerical identifier and an identity verifier from a requesting party, the requesting party having obtained the numerical identifier and the identity verifier from a transaction initiator claiming to be associated with the numerical identifier, the communication device further configured to transmit to the requesting party information indicating whether the received identity verifier is within the list of identity verifiers linked to the received numerical identifier and whether a security message has been associated with the received identity verifier; and a processing device configured to determine whether the received identity verifier is within the list of identity verifiers linked in the database to the received numerical identifier, the processing device further configured to determine whether the received identity verifier is associated with a security message.
-
Specification