Method and device for preventing misuse of personal information
First Claim
Patent Images
1. A method for preventing misuse of personal information comprising the steps of:
- receiving an order request and a first phone number from a first party;
routing a telephone call made to a second phone number to said first party;
providing information comprising at least a part of said order request and said second phone number to at least one third partyrecording a log of phone calls made to said second phone number; and
using said log to detect unauthorized usage of at least a part of said provided information.
3 Assignments
0 Petitions
Accused Products
Abstract
The invention disclosed comprises a method and device for receiving an order request from a first party along with contact information for the first party, routing at least some communication made using, or to, second contact information, such as may be provided to the first party, and providing at least part of the order request and first contact information to a third party. The contact information may be a phone number or an e-mail address or a plurality of same.
-
Citations
37 Claims
-
1. A method for preventing misuse of personal information comprising the steps of:
-
receiving an order request and a first phone number from a first party; routing a telephone call made to a second phone number to said first party; providing information comprising at least a part of said order request and said second phone number to at least one third party recording a log of phone calls made to said second phone number; and using said log to detect unauthorized usage of at least a part of said provided information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for preventing misuse of personal information comprising the steps of:
-
receiving an order request contact information, and an optionally selected request to anonymize at least a part of said contact information from a first party; providing second contact information for said first party; routing at least some communication made using said second contact information to said first party; providing information comprising at least a part of said order request and said second contact information to at least one third party; recording a log of phone calls made to said second phone number; and using said log to detect unauthorized usage of at least a part of said provided information. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A device for preventing misuse of personal information configured to
receive an order request and a phone number from a first party; -
route a telephone call made to a second phone number to said first party; provide information comprising at least a part of said order request and said second phone number to at least one third party; and provide an alert when a party other than said at least one third party attempts to communicate using said second contact information. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A device for preventing misuse of personal information configured to:
- receiving an order request, and contact information, and an optionally
selected request to anonymize at least a part of said contact information from a first party; provide second contact information for said first party; forward at least some communication made using said second contact information to said first party; provide information comprising at least a part of said order request and said second contact information to at least one third party; and provide an alert when a party other than said at least one third party attempts to communicate using said second contact information. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37)
- receiving an order request, and contact information, and an optionally
Specification