Identity protection
First Claim
Patent Images
1. A computing system for providing identity fraud risk indicia, the system comprising:
- a fraud model subsystem that specifies patterns of events indicative of identity fraud, wherein each pattern comprises a type of fraud and information related to event timing;
a business rules subsystem that, based on the patterns of events, specifies rules to identify fraud;
a data aggregation subsystem that collects data input from a variety of sources, the data comprising demographic data for individuals, asset data for individuals, event occurrence data, identity theft statistical data, and personal data; and
a processor for executing computer readable instructions that, when executed, employ the rules to;
examine a static structure of a subset of the data that relates to an individual relative to underlying financial and physical assets and personal attributes of the individual;
correlate interconnectivity of the subset with events that have changed the static structure in the past;
correlate interconnectivity of the subset with new events discovered during a monitoring process; and
determine whether the events and the new events are correlative with at least one of the patterns based on the rules.
6 Assignments
0 Petitions
Accused Products
Abstract
In general, in one aspect, the invention relates to a system for providing identity protection that, in one embodiment, includes a fraud model for specifying patterns of events indicative of identity fraud and a business rules subsystem used to identify fraud that is specified by the fraud models. The system aggregates data from a variety of sources, and has an analytical engine that operates on the aggregated data and determines, using the business rules, whether there are events that are correlative with the fraud models that are indicative of fraud.
500 Citations
11 Claims
-
1. A computing system for providing identity fraud risk indicia, the system comprising:
-
a fraud model subsystem that specifies patterns of events indicative of identity fraud, wherein each pattern comprises a type of fraud and information related to event timing; a business rules subsystem that, based on the patterns of events, specifies rules to identify fraud; a data aggregation subsystem that collects data input from a variety of sources, the data comprising demographic data for individuals, asset data for individuals, event occurrence data, identity theft statistical data, and personal data; and a processor for executing computer readable instructions that, when executed, employ the rules to; examine a static structure of a subset of the data that relates to an individual relative to underlying financial and physical assets and personal attributes of the individual; correlate interconnectivity of the subset with events that have changed the static structure in the past; correlate interconnectivity of the subset with new events discovered during a monitoring process; and determine whether the events and the new events are correlative with at least one of the patterns based on the rules. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
Specification