Identity theft and fraud protection system and method
First Claim
1. A method for protecting against theft of personal identity information during purchase transactions, said method comprising the steps of:
- registering an individual subscriber as a member of an identity protection system and obtaining personal identity information from the subscribing member as storable computer data, including the subscribing member'"'"'s name and account information for at least one funding source of the subscribing member, the at least one funding source being independent and external to the identity protection system and managed by an external financial institution, the identity protection system having a surrogate member server for making surrogate purchases for members of the identity protection system;
encrypting, using the surrogate member server, the obtained personal identity information and storing the personal identity information as encrypted data;
fragmenting the encrypted data by a computer;
storing portions of the fragmented encrypted data, by at least one computer, independently at separate computer storage locations;
preventing third party access to the fragmented encrypted data;
receiving a request from the subscribing member to use the surrogate member server for use in conducting at least one online purchase transaction with a merchant;
determining, using the surrogate member server, a monetary purchase value amount that is needed to fund the at least one online purchase transaction;
allowing the subscribing member, using the surrogate member server, to select the at least one funding source from which funds will be used for indirect payment of the purchase transaction;
requesting, by the surrogate member server, authorization from the external financial institution for the monetary purchase value amount to be charged against the at least one funding source of the subscribing member;
obtaining approval from the external financial institution for the monetary purchase value amount;
assigning the monetary purchase value amount to a temporary card number selected from a plurality of pre-approved card numbers at the time of obtaining approval of the external financial institution for the monetary purchase value amount, and assigning the temporary card number to an anonymous controlled use card for exclusive use by the surrogate member server to conduct the online purchase transaction, the anonymous controlled use card having no traceable connection outside the identity protection system to any financial account of the subscribing member including the at least one funding source;
providing, using the surrogate member server, the controlled use card and fictitious personal identity information, in lieu of aspects of the subscribing member'"'"'s personal identity information required to complete the online purchase transaction, to the merchant on behalf of the subscribing member; and
wherein the merchant obtains credit approval and payment for the purchase transaction against the controlled use card in an amount not exceeding the approved monetary purchase value amount and wherein no aspects of the subscribing member'"'"'s personal identity information are revealed to the merchant by the surrogate member server.
13 Assignments
0 Petitions
Accused Products
Abstract
A system and method for preventing personal identity theft when making online and offline purchases requires a Purchaser to first subscribe and become a Member user by registering, providing relevant personal identity information, and establishing two-way multi-factor authentication information for security purposes. The ID protection system obtains a controlled use card (CUC) through a CUC issuer on behalf of the Member for use in making each purchase transaction. The CUC is anonymous with respect to user (Member) identity and may be a purchase-specific single-use card or a multi-purpose card with no traceable connection to any other financial account. When the Member makes a secure purchase, the Merchant is presented with anonymous information, except in instances where the Member'"'"'s real identity information is required (e.g. airline tickets).
-
Citations
21 Claims
-
1. A method for protecting against theft of personal identity information during purchase transactions, said method comprising the steps of:
-
registering an individual subscriber as a member of an identity protection system and obtaining personal identity information from the subscribing member as storable computer data, including the subscribing member'"'"'s name and account information for at least one funding source of the subscribing member, the at least one funding source being independent and external to the identity protection system and managed by an external financial institution, the identity protection system having a surrogate member server for making surrogate purchases for members of the identity protection system; encrypting, using the surrogate member server, the obtained personal identity information and storing the personal identity information as encrypted data; fragmenting the encrypted data by a computer; storing portions of the fragmented encrypted data, by at least one computer, independently at separate computer storage locations; preventing third party access to the fragmented encrypted data; receiving a request from the subscribing member to use the surrogate member server for use in conducting at least one online purchase transaction with a merchant; determining, using the surrogate member server, a monetary purchase value amount that is needed to fund the at least one online purchase transaction; allowing the subscribing member, using the surrogate member server, to select the at least one funding source from which funds will be used for indirect payment of the purchase transaction; requesting, by the surrogate member server, authorization from the external financial institution for the monetary purchase value amount to be charged against the at least one funding source of the subscribing member; obtaining approval from the external financial institution for the monetary purchase value amount; assigning the monetary purchase value amount to a temporary card number selected from a plurality of pre-approved card numbers at the time of obtaining approval of the external financial institution for the monetary purchase value amount, and assigning the temporary card number to an anonymous controlled use card for exclusive use by the surrogate member server to conduct the online purchase transaction, the anonymous controlled use card having no traceable connection outside the identity protection system to any financial account of the subscribing member including the at least one funding source; providing, using the surrogate member server, the controlled use card and fictitious personal identity information, in lieu of aspects of the subscribing member'"'"'s personal identity information required to complete the online purchase transaction, to the merchant on behalf of the subscribing member; and wherein the merchant obtains credit approval and payment for the purchase transaction against the controlled use card in an amount not exceeding the approved monetary purchase value amount and wherein no aspects of the subscribing member'"'"'s personal identity information are revealed to the merchant by the surrogate member server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. An identity protection system for protecting personal identity information during purchase transactions, said system comprising at least one server configured for:
-
registering an individual subscriber as a member and obtaining personal identity information from the subscribing member as storable computer data, including the subscribing member'"'"'s name and account information for at least one funding source of the subscribing member, the at least one funding source being independent and external to the identity protection system and managed by an external financial institution, the identity protection system having a surrogate member server for making surrogate purchases for members of the identity protection system; encrypting the entered personal identity information by a computer; fragmenting the encrypted personal identity information by a computer; storing portions of the fragmented encrypted personal identity information, by at least one computer, independently at separate computer storage locations; receiving a request from the subscribing member to use the surrogate member server for use in conducting at least one online purchase transaction with a merchant; determining a monetary purchase value amount that is needed to fund the at least one online purchase transaction; allowing the subscribing member, using the surrogate member server, to select the at least one funding source from which funds will be used for indirect payment of the purchase transaction; requesting authorization from the external financial institution for the monetary purchase value amount to be charged against the at least one funding source of the subscribing member; obtaining approval from the external financial institution for the monetary purchase value amount; assigning the monetary purchase value amount to a temporary card number selected from a plurality of pre-approved card numbers at the time of obtaining approval of the external financial institution for the monetary purchase value amount, and assigning the temporary card number to an anonymous controlled use card for exclusive use by the surrogate member server to conduct the online purchase transaction, the anonymous controlled use card having no traceable connection outside the identity protection system to any financial account of the subscribing member including the at least one funding source; providing the controlled use card and fictitious personal identity information, in lieu of aspects of the subscribing member'"'"'s personal identity information required to complete the online purchase transaction, to the merchant on behalf of the subscribing member; and wherein the merchant obtains credit approval and payment for the purchase transaction against the controlled use card in an amount not exceeding the approved monetary purchase value amount and wherein no aspects of the subscribing member'"'"'s personal identity information are revealed to the merchant by the at least one server.
-
Specification