Systems and methods for universal enhanced log-in, identity document verification and dedicated survey participation
First Claim
1. A computer implemented method for identifying potentially improper use of identity documents as part of an identity theft prevention service, comprising:
- receiving, at a server of a fraud data collection platform via a computer network, from a first subscriber server of a first subscriber, information related to an identity document and authorization data indicating registration of the first subscriber with an identity theft prevention service;
storing the information related to the identity document in a database;
performing a comparison of the information related to the identity document with prior activity data related to use of the identity document and received from a second subscriber registered with the identify theft prevention service, the prior activity data stored in the database;
identifying, based on the comparison, at least one instance of potential identity document misuse; and
informing, based at least in part on the authorization data, at least one of the first subscriber, the second subscriber and a third subscriber registered with the identify theft prevention service of data identifying the at least one instance of potential identity document misuse via a communication session established between the fraud data collection platform and at least one of the first subscriber server associated with the first subscriber, a second subscriber server of the second subscriber, and a third subscriber server of the third subscriber.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods are provided for controlling access via a computer network to a subscriber server. A log-in server receives a query to connect through the computer network to the subscriber server, and the log-in server receives registrant identification data, A first session is established between the log-in server and the subscriber server to validate the registrant identification data, and to generate a session password. A second session is established between the log-in server and the subscriber server. The second session is configured to authorize, based in part on the registrant identification data, access to at least a portion of a website associated with the subscriber server.
101 Citations
20 Claims
-
1. A computer implemented method for identifying potentially improper use of identity documents as part of an identity theft prevention service, comprising:
-
receiving, at a server of a fraud data collection platform via a computer network, from a first subscriber server of a first subscriber, information related to an identity document and authorization data indicating registration of the first subscriber with an identity theft prevention service; storing the information related to the identity document in a database; performing a comparison of the information related to the identity document with prior activity data related to use of the identity document and received from a second subscriber registered with the identify theft prevention service, the prior activity data stored in the database; identifying, based on the comparison, at least one instance of potential identity document misuse; and informing, based at least in part on the authorization data, at least one of the first subscriber, the second subscriber and a third subscriber registered with the identify theft prevention service of data identifying the at least one instance of potential identity document misuse via a communication session established between the fraud data collection platform and at least one of the first subscriber server associated with the first subscriber, a second subscriber server of the second subscriber, and a third subscriber server of the third subscriber. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for identifying potentially improper use of an identity document via a computer network as part of an identity theft prevention service, comprising:
-
a fraud data collection platform having at least one server and at least one database, the fraud data collection platform configured to; receive, from a first subscriber of a first subscriber, during at least one communication session via the computer network between the fraud data collection platform and a subscriber server of the first subscriber, information related to the identity document and authorization data indicating registration of the first subscriber with an identity theft prevention service; store at least one of the information related to the identity document and the authorization data in the database; perform a comparison of the information related to the identity document with prior activity data related to use of the identity document and received from a second subscriber registered with the identity theft protection service; identify, based on the comparison, at least one instance of potential identity document misuse; and inform, based at least in part on the authorization data, at least one of the first subscriber, the second subscriber, and a third subscriber of the identity theft prevention service, of data identifying the at least one instance of potential identity document misuse. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory computer readable storage medium having instructions to provide information via a computer network, the instructions comprising instructions to:
-
receive, from a first subscriber via the computer network, information related to the identity document and authorization data indicating registration of the first subscriber with an identity theft prevention service; store at least one of the information related to the identity document and the authorization data in the database; perform a comparison of the information related to the identity document with prior activity data related to use of the identity document and received from a second subscriber registered with the identity theft protection service; identify, based on the comparison, at least one instance of potential identity document misuse; and inform, based at least in part on the authorization data, at least one of the first subscriber, the second subscriber, and a third subscriber of the identity theft prevention service, of data identifying the at least one instance of potential identity document misuse.
-
Specification