System and method to support identity theft protection as part of a distributed service oriented ecosystem
First Claim
1. A computer readable hardware storage device storing computer instructions when executed perform a computer implemented method for supporting identity theft protection, the method comprising:
- receiving one or more credentials via a login attempt by a first device;
processing the one or more credentials to identify a subscriber having the one or more credentials;
providing a plurality of services to the subscriber including receiving a text message and requiring an authorization code prior to processing the login attempt;
sending the text message to the subscriber via a second device to notify the subscriber of the login attempt by the first device; and
generating a risk rating associated with the login attempt,wherein the risk rating is based on a subscriber location and a login attempt location.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method to support identity theft protection and, in particular, to a system and method for supporting identity theft protection as part of a distributed service oriented ecosystem in Internet protocol (IP) multimedia subsystem (IMS) and non-IMS networks. The system includes an identity session initiation protocol (SIP) application server configured to act as a security assertion markup language (SAML) bridge, which allows an SIP enabled device or a non-SIP enabled device to attach to a telecommunications service provider network. A user may accept or reject an authorization request using the SIP enabled device or non-SIP enabled device.
74 Citations
14 Claims
-
1. A computer readable hardware storage device storing computer instructions when executed perform a computer implemented method for supporting identity theft protection, the method comprising:
-
receiving one or more credentials via a login attempt by a first device;
processing the one or more credentials to identify a subscriber having the one or more credentials;providing a plurality of services to the subscriber including receiving a text message and requiring an authorization code prior to processing the login attempt; sending the text message to the subscriber via a second device to notify the subscriber of the login attempt by the first device; and generating a risk rating associated with the login attempt, wherein the risk rating is based on a subscriber location and a login attempt location. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for deploying an application for supporting identity theft protection, comprising:
-
providing a computer infrastructure being operable to; receive one or more credentials via a login attempt by a first device;
process the one or more credentials to identify a subscriber having the one or more credentials;provide a plurality of services to the subscriber including receiving a text message and requiring an authorization code prior to processing the login attempt; send the text message to the subscriber via a second device to notify the subscriber of the login attempt by the first device; and generate a risk rating associated with the login attempt, wherein the risk rating is based on a subscriber location and a login attempt location. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
Specification