×

Authentication alerts

  • US 10,685,336 B1
  • Filed: 10/05/2018
  • Issued: 06/16/2020
  • Est. Priority Date: 06/16/2011
  • Status: Active Grant
First Claim
Patent Images

1. A computing system comprising:

  • a data store that stores information associated with individuals enrolled in a monitoring service; and

    a computing device, comprising at least one physical processor, that is in communication with the data store and that is configured to perform operations comprising;

    receiving information identifying an individual for whom an authentication request has been received in association with a request from a requesting entity that received the information in real time from a person alleging to be the individual, wherein the received information includes an identifier identifying the requesting entity;

    retrieving a contact preference associated with the individual from the data store, wherein the contact preference indicates that alerts to the individual are to be delivered by at least one of a text message to a mobile device of the individual or a push alert delivered via an application executed on the mobile device of the individual, wherein the contact preference is retrieved based at least in part by matching information stored in the data store with the information identifying the individual received in association with the authentication request;

    retrieving an entity name associated with the requesting entity based on the identifier;

    sending an electronic notification to the mobile device of the individual as at least one of a text message or push alert according to the contact preference, wherein the electronic notification provides notification to the individual that an authentication request was received regarding the individual and includes at least the entity name, wherein the electronic notification requests confirmation that the person alleging to be the individual is actually the individual;

    determining that the authentication request is not authorized based at least in part on one of;

    (a) a response to the electronic notification from the mobile device of the individual, or (b) expiration of a response time limit; and

    in response to determining that the authentication request is not authorized, providing a notification to the requesting entity indicating fraudulent use of identity information of the individual in association with the authentication request.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×