Authentication alerts
First Claim
1. A computing system comprising:
- a data store that stores information associated with individuals enrolled in a monitoring service; and
a computing device, comprising at least one physical processor, that is in communication with the data store and that is configured to perform operations comprising;
receiving information identifying an individual for whom an authentication request has been received in association with a request from a requesting entity that received the information in real time from a person alleging to be the individual, wherein the received information includes an identifier identifying the requesting entity;
retrieving a contact preference associated with the individual from the data store, wherein the contact preference indicates that alerts to the individual are to be delivered by at least one of a text message to a mobile device of the individual or a push alert delivered via an application executed on the mobile device of the individual, wherein the contact preference is retrieved based at least in part by matching information stored in the data store with the information identifying the individual received in association with the authentication request;
retrieving an entity name associated with the requesting entity based on the identifier;
sending an electronic notification to the mobile device of the individual as at least one of a text message or push alert according to the contact preference, wherein the electronic notification provides notification to the individual that an authentication request was received regarding the individual and includes at least the entity name, wherein the electronic notification requests confirmation that the person alleging to be the individual is actually the individual;
determining that the authentication request is not authorized based at least in part on one of;
(a) a response to the electronic notification from the mobile device of the individual, or (b) expiration of a response time limit; and
in response to determining that the authentication request is not authorized, providing a notification to the requesting entity indicating fraudulent use of identity information of the individual in association with the authentication request.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems are provided for generating alerts in association with a request to open an account for an individual. For example, information identifying an individual may be received from a financial entity in association with the financial entity receiving a request to open an account for the individual from a requesting entity. The requesting entity may be a vendor or service provider associated with the financial entity. An electronic notification may then be sent to the individual, which may include a selectable option to indicate that the individual does not authorize opening of the account. In response to receiving an indication that the individual does not authorize opening of the account, notifications may be sent to both the financial entity and the requesting entity indicating that the individual has not authorized opening of the account.
1657 Citations
20 Claims
-
1. A computing system comprising:
-
a data store that stores information associated with individuals enrolled in a monitoring service; and a computing device, comprising at least one physical processor, that is in communication with the data store and that is configured to perform operations comprising; receiving information identifying an individual for whom an authentication request has been received in association with a request from a requesting entity that received the information in real time from a person alleging to be the individual, wherein the received information includes an identifier identifying the requesting entity; retrieving a contact preference associated with the individual from the data store, wherein the contact preference indicates that alerts to the individual are to be delivered by at least one of a text message to a mobile device of the individual or a push alert delivered via an application executed on the mobile device of the individual, wherein the contact preference is retrieved based at least in part by matching information stored in the data store with the information identifying the individual received in association with the authentication request; retrieving an entity name associated with the requesting entity based on the identifier; sending an electronic notification to the mobile device of the individual as at least one of a text message or push alert according to the contact preference, wherein the electronic notification provides notification to the individual that an authentication request was received regarding the individual and includes at least the entity name, wherein the electronic notification requests confirmation that the person alleging to be the individual is actually the individual; determining that the authentication request is not authorized based at least in part on one of;
(a) a response to the electronic notification from the mobile device of the individual, or (b) expiration of a response time limit; andin response to determining that the authentication request is not authorized, providing a notification to the requesting entity indicating fraudulent use of identity information of the individual in association with the authentication request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer-implemented method comprising:
-
receiving, by one or more computing devices that are configured with specific executable instructions, information identifying an individual for whom an authentication request has been received in association with a request from a requesting entity that received the information in real time from a person alleging to be the individual, wherein the received information includes an identifier identifying the requesting entity; retrieving, by the one or more computing devices, a contact preference associated with the individual from a data store, wherein the contact preference indicates that alerts to the individual are to be delivered by at least one of a text message to a mobile device of the individual or a push alert delivered via an application executed on the mobile device of the individual, wherein the contact preference is retrieved based at least in part by matching information stored in the data store with the information identifying the individual received in association with the authentication request; retrieving, by the one or more computing devices, an entity name associated with the requesting entity based on the identifier; sending, by the one or more computing devices, an electronic notification to the mobile device of the individual as at least one of a text message or push alert according to the contact preference, wherein the electronic notification provides notification to the individual that an authentication request was received regarding the individual and includes at least the entity name, wherein the electronic notification requests confirmation that the person alleging to be the individual is actually the individual; determining, by the one or more computing devices, that the authentication request is not authorized based at least in part on one of;
(a) a response to the electronic notification from the mobile device of the individual, or (b) expiration of a response time limit; andsending, from the one or more computing devices to the mobile device of the individual, contact information for contacting the requesting entity in order to resolve potential fraud in association with unauthorized use of identity information of the individual in association with the authentication request. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A non-transitory, computer-readable medium having stored thereon computer-executable instructions configured to cause a processor of a computing system to perform operations comprising:
-
receiving information identifying an individual for whom an authentication request has been received in association with a request from a requesting entity that received the information in real time from a person alleging to be the individual, wherein the received information includes an identifier identifying the requesting entity; retrieving a contact preference associated with the individual from a data store, wherein the contact preference indicates that alerts to the individual are to be delivered by at least one of a text message to a mobile device of the individual or a push alert delivered via an application executed on the mobile device of the individual, wherein the contact preference is retrieved based at least in part by matching information stored in the data store with the information identifying the individual received in association with the authentication request; retrieving an entity name associated with the requesting entity based on the identifier; sending an electronic notification to the mobile device of the individual as at least one of a text message or push alert according to the contact preference, wherein the electronic notification provides notification to the individual that an authentication request was received regarding the individual and includes at least the entity name, wherein the electronic notification requests confirmation that the person alleging to be the individual is actually the individual; determining that the authentication request is not authorized based at least in part on one of;
(a) a response to the electronic notification from the mobile device of the individual, or (b) expiration of a response time limit; andsending, to the mobile device of the individual, contact information for contacting the requesting entity in order to resolve potential fraud in association with unauthorized use of identity information of the individual in association with the authentication request. - View Dependent Claims (19, 20)
-
Specification