Method and system for preventing and detecting identity theft
First Claim
1. A method comprising:
- receiving first information relating to a financial account of an individual from at least one first data provider;
receiving second information relating to at least one of an identity theft expense reimbursement insurance policy of the individual, public information relating to the individual, an identity theft risk score of the individual, a credit card registry of the individual, background information of the individual, and a business report relating to the individual, from at least one second data provider; and
preparing a report relating to the individual'"'"'s risk of identity theft based on said first and second information.
24 Assignments
0 Petitions
Accused Products
Abstract
A system, method and computer program product for receiving information relating to a financial account of an individual from at least one first data provider; receiving information relating to at least one of an identity theft expense reimbursement insurance policy of the individual, a public information relating to the individual, an identity theft risk score of the individual, a credit card registry of the individual, a backup data relating to the individual, a background information of the individual, and a business report relating to the individual, from at least one second data provider; and preparing a report relating to the individual'"'"'s identity theft based on the information.
183 Citations
19 Claims
-
1. A method comprising:
-
receiving first information relating to a financial account of an individual from at least one first data provider;
receiving second information relating to at least one of an identity theft expense reimbursement insurance policy of the individual, public information relating to the individual, an identity theft risk score of the individual, a credit card registry of the individual, background information of the individual, and a business report relating to the individual, from at least one second data provider; and
preparing a report relating to the individual'"'"'s risk of identity theft based on said first and second information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 12)
-
-
11. The method of claim 11, wherein the alert is sent to the user via at least one of email, telephone, text message, regular mail, and/or facsimile.
-
13. A system for detecting identity theft comprising:
-
at least one first data provider, said data provider comprising at least one a DDA account credit report, a DDA account credit monitoring &
notification, a brokerage account monitoring &
notification, and a credit card transaction activity monitoring &
notification;
at least one second data provider, said data provider comprising at least one of an identity theft expense reimbursement insurance provider, a public record report provider, a public record monitoring &
notification provider, an internet monitoring and/or notification provider, an identity theft risk score provider, a credit card registry, a data backup provider, a background screening provider, and a business report provider; and
an identity theft engine which receives information from said at least one first data provider and said at least one second data provider and creates a report relating to an individual'"'"'s identity theft. - View Dependent Claims (14, 15, 16)
-
-
17. A software program product for detecting identity theft, which, when executed, performs a method comprising:
-
receiving first information relating to a financial account of an individual from at least one first data provider;
receiving second information relating to at least one of an identity theft expense reimbursement insurance policy of the individual, public information relating to the individual, an identity theft risk score of the individual, a credit card registry of the individual, background information of the individual, and a business report relating to the individual, from at least one second data provider; and
preparing a report relating to the individual'"'"'s risk of identity theft based on said first and second information. - View Dependent Claims (18, 19)
-
Specification