Strategy-driven methodology for reducing identity theft
First Claim
Patent Images
1. A strategy-driven methodology for reducing identity theft, comprising the steps of:
- gaining system access to a device;
presenting at least one list of user choices instead of granting system access, said at least one list containing at least one choice that is preset by a registered user;
selecting at least one choice from said at least one list, wherein each of said associated lists of responses contain dynamic statement responses, said dynamic statement response includes one or more attributes;
electronically changing said attributes based on a user defined preset ruleand granting system access if said at least one selected choice matches said at least one preset choice.
0 Assignments
0 Petitions
Accused Products
Abstract
A strategy-driven methodology for reducing identity theft comprises the steps of attempting to gain system access, and presenting at least one list of user choices instead of granting system access, as practiced conventionally. The presented list contains at least one choice that is preset by a registered user. Other steps include selecting at least one choice from the presented list, and granting system access if the selected choice matches the preset choice.
190 Citations
30 Claims
-
1. A strategy-driven methodology for reducing identity theft, comprising the steps of:
- gaining system access to a device;
presenting at least one list of user choices instead of granting system access, said at least one list containing at least one choice that is preset by a registered user; selecting at least one choice from said at least one list, wherein each of said associated lists of responses contain dynamic statement responses, said dynamic statement response includes one or more attributes; electronically changing said attributes based on a user defined preset rule and granting system access if said at least one selected choice matches said at least one preset choice. - View Dependent Claims (2, 3, 4, 29, 30)
- gaining system access to a device;
-
5. A strategy driven-methodology for reducing identity theft, comprising the steps of:
-
inputting a system password; checking the input password for accuracy; inputting a response to at least one system query preset by a registered user if the input password is accurate, wherein the response contains a dynamic statement response, said dynamic statement response includes one or more attributes; electronically changing said attributes based on a user defined preset rule; checking the input response for accuracy; and granting access to the secure system website if the input response to said at least one preset system query is accurate. - View Dependent Claims (6, 7, 8)
-
-
9. A strategy-driven methodology for reducing identity theft, comprising the steps of:
- operatively coupling a computer to a secure system website over a network;
inputting a system password via said computer; checking the input system password for accuracy; selecting at least one choice from one system query, wherein, at least one system query contains a choice that is preset by a registered user and said system query contains both dynamic and static user choices; inputting a response to at least one system query preset by a registered user, if the input system password is accurate;
wherein the response contains a dynamic statement response, said dynamic statement response includes one or more attributes;electronically changing said attributes based on a user defined preset rule; checking the input response for accuracy; and
granting access to the secure system website if the input response to said at least one preset system query is accurate. - View Dependent Claims (10, 11)
- operatively coupling a computer to a secure system website over a network;
-
12. A strategy-driven methodology for reducing identity theft, comprising the steps of:
-
inputting a user name as part of a system login sequence; checking the input user name for accuracy; inputting a system password if the input user name is accurate; checking whether the input system password is correct; if the input system password is correct, presenting at least one list of user choices from an option list, instead of granting system access, said at least one list containing at least one choice that is preset by a registered user; selecting at least one choice from an option list preset by a registered user wherein each option list contain dynamic statement responses, said dynamic statement response includes one or more attributes; electronically changing said attributes based on a user defined preset rule checking said at least one selected choice for accuracy; and granting system access if said at least one selected choice from said preset option list is accurate. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A secure system access method, said method comprising the steps of:
-
selecting at least one question from a system list of questions, each question from said system list being presented with an associated list of responses, each of said responses and questions being respectively preset by an authorized user; selecting at least one response from a list of responses to said at least one question, wherein each of said associated list of responses contain dynamic statement response, said dynamic statement response includes one or more attributes; electronically changing said attributes based on a user defined preset rule; checking said at least one selected response for accuracy; and granting system access if said at least one selected response is accurate. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
Specification