EP1661054A2 - Method and system for identity theft prevention, detection and victim assistance - Google Patents
Method and system for identity theft prevention, detection and victim assistanceInfo
- Publication number
- EP1661054A2 EP1661054A2 EP04821029A EP04821029A EP1661054A2 EP 1661054 A2 EP1661054 A2 EP 1661054A2 EP 04821029 A EP04821029 A EP 04821029A EP 04821029 A EP04821029 A EP 04821029A EP 1661054 A2 EP1661054 A2 EP 1661054A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- customer
- identity theft
- victim
- account
- present
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation or account maintenance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/24—Credit schemes, i.e. "pay after"
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
Definitions
- the present invention relates generally to a method and system for providing
- the present invention is a method and system for a hybrid approach that offers an identity theft prevention/detection service combined
- FIG. 1 illustrates a theft prevention process flow of an embodiment of the present invention
- FIG. 2 illustrates a victim assistance process flow of an embodiment of the present invention.
- An embodiment of the present invention relates to identity theft prevention. See FIG. 1.
- a further embodiment relates more particularly to prevention actions
- This embodiment verifies suspicious account data changes that match a fraud indicator system, such as the Known Fraud Indicator System
- KFIS Issuer Clearing Service
- ICS Issuer Clearing Service
- the embodiment further verifies activity with the customer to ensure it was authorized.
- Another embodiment of the present invention relates to prevention actions involving a fee-based product. This embodiment includes a methodology for sending
- the methodology includes working with the customer to establish a true password on all accounts and recommending that the customer update all creditor relationships with a password. Further, in this embodiment, at the time of account data changes (e.g., address), the changes are verified with the customer to ensure they were authorized. In another embodiment, the present invention ensures that any new applications received, which have information matching an enrollee's data, are verified with the customer. In a further embodiment, discounts are offered on preventative merchandise that may assist in protecting the customer (e.g., shredders, locking mailboxes, etc.).
- bank card detection actions are provided against fraudulent applications. For example, postcards are sent to verify suspicious applications; authorization detection strategies are used to detect out-of-pattern spending and payments, and the potential victim is proactively contacted to validate transactions; the KFIS database records all fraudulent addresses and the phone numbers listed on accounts; manual reports look for new accounts with a balance transfer check request; investigations are conducted on accounts that have credit inquiries by collusive credit bureau subscribers; police reports are filed when identity theft perpetrators are identified; and investigative intelligence is shared in a working relationship with law enforcement to prosecute criminals.
- bank card detection actions are provided against Account Take Over (ATO).
- ATO Account Take Over
- an embodiment performs incremental verification when high risk requests are made on an account; authorization detection strategies monitor for high risk ATO transactions; and the KFIS database records all fraudulent addresses and phone numbers that are listed on accounts identified as an ATO. This database then monitors the host system for any other accounts that are
- a further embodiment of the present invention includes high risk transactions reports (e.g., involving address change and card request sent to a high risk zip code area or an overnight card request to alternate shipping address located in a high risk zip code area). Additionally, customers who are victimized by ATO fraud have their account flagged to ensure that a representative handling the customers' next inquiry is aware that the customers have been impacted by ATO fraud.
- Embodiments also include internal collusion detection controls managed, e.g., through an Internal Investigation/Fraud Policy unit.
- Embodiments of the present invention also include identity theft controls such as supporting the prioritization of passwords, IP address capture, enhanced fraud variable TPR, and CBR fraud alerts. Further embodiments include, for example, private label detection actions pertaining to high risk client checks whereby store applications are reviewed that have a higher fraud rate based on historical details. Other embodiments include FEW suspicious activity monitoring such as the billing address/ship-to-address mismatch.
- Additional embodiments of the present invention also relate to the following: Fraud scoring whereby a systemic score attempts to predict the likelihood of fraud on an application; New Account Processing System (NAPS) fraud controls wherein NAPS verification of information is provided by the customer; California identity theft legislation that targets applications from California where the bureau details differ from the application details; a database that looks for bureau variations, such as a suspect
- Embodiments of the present invention also include victim assistance actions.
- Victims are referred to the credit bureaus to apply a victim
- Embodiments of the invention also include instructing the victim to file a police report
- Embodiments of the present invention also comprise the following: Upon notification from the customer, pulling the bureau reports and reviewing the trades with the customer to determine if any are unauthorized; contacting the bureau with the customer on the line to assist him in applying a victim statement; completing all paper
- Embodiments of the present invention further include acting for the customer and/or providing assistance to the customer to make it easier for him or her to recover
- a new account is established and the victim gets his new card in hand, for example, within 24 hours as a fast card and a case is created for tracking and follow-up.
- the affidavit is sent to the customer either, for
- a follow-up is scheduled, for example, within 30 days to re-contact the customer to review yet again the bureau reports for any new inquiries or tradelines that have come up that are either unauthorized or
- Further embodiments of the present invention include providing information which will allow the customer to contact all unauthorized creditors and request that the affected accounts be closed. If approved by the creditor, a universal affidavit, as noted above, is completed and sent to the customer for signature. The customer then sends it to a representative who will forward it to all investigative units. Thereafter, the customer sends the affidavit to other creditors as required.
- Other embodiments of the present invention comprise meeting with a field investigations staff to outline the typical questions used on police reports and to document these items for the customer. The questions are completed and this information is sent to the customer. The customer then takes this information to his or her local law enforcement authority. Further embodiments include filling out the appropriate governmental agency (e.g., Federal Trade Commission, Social Security Administration, etc) documentation and forwarding it to the customer for review arid submission.
- governmental agency e.g., Federal Trade Commission, Social Security Administration, etc
- embodiments of the present invention include working with the customer to determine if an extension of credit to cover necessary transaction activity during the investigation can be facilitated.
- embodiments of the invention provide for a letter to be written to the lender educating the lender that identity theft has been reported and creditors are currently investigating claims. Individual business dispute representatives pro actively contact the victim to explain the actions that will be taken on the accounts. A written explanation of the actions that will be taken to assist the victim is also provided. Unauthorized tradelines continue to be deleted from the bureau
- the unit has access to all card platforms. Certain accounts are assigned to a specialized unit in which a specific person is appointed to work with the victim. This allows a relationship to be established between the victim and the servicing representative, while providing stability during a traumatic event. Additionally, this minimizes the need for the customer to repeatedly explain his or her situation.
- Embodiments of the present invention also includes, at the time of initial enrollment, providing the customer with an identity theft welcome kit that focuses on how to prevent identity theft. This includes an internet link and a checklist of actions that should be taken to minimize the potential of identity theft. Phone numbers to call in the event of suspected identity theft is also included.
- FIG. 1 Embodiments of the present invention have now been described in fulfillment of the above objects. It will be appreciated that these examples are merely illustrative of the invention. Many variations and modifications will be apparent those skilled in the art.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- Computer Security & Cryptography (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Technology Law (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Burglar Alarm Systems (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Alarm Systems (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US49937803P | 2003-09-03 | 2003-09-03 | |
PCT/US2004/028569 WO2005065073A2 (en) | 2003-09-03 | 2004-09-03 | Method and system for identity theft prevention, detection and victim assistance |
Publications (2)
Publication Number | Publication Date |
---|---|
EP1661054A2 true EP1661054A2 (en) | 2006-05-31 |
EP1661054A4 EP1661054A4 (en) | 2009-07-15 |
Family
ID=34748729
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP04821029A Withdrawn EP1661054A4 (en) | 2003-09-03 | 2004-09-03 | Method and system for identity theft prevention, detection and victim assistance |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP1661054A4 (en) |
JP (1) | JP2007504560A (en) |
KR (1) | KR20060073949A (en) |
AU (1) | AU2004311581A1 (en) |
BR (1) | BRPI0414119A (en) |
WO (1) | WO2005065073A2 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9275407B2 (en) | 2009-11-06 | 2016-03-01 | Livingsocial, Inc. | Systems and methods to implement point of sale (POS) terminals, process orders and manage order fulfillment |
US10102591B2 (en) | 2011-01-21 | 2018-10-16 | Livingsocial, Inc. | Systems and methods to implement point of sale (POS) terminals, process orders and manage order fulfillment |
CN111800396B (en) | 2015-07-01 | 2022-05-17 | 创新先进技术有限公司 | Log-in method and device for loss-reporting account |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5884289A (en) * | 1995-06-16 | 1999-03-16 | Card Alert Services, Inc. | Debit card fraud detection and control system |
US20020173994A1 (en) * | 2001-05-21 | 2002-11-21 | Ferguson Joseph M. | Method and apparatus for insuring an insured from identity theft peril and identity reclamation and credit restoration |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001338151A (en) * | 2000-05-29 | 2001-12-07 | Sony Corp | Extra personal information storage substrate, security system for personal information storage substrate and security method for personal information storage substrate |
JP2002358417A (en) * | 2001-03-30 | 2002-12-13 | Mizuho Corporate Bank Ltd | Method, system, and program for banking processing |
-
2004
- 2004-09-03 BR BRPI0414119-9A patent/BRPI0414119A/en not_active Application Discontinuation
- 2004-09-03 EP EP04821029A patent/EP1661054A4/en not_active Withdrawn
- 2004-09-03 WO PCT/US2004/028569 patent/WO2005065073A2/en active Application Filing
- 2004-09-03 KR KR1020067004538A patent/KR20060073949A/en not_active Application Discontinuation
- 2004-09-03 AU AU2004311581A patent/AU2004311581A1/en not_active Abandoned
- 2004-09-03 JP JP2006525438A patent/JP2007504560A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5884289A (en) * | 1995-06-16 | 1999-03-16 | Card Alert Services, Inc. | Debit card fraud detection and control system |
US20020173994A1 (en) * | 2001-05-21 | 2002-11-21 | Ferguson Joseph M. | Method and apparatus for insuring an insured from identity theft peril and identity reclamation and credit restoration |
Non-Patent Citations (1)
Title |
---|
See also references of WO2005065073A2 * |
Also Published As
Publication number | Publication date |
---|---|
JP2007504560A (en) | 2007-03-01 |
AU2004311581A1 (en) | 2005-07-21 |
KR20060073949A (en) | 2006-06-29 |
WO2005065073A2 (en) | 2005-07-21 |
WO2005065073A3 (en) | 2006-11-02 |
BRPI0414119A (en) | 2006-10-31 |
EP1661054A4 (en) | 2009-07-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20050144143A1 (en) | Method and system for identity theft prevention, detection and victim assistance | |
JP7350819B2 (en) | Transaction monitoring system | |
US11288676B2 (en) | Private confirmation system | |
US20060089905A1 (en) | Credit and identity protection network | |
EP1661054A2 (en) | Method and system for identity theft prevention, detection and victim assistance | |
Roberts et al. | Via Email | |
MXPA06002498A (en) | Method and system for identity theft prevention, detection and victim assistance | |
Kempen | Vehicle scams: stop and think before you hand over your keys or cash | |
Lawson | Identity-related crime victim issues: A discussion paper | |
Taylor-Butts et al. | Fraud Against Businesses in Canada: Results from a National Survey | |
Act | USA Patriot Act | |
Center | Dear H | |
AU2012200457A1 (en) | Method and system for identity theft prevention, detection and victim assistance | |
MXPA06005848A (en) | Method and system for identity theft prevention, detection and victim assistance |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20060303 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL HR LT LV MK |
|
PUAK | Availability of information related to the publication of the international search report |
Free format text: ORIGINAL CODE: 0009015 |
|
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1095407 Country of ref document: HK |
|
A4 | Supplementary search report drawn up and despatched |
Effective date: 20090612 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: G06Q 40/00 20060101ALI20090605BHEP Ipc: G06Q 20/00 20060101AFI20090605BHEP |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04K 1/00 20060101ALI20090817BHEP Ipc: H04L 9/00 20060101ALI20090817BHEP Ipc: G06Q 99/00 20060101AFI20090817BHEP |
|
17Q | First examination report despatched |
Effective date: 20091009 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20100220 |
|
REG | Reference to a national code |
Ref country code: HK Ref legal event code: WD Ref document number: 1095407 Country of ref document: HK |