CA2463891A1 - Verification of a person identifier received online - Google Patents
Verification of a person identifier received online Download PDFInfo
- Publication number
- CA2463891A1 CA2463891A1 CA002463891A CA2463891A CA2463891A1 CA 2463891 A1 CA2463891 A1 CA 2463891A1 CA 002463891 A CA002463891 A CA 002463891A CA 2463891 A CA2463891 A CA 2463891A CA 2463891 A1 CA2463891 A1 CA 2463891A1
- Authority
- CA
- Canada
- Prior art keywords
- person identifier
- sender
- person
- identifier
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/33—Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
Abstract
A_system and method for verification of a person identifier received online is described. The method includes receiving a request for verifying a person identifier (P11); and estimating whether (a) P11(100) identifies the same person as another person identifier (P12), (b) sender of P11 is the same person as sender of P12(106), and (c) P12 identifies the sender of P12.
Claims (32)
1. A method of verifying a first person identifier comprising:
a. Receiving a Verification Request including the first person identifier; and b. Estimating whether Verification Conditions including:
i. the first person identifier and a second person identifier satisfy a Same Person Condition, ii. a sender of the first person identifier and a sender of said second person identifier satisfy a Same Sender Condition, and iii. said second person identifier identifies said sender of said second person identifier;
are true.
a. Receiving a Verification Request including the first person identifier; and b. Estimating whether Verification Conditions including:
i. the first person identifier and a second person identifier satisfy a Same Person Condition, ii. a sender of the first person identifier and a sender of said second person identifier satisfy a Same Sender Condition, and iii. said second person identifier identifies said sender of said second person identifier;
are true.
2. The method of claim 1, further including the step of sending a Verification Report indicating whether the first person identifier identifies said sender of the first person identifier, said Verification Report being based on results of said estimating.
3. The method of claim 1, wherein said Verification Request further includes at least one information element chosen from the group consisting of:
a. Said second person identifier;
b. A first sender indicator relating to the first person identifier;
c. A second sender indicator relating to said second person identifier; and d. Verification Information for said second person identifier.
a. Said second person identifier;
b. A first sender indicator relating to the first person identifier;
c. A second sender indicator relating to said second person identifier; and d. Verification Information for said second person identifier.
4. The method of claim 1, wherein said estimating further includes:
a. Sending at least one query to at least one Person Identifier-Sender Indicator Database; and b. Receiving at least one response to said at least one query.
a. Sending at least one query to at least one Person Identifier-Sender Indicator Database; and b. Receiving at least one response to said at least one query.
5. The method of claim 4 wherein at least one of said at least one query is a conditional query describing at least one of said Verification Conditions.
6. The method of claim 5 wherein said estimating further includes estimating whether said at least one response to said at least one query satisfies at least one of said Verification Conditions other than said at least one Verification Condition that was described in said at least one query.
7. The method of claim 1, wherein said Same Person Condition is satisfied if the first person identifier and said second person identifier have a Same Person Relation that includes at least one relation between two person identifiers selected from the group consisting of:
a. Said two person identifiers include identical portions;
b. Said two person identifiers include portions that are identical except for spelling differences;
c. A first of said two person identifiers includes an abbreviation of a second of said two person identifiers;
d. Said two person identifiers include numerically close phone numbers;
e. Said two person identifiers include geographically close geographical parameters;
f. A directory record associates a person identifier that has a Same Person Relation with a first of said two person identifiers with another person identifier that has a Same Person Relation with a second of said two person identifiers; and g. Each of said two person identifiers has a respective Same Person Relation with a third person identifier.
a. Said two person identifiers include identical portions;
b. Said two person identifiers include portions that are identical except for spelling differences;
c. A first of said two person identifiers includes an abbreviation of a second of said two person identifiers;
d. Said two person identifiers include numerically close phone numbers;
e. Said two person identifiers include geographically close geographical parameters;
f. A directory record associates a person identifier that has a Same Person Relation with a first of said two person identifiers with another person identifier that has a Same Person Relation with a second of said two person identifiers; and g. Each of said two person identifiers has a respective Same Person Relation with a third person identifier.
8. The method of claim 1, wherein said Same Sender Condition is satisfied if a message containing the first person identifier and a message containing said second person identifier have a Same Sender Relation that includes at least one relation, between a first message and a second message, selected from the group consisting of:
a. Membership of said first message and said second message in a common integral message;
b. A relation between a time said first message was sent and a time said second message was sent;
c. A relation between a reliable network address of a sender of said first message and a reliable network address of a sender of said second message;
d. A first secret contained in said first message and a second secret contained in said second message being derivatives of a common secret;
e. A first secret that was sent to a sender of said first message and a second secret contained in said second message being derivatives of a common secret; and f. Each of said messages having a respective Same Sender Relation with a third message.
a. Membership of said first message and said second message in a common integral message;
b. A relation between a time said first message was sent and a time said second message was sent;
c. A relation between a reliable network address of a sender of said first message and a reliable network address of a sender of said second message;
d. A first secret contained in said first message and a second secret contained in said second message being derivatives of a common secret;
e. A first secret that was sent to a sender of said first message and a second secret contained in said second message being derivatives of a common secret; and f. Each of said messages having a respective Same Sender Relation with a third message.
9. The method of claim 8, wherein said relation between said reliable network address of said sender of said first message and said reliable network address of said sender of said second message includes at least one relation selected from the group consisting of:
a. Identity of said reliable network address of said sender of said first message and said reliable network address of said sender of said second message;
b. Membership in a common sub-network of said reliable network address of said sender of said first message and said reliable network address of said sender of said second message;
c. Use of said reliable network address of said sender of said first message and said reliable network address of said sender of said second message by a common organization;
d. Use of said reliable networlc address of said sender of said first message and said reliable network address of said sender of said second message by two related organizations;
e. Use of said reliable network address of said sender of said first message and said reliable networlc address of said sender of said second message by a common Internet Service Provider;
f. Use of said reliable network address of said sender of said first message and said reliable network address of said sender of said second message by a common Internet Service Provider Point of Presence; and g. Association of said reliable network address of said sender of said first message and said reliable network address of said sender of said second message with close geographical locations.
a. Identity of said reliable network address of said sender of said first message and said reliable network address of said sender of said second message;
b. Membership in a common sub-network of said reliable network address of said sender of said first message and said reliable network address of said sender of said second message;
c. Use of said reliable network address of said sender of said first message and said reliable network address of said sender of said second message by a common organization;
d. Use of said reliable networlc address of said sender of said first message and said reliable network address of said sender of said second message by two related organizations;
e. Use of said reliable network address of said sender of said first message and said reliable networlc address of said sender of said second message by a common Internet Service Provider;
f. Use of said reliable network address of said sender of said first message and said reliable network address of said sender of said second message by a common Internet Service Provider Point of Presence; and g. Association of said reliable network address of said sender of said first message and said reliable network address of said sender of said second message with close geographical locations.
10. The method of claim 8, wherein at least one of said reliable network addresses is a reliable network address selected from the group consisting of: An IP address, an IP
address together with a UDP port number, a TCP session handle, and a physical interface identifier.
address together with a UDP port number, a TCP session handle, and a physical interface identifier.
11. The method of claim 8, wherein at least one of said first and second secrets is a secret selected from the group consisting of: A secret kept by a device, a secret HTTP cookie, a secret HTTP secure cookie, an SMTP header, an HTTP header, a hardware identifier, a secret kept in a software component installed on said device, a secret assigned to a person for online use, a username and password, a secret URL, a network address, an IP address, a UDP port number, and a TCP session handle.
12. The method of claim 1, wherein said second person identifier is considered to identify said sender of said second person identifier if at least one second person identifier condition is true, said second person identifier condition being selected from the group consisting of:
a. Said second person identifier was verified using a standard method for verification of a person identifier;
b. Said second person identifier was verified by performing a successful offline action based on said second person identifier;
c. Said second person identifier was verified by successfully charging an account;
d. Said second person identifier was verified by receiving online a code sent to a mailing address;
e. Said second person identifier was verified by receiving online a code sent in a phone call;
f. Said second person identifier was verified by receiving, during a phone call, a code sent online;
g. Said second person identifier was received in conditions atypical of fraud;
h. Said second person identifier was sent a considerable period of time before the first person identifier was sent;
i. Said second person identifier was sent a considerable period of time after the first person identifier was sent;
j. Said second person identifier was sent to a service that fraudsters lack incentive to defraud;
k. Said second person identifier is associated with significant online activity typical of legitimate users;
l. Said second person identifier was provided by a trustable authorized agent of said sender of said second person identifier; and m. Said second person identifier was verified using the present invention.
a. Said second person identifier was verified using a standard method for verification of a person identifier;
b. Said second person identifier was verified by performing a successful offline action based on said second person identifier;
c. Said second person identifier was verified by successfully charging an account;
d. Said second person identifier was verified by receiving online a code sent to a mailing address;
e. Said second person identifier was verified by receiving online a code sent in a phone call;
f. Said second person identifier was verified by receiving, during a phone call, a code sent online;
g. Said second person identifier was received in conditions atypical of fraud;
h. Said second person identifier was sent a considerable period of time before the first person identifier was sent;
i. Said second person identifier was sent a considerable period of time after the first person identifier was sent;
j. Said second person identifier was sent to a service that fraudsters lack incentive to defraud;
k. Said second person identifier is associated with significant online activity typical of legitimate users;
l. Said second person identifier was provided by a trustable authorized agent of said sender of said second person identifier; and m. Said second person identifier was verified using the present invention.
13. The method of claim 1 wherein said estimating is effected using at least one estimating method selected from the group consisting of:
a. Rule-based logic;
b. An automatic learning technology;
c. A neural network; and d. Probabilistic analysis.
a. Rule-based logic;
b. An automatic learning technology;
c. A neural network; and d. Probabilistic analysis.
14. The method of claim 2 wherein said Verification Report includes at least one information element selected from the group consisting of:
a. A positive response;
b. A negative response;
c. Said second person identifier;
d. A sender indicator relating to said second person identifier;
e. Verification Information of said second person identifier;
f. A score describing a probability that the first person identifier and said second person identifier satisfy a Same Person Condition;
g. A score describing a probability that said sender of the first person identifier and said sender of said second person identifier satisfy a Same Sender Condition;
h. A score describing a probability that said second person identifier identifies said sender of said second person identifier; and i. A score describing a probability that the first person identifier identifies said sender of the first person identifier.
a. A positive response;
b. A negative response;
c. Said second person identifier;
d. A sender indicator relating to said second person identifier;
e. Verification Information of said second person identifier;
f. A score describing a probability that the first person identifier and said second person identifier satisfy a Same Person Condition;
g. A score describing a probability that said sender of the first person identifier and said sender of said second person identifier satisfy a Same Sender Condition;
h. A score describing a probability that said second person identifier identifies said sender of said second person identifier; and i. A score describing a probability that the first person identifier identifies said sender of the first person identifier.
15. The method of claim 14 wherein said score describing said probability that the first person identifier identifies said sender of the first person identifier is based on at least one parameter selected from the group consisting of:
a. A probability that the first person identifier and said second person identifier satisfy a Same Person Condition;
b. A probability that said sender of the first person identifier and said sender of said second person identifier satisfy a Same Person Condition;
c. A probability that said second person identifier identifies said sender of said second person identifier;
d. Difficulty in gaining access to a secret upon which said Same Sender Condition is based;
e. Reliability of an address of said sender of the first person identifier;
f. Reliability of an address of said sender of said second person identifier g. Accuracy and reliability of external data sources used in said step of estimating;
h. Popularity of the first person identifier;
i. Popularity of said second person identifier;
j. Tendency of people to change a person identifier;
k. Time elapsed between sending of the first person identifier and sending of said second person identifier; and 1. Time elapsed since charging an account identified by said second person identifier.
a. A probability that the first person identifier and said second person identifier satisfy a Same Person Condition;
b. A probability that said sender of the first person identifier and said sender of said second person identifier satisfy a Same Person Condition;
c. A probability that said second person identifier identifies said sender of said second person identifier;
d. Difficulty in gaining access to a secret upon which said Same Sender Condition is based;
e. Reliability of an address of said sender of the first person identifier;
f. Reliability of an address of said sender of said second person identifier g. Accuracy and reliability of external data sources used in said step of estimating;
h. Popularity of the first person identifier;
i. Popularity of said second person identifier;
j. Tendency of people to change a person identifier;
k. Time elapsed between sending of the first person identifier and sending of said second person identifier; and 1. Time elapsed since charging an account identified by said second person identifier.
16. The method of claim 1, wherein said estimating further includes:
a. Sending at least one query to at least one Person Identifier Directory; and b. Receiving at least one response to said at least one query.
a. Sending at least one query to at least one Person Identifier Directory; and b. Receiving at least one response to said at least one query.
17. The method of claim 1, further including the step of generating at least one hash of at least a part of at least one information element selected from the group consisting of:
a. The first person identifier;
b. Said second person identifier;
c. A first sender indicator relating to the first person identifier; and d. A second sender indicator relating to said second person identifier.
a. The first person identifier;
b. Said second person identifier;
c. A first sender indicator relating to the first person identifier; and d. A second sender indicator relating to said second person identifier.
18. The method of claim 17 further including the step of determining a size of said at least one hash, based on at least one consideration selected from the group consisting of:
a. Information confidentiality; and b. An acceptable level of false verifications.
a. Information confidentiality; and b. An acceptable level of false verifications.
19. The method of claim 1 wherein an entity receiving the first person identifier from said sender of the first person identifier is different than an entity receiving said second person identifier from said sender of said second person identifier.
20. The method of claim 1, wherein said step of estimating is repeated with at least one person identifier other than said second person identifier.
21. The method of claim 1, further including the step of choosing which person identifier from a plurality of person identifiers to use as said second person identifier in said step of estimating.
22. The method of claim 1, further including the step of obtaining at least one sender indicator from said sender of the first person identifier.
23. The method of claim 1, further including the step of combining results of said estimating with results of at least one other method of verifying a person identifier.
24. The method of claim 1, wherein at least one person identifier selected from the group consisting of the first person identifier and said second person identifier includes at least one information element selected from the group consisting o~ a full name, a first name, a middle name, a last name, name initials, a title, an address, a country, a state, a city, a street address, an apartment number, a zip code, a phone number, an email address, a financial account number, a credit card number, a bank account number, a government-issued identifier, a social security number, a driver's license number, a national ID
number, a passport number, personal characteristics, a height, a weight, a gender, a complexion, a race, and a hair color.
number, a passport number, personal characteristics, a height, a weight, a gender, a complexion, a race, and a hair color.
25. The method of claim 1, wherein the first person identifier is sent via a network selected from the group comprising: an Internet, a private data network, a CATV data network and a mobile data network.
26. A system for verifying a first person identifier comprising:
a. A Receiver for receiving a Verification Request including the first person identifier; and b. A Verification Estimator for estimating whether the first person identifier and a second person identifier satisfy a Same Person Condition, for estimating whether a sender of the first person identifier and a sender of said second person identifier satisfy a Same Sender Condition, and for estimating whether said second person identifier identifies said sender of said second person identifier.
a. A Receiver for receiving a Verification Request including the first person identifier; and b. A Verification Estimator for estimating whether the first person identifier and a second person identifier satisfy a Same Person Condition, for estimating whether a sender of the first person identifier and a sender of said second person identifier satisfy a Same Sender Condition, and for estimating whether said second person identifier identifies said sender of said second person identifier.
27. The system of claim 26, further comprising a Reporter for sending a Verification Report indicating whether the first person identifier identifies said sender of the first person identifier, said Verification Report being based on output of said Verification Estimator.
28. The system of claim 26, further including a Person Identifier Directory Query Module for sending a query to a Person Identifier Directory and receiving a response to said query, said response then used by said Verification Estimator.
29. The system of claim 28, further including at least one said Person Identifier Directory.
30. The system of claim 26, further including a Person Identifier-Sender Indicator Database Query Module for sending a query to at least one Person Identifier-Sender Indicator Database and receiving a response to said query, said response then used by said Verification Estimator.
31. The system of claim 30, further including at least one said Person Identifier-Sender Indicator Database.
32. The system of claim 26, further including a Hash Generator for generating at least one hash of at least a part of at least one information element selected from the group comprising:
a. the first person identifier;
b. Said second person identifier;
c. A first sender indicator relating to the first person identifier; and d. A second sender indicator relating to said second person identifier.
a. the first person identifier;
b. Said second person identifier;
c. A first sender indicator relating to the first person identifier; and d. A second sender indicator relating to said second person identifier.
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US32951801P | 2001-10-17 | 2001-10-17 | |
US60/329,518 | 2001-10-17 | ||
US37454802P | 2002-04-23 | 2002-04-23 | |
US60/374,548 | 2002-04-23 | ||
PCT/US2002/032825 WO2003034633A2 (en) | 2001-10-17 | 2002-10-16 | Verification of a person identifier received online |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2463891A1 true CA2463891A1 (en) | 2003-04-24 |
CA2463891C CA2463891C (en) | 2012-07-17 |
Family
ID=26986834
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2463891A Expired - Fee Related CA2463891C (en) | 2001-10-17 | 2002-10-16 | Verification of a person identifier received online |
Country Status (9)
Country | Link |
---|---|
US (2) | US8650103B2 (en) |
EP (1) | EP1436746A4 (en) |
JP (1) | JP2005507106A (en) |
CN (1) | CN1666205A (en) |
AU (1) | AU2002340207B2 (en) |
CA (1) | CA2463891C (en) |
IL (2) | IL161437A0 (en) |
NZ (1) | NZ532258A (en) |
WO (1) | WO2003034633A2 (en) |
Families Citing this family (126)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1436746A4 (en) * | 2001-10-17 | 2007-10-10 | Npx Technologies Ltd | Verification of a person identifier received online |
KR100464755B1 (en) * | 2002-05-25 | 2005-01-06 | 주식회사 파수닷컴 | User authentication method using user's e-mail address and hardware information |
US20040243704A1 (en) * | 2003-04-14 | 2004-12-02 | Alfredo Botelho | System and method for determining the unique web users and calculating the reach, frequency and effective reach of user web access |
US7409710B1 (en) * | 2003-10-14 | 2008-08-05 | Sun Microsystems, Inc. | Method and system for dynamically generating a web-based user interface |
US7647375B1 (en) | 2003-12-22 | 2010-01-12 | Aol Llc | Enabling mapping identification of online identities between different messaging services |
US7734708B1 (en) * | 2003-12-22 | 2010-06-08 | Aol Inc. | Enabling identification of online identities between different messaging services |
CA2552481C (en) * | 2004-01-09 | 2016-08-02 | Npx Technologies Ltd. | Detecting relayed communications |
US7565356B1 (en) * | 2004-04-30 | 2009-07-21 | Sun Microsystems, Inc. | Liberty discovery service enhancements |
WO2005114886A2 (en) * | 2004-05-21 | 2005-12-01 | Rsa Security Inc. | System and method of fraud reduction |
US7603700B2 (en) * | 2004-08-31 | 2009-10-13 | Aol Llc | Authenticating a client using linked authentication credentials |
US8484456B2 (en) * | 2004-12-08 | 2013-07-09 | Alien Camel Pty Ltd. | Trusted electronic messaging system |
US20060166666A1 (en) * | 2005-01-21 | 2006-07-27 | Roach Peter O Jr | Method and apparatus for hiding the identity of a mobile subscriber in response to a permission request |
US7724728B2 (en) * | 2005-04-19 | 2010-05-25 | Cisco Technology, Inc. | Policy-based processing of packets |
EP1878211A1 (en) * | 2005-04-20 | 2008-01-16 | Docaccount AB | Method and device for identification of a communication party |
DE602005025163D1 (en) * | 2005-04-20 | 2011-01-13 | Docaccount Ab | METHOD AND SYSTEM FOR THE ELECTRONIC RE-AUTHENTICATION OF A COMMUNICATION PARTICIPANT |
US7665658B2 (en) * | 2005-06-07 | 2010-02-23 | First Data Corporation | Dynamic aggregation of payment transactions |
WO2006133515A1 (en) * | 2005-06-16 | 2006-12-21 | Cerebrus Solutions Limited | A method of confirming the identity of a person |
US8726369B1 (en) * | 2005-08-11 | 2014-05-13 | Aaron T. Emigh | Trusted path, authentication and data security |
US20070055673A1 (en) * | 2005-09-07 | 2007-03-08 | Rieffanaugh Neal K Jr | Verified personal credit search system and method thereof |
WO2007061946A2 (en) | 2005-11-18 | 2007-05-31 | Lu Larry L | Promoting interoperability of presence-based systems through the use of ubiquitous online identities |
US9459622B2 (en) | 2007-01-12 | 2016-10-04 | Legalforce, Inc. | Driverless vehicle commerce network and community |
US20070156836A1 (en) * | 2006-01-05 | 2007-07-05 | Lenovo(Singapore) Pte. Ltd. | System and method for electronic chat identity validation |
US9002754B2 (en) | 2006-03-17 | 2015-04-07 | Fatdoor, Inc. | Campaign in a geo-spatial environment |
US9070101B2 (en) | 2007-01-12 | 2015-06-30 | Fatdoor, Inc. | Peer-to-peer neighborhood delivery multi-copter and method |
US8732091B1 (en) * | 2006-03-17 | 2014-05-20 | Raj Abhyanker | Security in a geo-spatial environment |
US9064288B2 (en) | 2006-03-17 | 2015-06-23 | Fatdoor, Inc. | Government structures and neighborhood leads in a geo-spatial environment |
US9037516B2 (en) | 2006-03-17 | 2015-05-19 | Fatdoor, Inc. | Direct mailing in a geo-spatial environment |
US9373149B2 (en) | 2006-03-17 | 2016-06-21 | Fatdoor, Inc. | Autonomous neighborhood vehicle commerce network and community |
US9098545B2 (en) * | 2007-07-10 | 2015-08-04 | Raj Abhyanker | Hot news neighborhood banter in a geo-spatial social network |
US8965409B2 (en) | 2006-03-17 | 2015-02-24 | Fatdoor, Inc. | User-generated community publication in an online neighborhood social network |
JP2007257086A (en) * | 2006-03-20 | 2007-10-04 | Fujitsu Ltd | Action recording support program, system, device and method |
CN101167079B (en) * | 2006-03-29 | 2010-11-17 | 日本三菱东京日联银行股份有限公司 | User affirming device and method |
ATE398884T1 (en) * | 2006-04-04 | 2008-07-15 | Mueller Marken Gmbh & Co Betr | AUTOMATIC VERIFICATION OF MESSENGER CONTACT DETAILS |
US20080040275A1 (en) * | 2006-04-25 | 2008-02-14 | Uc Group Limited | Systems and methods for identifying potentially fraudulent financial transactions and compulsive spending behavior |
US8099329B2 (en) * | 2006-04-25 | 2012-01-17 | Uc Group Limited | Systems and methods for determining taxes owed for financial transactions conducted over a network |
US20080021999A1 (en) * | 2006-07-18 | 2008-01-24 | Aspect Software, Inc. | Remote expert screen pop via data message |
US20080033941A1 (en) * | 2006-08-07 | 2008-02-07 | Dale Parrish | Verfied network identity with authenticated biographical information |
US8844003B1 (en) | 2006-08-09 | 2014-09-23 | Ravenwhite Inc. | Performing authentication |
US11075899B2 (en) * | 2006-08-09 | 2021-07-27 | Ravenwhite Security, Inc. | Cloud authentication |
US20100146609A1 (en) * | 2006-10-04 | 2010-06-10 | Rob Bartlett | Method and system of securing accounts |
US8863245B1 (en) | 2006-10-19 | 2014-10-14 | Fatdoor, Inc. | Nextdoor neighborhood social network method, apparatus, and system |
US8365258B2 (en) * | 2006-11-16 | 2013-01-29 | Phonefactor, Inc. | Multi factor authentication |
US9762576B2 (en) | 2006-11-16 | 2017-09-12 | Phonefactor, Inc. | Enhanced multi factor authentication |
US11257080B2 (en) | 2007-05-04 | 2022-02-22 | Michael Sasha John | Fraud deterrence for secure transactions |
US20080313019A1 (en) * | 2007-06-14 | 2008-12-18 | Jeffers Martin C | System and method for extracting contact information from website traffic statistics |
US20080320576A1 (en) * | 2007-06-22 | 2008-12-25 | Microsoft Corporation | Unified online verification service |
US8359355B2 (en) * | 2007-10-16 | 2013-01-22 | International Business Machines Corporation | System and method for verifying access to content |
JP4936549B2 (en) * | 2007-10-30 | 2012-05-23 | キヤノン株式会社 | Server device, management system, management method, storage medium, program |
US8312033B1 (en) | 2008-06-26 | 2012-11-13 | Experian Marketing Solutions, Inc. | Systems and methods for providing an integrated identifier |
US20100106611A1 (en) * | 2008-10-24 | 2010-04-29 | Uc Group Ltd. | Financial transactions systems and methods |
US8589502B2 (en) * | 2008-12-31 | 2013-11-19 | International Business Machines Corporation | System and method for allowing access to content |
US8386573B2 (en) * | 2008-12-31 | 2013-02-26 | International Business Machines Corporation | System and method for caching linked email data for offline use |
US8744956B1 (en) | 2010-07-01 | 2014-06-03 | Experian Information Solutions, Inc. | Systems and methods for permission arbitrated transaction services |
US8931058B2 (en) | 2010-07-01 | 2015-01-06 | Experian Information Solutions, Inc. | Systems and methods for permission arbitrated transaction services |
US8407341B2 (en) * | 2010-07-09 | 2013-03-26 | Bank Of America Corporation | Monitoring communications |
WO2012065128A1 (en) * | 2010-11-11 | 2012-05-18 | Ebay Inc. | Quick payment using mobile device binding |
US9147042B1 (en) | 2010-11-22 | 2015-09-29 | Experian Information Solutions, Inc. | Systems and methods for data verification |
US8839357B2 (en) * | 2010-12-22 | 2014-09-16 | Canon U.S.A., Inc. | Method, system, and computer-readable storage medium for authenticating a computing device |
KR101923611B1 (en) * | 2011-04-11 | 2018-11-29 | 삼성전자주식회사 | Service server, user terminal, service providing method and control method thereof |
BR112013030777A2 (en) | 2011-06-03 | 2016-12-06 | Uc Group Ltd | systems and methods for user registration, validation and monitoring on multiple websites |
US20120317172A1 (en) * | 2011-06-13 | 2012-12-13 | International Business Machines Corporation | Mobile web app infrastructure |
US9607336B1 (en) | 2011-06-16 | 2017-03-28 | Consumerinfo.Com, Inc. | Providing credit inquiry alerts |
US10546306B2 (en) | 2011-09-07 | 2020-01-28 | Elwha Llc | Computational systems and methods for regulating information flow during interactions |
US9159055B2 (en) | 2011-09-07 | 2015-10-13 | Elwha Llc | Computational systems and methods for identifying a communications partner |
US9690853B2 (en) | 2011-09-07 | 2017-06-27 | Elwha Llc | Computational systems and methods for regulating information flow during interactions |
US10074113B2 (en) | 2011-09-07 | 2018-09-11 | Elwha Llc | Computational systems and methods for disambiguating search terms corresponding to network members |
US10198729B2 (en) | 2011-09-07 | 2019-02-05 | Elwha Llc | Computational systems and methods for regulating information flow during interactions |
US9432190B2 (en) | 2011-09-07 | 2016-08-30 | Elwha Llc | Computational systems and methods for double-encrypting data for subsequent anonymous storage |
US9167099B2 (en) | 2011-09-07 | 2015-10-20 | Elwha Llc | Computational systems and methods for identifying a communications partner |
US9747561B2 (en) | 2011-09-07 | 2017-08-29 | Elwha Llc | Computational systems and methods for linking users of devices |
US9491146B2 (en) | 2011-09-07 | 2016-11-08 | Elwha Llc | Computational systems and methods for encrypting data for anonymous storage |
US9195848B2 (en) | 2011-09-07 | 2015-11-24 | Elwha, Llc | Computational systems and methods for anonymized storage of double-encrypted data |
US10185814B2 (en) | 2011-09-07 | 2019-01-22 | Elwha Llc | Computational systems and methods for verifying personal information during transactions |
US9928485B2 (en) | 2011-09-07 | 2018-03-27 | Elwha Llc | Computational systems and methods for regulating information flow during interactions |
US10523618B2 (en) * | 2011-09-07 | 2019-12-31 | Elwha Llc | Computational systems and methods for identifying a communications partner |
US9106691B1 (en) | 2011-09-16 | 2015-08-11 | Consumerinfo.Com, Inc. | Systems and methods of identity protection and management |
WO2013116726A1 (en) | 2012-02-03 | 2013-08-08 | Ebay Inc. | Adding card to mobile wallet using nfc |
WO2013142290A1 (en) * | 2012-03-22 | 2013-09-26 | Socialogue, Inc. | Internet identity management |
WO2013150492A1 (en) * | 2012-04-05 | 2013-10-10 | Thakker Mitesh L | Systems and methods to input or access data using remote submitting mechanism |
US9430778B2 (en) * | 2012-07-30 | 2016-08-30 | Kount Inc. | Authenticating users for accurate online audience measurement |
US8856894B1 (en) | 2012-11-28 | 2014-10-07 | Consumerinfo.Com, Inc. | Always on authentication |
US10164989B2 (en) * | 2013-03-15 | 2018-12-25 | Nominum, Inc. | Distinguishing human-driven DNS queries from machine-to-machine DNS queries |
US9633322B1 (en) | 2013-03-15 | 2017-04-25 | Consumerinfo.Com, Inc. | Adjustment of knowledge-based authentication |
US10664936B2 (en) | 2013-03-15 | 2020-05-26 | Csidentity Corporation | Authentication systems and methods for on-demand products |
FR3003976B1 (en) * | 2013-03-28 | 2016-08-26 | Cie Ind Et Financiere D'ingenierie Ingenico | METHOD FOR DELIVERING A LOCATION ASSERTION |
US9721147B1 (en) | 2013-05-23 | 2017-08-01 | Consumerinfo.Com, Inc. | Digital identity |
US10277628B1 (en) * | 2013-09-16 | 2019-04-30 | ZapFraud, Inc. | Detecting phishing attempts |
US9817987B2 (en) * | 2013-12-23 | 2017-11-14 | Dropbox, Inc. | Restricting access to content |
US9515833B2 (en) * | 2014-01-06 | 2016-12-06 | Lett.rs LLC | Electronic personal signature generation and distribution for personal communication |
US20150199742A1 (en) * | 2014-01-10 | 2015-07-16 | Raj Abhyanker | Trade recommendations in a neighborhood environment with conflict resolution |
US9439367B2 (en) | 2014-02-07 | 2016-09-13 | Arthi Abhyanker | Network enabled gardening with a remotely controllable positioning extension |
US9457901B2 (en) | 2014-04-22 | 2016-10-04 | Fatdoor, Inc. | Quadcopter with a printable payload extension system and method |
US9004396B1 (en) | 2014-04-24 | 2015-04-14 | Fatdoor, Inc. | Skyteboard quadcopter and method |
US10373240B1 (en) | 2014-04-25 | 2019-08-06 | Csidentity Corporation | Systems, methods and computer-program products for eligibility verification |
US9022324B1 (en) | 2014-05-05 | 2015-05-05 | Fatdoor, Inc. | Coordination of aerial vehicles through a central server |
US9971985B2 (en) | 2014-06-20 | 2018-05-15 | Raj Abhyanker | Train based community |
US9441981B2 (en) | 2014-06-20 | 2016-09-13 | Fatdoor, Inc. | Variable bus stops across a bus route in a regional transportation network |
JP5905531B2 (en) * | 2014-07-08 | 2016-04-20 | ヤフー株式会社 | Advertisement distribution apparatus, advertisement distribution method, terminal estimation apparatus, terminal estimation method, and program |
US9451020B2 (en) | 2014-07-18 | 2016-09-20 | Legalforce, Inc. | Distributed communication of independent autonomous vehicles to provide redundancy and performance |
US20160086182A1 (en) * | 2014-09-24 | 2016-03-24 | Mastercard International Incorporated | System, Method and Apparatus to Detect Fraud in Travel Transactions |
US10832176B2 (en) | 2014-12-08 | 2020-11-10 | Mastercard International Incorporated | Cardholder travel detection with internet service |
US20160189158A1 (en) * | 2014-12-29 | 2016-06-30 | Ebay Inc. | Authenticating requests to access accounts based on prior requests |
US9721253B2 (en) | 2015-05-06 | 2017-08-01 | Forter Ltd. | Gating decision system and methods for determining whether to allow material implications to result from online activities |
US10255561B2 (en) | 2015-05-14 | 2019-04-09 | Mastercard International Incorporated | System, method and apparatus for detecting absent airline itineraries |
EP3432543B1 (en) | 2016-03-14 | 2022-05-04 | Ricoh Company, Ltd. | Service providing system, service delivery system, service providing method, and program |
JP6283045B2 (en) * | 2016-03-16 | 2018-02-21 | ヤフー株式会社 | Advertisement distribution apparatus, advertisement distribution method, terminal estimation apparatus, terminal estimation method, and program |
CN109074327B (en) * | 2016-03-29 | 2022-02-15 | 株式会社理光 | Service providing system, service delivery system, service providing method, and program |
JP6638808B2 (en) * | 2016-03-29 | 2020-01-29 | 株式会社リコー | Service providing system, service giving / receiving system, service providing method, and program |
EP3438837A4 (en) | 2016-03-29 | 2019-03-20 | Ricoh Company Ltd. | Service provision system, service delivery system, service provision method, and program |
US10542010B2 (en) * | 2016-05-27 | 2020-01-21 | Microsoft Technology Licensing, Llc | Account verification in deferred provisioning systems |
US20180089676A1 (en) * | 2016-09-23 | 2018-03-29 | Paypal, Inc. | Dynamic Multi-Website Data Collection and Data Sharing |
US20180089742A1 (en) * | 2016-09-23 | 2018-03-29 | Paypal, Inc. | Dynamic Website Personalization and Data Sharing |
US11009886B2 (en) | 2017-05-12 | 2021-05-18 | Autonomy Squared Llc | Robot pickup method |
US10911234B2 (en) | 2018-06-22 | 2021-02-02 | Experian Information Solutions, Inc. | System and method for a token gateway environment |
JP2020024503A (en) | 2018-08-06 | 2020-02-13 | キオクシア株式会社 | Electronic device and data transmission/reception method |
US11003999B1 (en) * | 2018-11-09 | 2021-05-11 | Bottomline Technologies, Inc. | Customized automated account opening decisioning using machine learning |
US11379616B2 (en) * | 2019-03-25 | 2022-07-05 | Identiq Protocol Ltd. | System and method for providing anonymous validation of a query among a plurality of nodes in a network |
KR102127171B1 (en) * | 2019-08-30 | 2020-06-26 | 주식회사 카카오뱅크 | Method, server and application for distributed training deep-learning model for id card recognition, and recognition method using the same model |
US11941065B1 (en) | 2019-09-13 | 2024-03-26 | Experian Information Solutions, Inc. | Single identifier platform for storing entity data |
US20210090077A1 (en) * | 2019-09-19 | 2021-03-25 | Bank Of America Corporation | System architectures for point-of-sale data obfuscation, data removal and data encryption |
CN110807181A (en) * | 2019-11-14 | 2020-02-18 | 北京融易做科技有限公司 | Method, device and system for logging in and verifying database in enterprise |
US11528267B2 (en) * | 2019-12-06 | 2022-12-13 | Bank Of America Corporation | System for automated image authentication and external database verification |
US20210182808A1 (en) * | 2019-12-12 | 2021-06-17 | Visa International Service Association | Method, System, and Computer Program Product for Distributing Data from Multiple Data Sources |
TWI768280B (en) * | 2020-01-13 | 2022-06-21 | 玉山商業銀行股份有限公司 | System and method for online transaction processing |
KR102440878B1 (en) * | 2021-12-09 | 2022-09-05 | 한국인터넷진흥원 | Learning method for learning detection model for fraud detection of virtual asset, detecting method of fraud detection of virtual asset using the detection model, apparatus and computer program for performing the learning method and the detecting method |
EP4250205A1 (en) * | 2022-03-24 | 2023-09-27 | Dunamu Inc. | A method of verifying originator or beneficiary and an electronic device performing thereof |
Family Cites Families (93)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4053710A (en) * | 1976-03-01 | 1977-10-11 | Ncr Corporation | Automatic speaker verification systems employing moment invariants |
JPH0561834A (en) | 1991-09-03 | 1993-03-12 | Nec Corp | Security system for data base system |
US5819226A (en) * | 1992-09-08 | 1998-10-06 | Hnc Software Inc. | Fraud detection using predictive modeling |
US5544255A (en) * | 1994-08-31 | 1996-08-06 | Peripheral Vision Limited | Method and system for the capture, storage, transport and authentication of handwritten signatures |
US5826241A (en) | 1994-09-16 | 1998-10-20 | First Virtual Holdings Incorporated | Computerized system for making payments and authenticating transactions over the internet |
US5774525A (en) * | 1995-01-23 | 1998-06-30 | International Business Machines Corporation | Method and apparatus utilizing dynamic questioning to provide secure access control |
US5570093A (en) * | 1995-02-10 | 1996-10-29 | Applied Concepts, Inc. | Police traffic radar using absolute signal strength information to improve target signal processing accuracy |
US5657389A (en) * | 1995-05-08 | 1997-08-12 | Image Data, Llc | Positive identification system and method |
US6070141A (en) * | 1995-05-08 | 2000-05-30 | Image Data, Llc | System and method of assessing the quality of an identification transaction using an identificaion quality score |
US5790677A (en) | 1995-06-29 | 1998-08-04 | Microsoft Corporation | System and method for secure electronic commerce transactions |
JP3506293B2 (en) | 1995-10-30 | 2004-03-15 | 株式会社リコー | Speaker identification system |
US5757917A (en) | 1995-11-01 | 1998-05-26 | First Virtual Holdings Incorporated | Computerized payment system for purchasing goods and services on the internet |
US5940476A (en) * | 1996-06-28 | 1999-08-17 | Distributed Software Development, Inc. | System and method for identifying an unidentified caller |
US5684951A (en) * | 1996-03-20 | 1997-11-04 | Synopsys, Inc. | Method and system for user authorization over a multi-user computer system |
US7159116B2 (en) * | 1999-12-07 | 2007-01-02 | Blue Spike, Inc. | Systems, methods and devices for trusted transactions |
JP3488347B2 (en) * | 1996-08-29 | 2004-01-19 | 株式会社日立製作所 | Automatic address distribution system and address distribution server |
US6819783B2 (en) * | 1996-09-04 | 2004-11-16 | Centerframe, Llc | Obtaining person-specific images in a public venue |
US6195657B1 (en) * | 1996-09-26 | 2001-02-27 | Imana, Inc. | Software, method and apparatus for efficient categorization and recommendation of subjects according to multidimensional semantics |
US6182222B1 (en) * | 1997-03-25 | 2001-01-30 | Electronic Data Systems Corporation | Secure data storage system and method |
US6119103A (en) | 1997-05-27 | 2000-09-12 | Visa International Service Association | Financial risk prediction systems and methods therefor |
US5913212A (en) * | 1997-06-13 | 1999-06-15 | Tele-Publishing, Inc. | Personal journal |
US6029154A (en) * | 1997-07-28 | 2000-02-22 | Internet Commerce Services Corporation | Method and system for detecting fraud in a credit card transaction over the internet |
US20020007411A1 (en) | 1998-08-10 | 2002-01-17 | Shvat Shaked | Automatic network user identification |
US5966351A (en) * | 1997-10-29 | 1999-10-12 | Siemens Information And Communications Networks, Inc. | System and method for changing the priority of voice mail messages within the recipient's mailbox |
US6095413A (en) * | 1997-11-17 | 2000-08-01 | Automated Transaction Corporation | System and method for enhanced fraud detection in automated electronic credit card processing |
US6233565B1 (en) * | 1998-02-13 | 2001-05-15 | Saranac Software, Inc. | Methods and apparatus for internet based financial transactions with evidence of payment |
US6038333A (en) * | 1998-03-16 | 2000-03-14 | Hewlett-Packard Company | Person identifier and management system |
US5913210A (en) * | 1998-03-27 | 1999-06-15 | Call; Charles G. | Methods and apparatus for disseminating product information via the internet |
US6484260B1 (en) * | 1998-04-24 | 2002-11-19 | Identix, Inc. | Personal identification system |
US6263447B1 (en) * | 1998-05-21 | 2001-07-17 | Equifax Inc. | System and method for authentication of network users |
AU4005999A (en) | 1998-05-21 | 1999-12-06 | Equifax, Inc. | System and method for authentication of network users and issuing a digital certificate |
AU4162199A (en) | 1998-06-11 | 1999-12-30 | Aqi Ltd. | Method, apparatus and system for securing credit card transactions |
IL125826A (en) * | 1998-08-17 | 2001-05-20 | Ur Jonathan Shem | Method for preventing unauthorized use of credit cards in remote payments and an optional supplemental-code card for use therein |
JP2000067005A (en) | 1998-08-26 | 2000-03-03 | Nippon Telegr & Teleph Corp <Ntt> | Method for confirming person himself and device using the same method and record medium recording program for controlling the same device |
US6254000B1 (en) * | 1998-11-13 | 2001-07-03 | First Data Corporation | System and method for providing a card transaction authorization fraud warning |
US6173269B1 (en) * | 1998-12-16 | 2001-01-09 | Zowi.Com, Inc | Method and apparatus for executing electronic commercial transactions with minors |
AU3668800A (en) | 1999-04-08 | 2000-11-14 | Cleartogo.Com | Credit card security technique |
WO2001001280A2 (en) | 1999-06-30 | 2001-01-04 | Catalog City, Inc. | Method and system for sharing cookie information during internet transactions |
JP2001052181A (en) | 1999-08-13 | 2001-02-23 | Nippon Telegr & Teleph Corp <Ntt> | Personal authenticating method and recording medium recording personal authentication program |
AU6179300A (en) | 1999-08-25 | 2001-03-19 | Kirichenko, Oleg | Apparatus and method for receiving identification information via a first and a second communication network |
AU7357400A (en) | 1999-09-09 | 2001-04-10 | Hugh Gibbs Taylor Jr. | System and method for evaluating credit risks |
US6853988B1 (en) * | 1999-09-20 | 2005-02-08 | Security First Corporation | Cryptographic server with provisions for interoperability between cryptographic systems |
WO2001033520A1 (en) | 1999-11-04 | 2001-05-10 | David Felger | A method of billing a purchase made over a computer network |
US6466917B1 (en) | 1999-12-03 | 2002-10-15 | Ebay Inc. | Method and apparatus for verifying the identity of a participant within an on-line auction environment |
WO2001044977A2 (en) | 1999-12-14 | 2001-06-21 | Imandi.Com Inc. | Combined offline and online verification of user legitimacy for electronic commerce |
US6934858B2 (en) | 1999-12-15 | 2005-08-23 | Authentify, Inc. | System and method of using the public switched telephone network in providing authentication or authorization for online transactions |
WO2001044975A2 (en) | 1999-12-17 | 2001-06-21 | Zack Network, Inc. | Identifying web users in a proxy server |
AU2001230474A1 (en) | 2000-01-31 | 2001-08-14 | Trivnet Ltd. | Applications of automatic internet identification methods |
DE60133453T2 (en) * | 2000-02-18 | 2009-05-07 | Cypak Ab | METHOD AND DEVICE FOR IDENTIFICATION AND AUTHENTICATION |
EP1128628A1 (en) * | 2000-02-23 | 2001-08-29 | Tradesafely.com Limited | Method and apparatus for Internet web site authentication |
AU4365801A (en) | 2000-03-15 | 2001-09-24 | Mastercard International Inc | Method and system for secure payments over a computer network |
EP1134707A1 (en) | 2000-03-17 | 2001-09-19 | Tradesafely.com Limited | Payment authorisation method and apparatus |
AU2387901A (en) | 2000-03-17 | 2001-09-24 | Tradesafely.Com Limited | Payment authorisation method and apparatus |
US7778934B2 (en) | 2000-04-17 | 2010-08-17 | Verisign, Inc. | Authenticated payment |
KR20090116813A (en) | 2000-04-24 | 2009-11-11 | 비자 인터내셔날 써비스 어쏘시에이션 | Online payer authentication service |
US7577834B1 (en) * | 2000-05-09 | 2009-08-18 | Sun Microsystems, Inc. | Message authentication using message gates in a distributed computing environment |
US6300872B1 (en) * | 2000-06-20 | 2001-10-09 | Philips Electronics North America Corp. | Object proximity/security adaptive event detection |
GB0015147D0 (en) * | 2000-06-21 | 2000-08-09 | Jacobs Michael | Tracking system |
WO2001099071A2 (en) | 2000-06-22 | 2001-12-27 | Mastercard International Incorporated | An improved method and system for conducting secure payments over a computer network without a pseudo or proxy account number |
FI115355B (en) | 2000-06-22 | 2005-04-15 | Icl Invia Oyj | Arrangement for the authentication and authentication of a secure system user |
EP1299866A2 (en) | 2000-07-10 | 2003-04-09 | Mastercard International, Inc. | Method and system for conducting secure electronic commerce transactions with authorization request data loop-back |
US7430537B2 (en) | 2000-07-10 | 2008-09-30 | Paypal, Inc. | System and method for verifying a financial instrument |
US8380628B1 (en) | 2000-07-17 | 2013-02-19 | Harris Intellectual Property, Lp | System and method for verifying commercial transactions |
US7076727B1 (en) * | 2000-08-16 | 2006-07-11 | Sparta Systems, Inc. | Configuring activities to perform operations on user-defined fields |
US7216132B1 (en) * | 2000-08-16 | 2007-05-08 | Sparta Systems, Inc. | System and method for automated process control |
US7266764B1 (en) * | 2000-08-16 | 2007-09-04 | Sparta Systems, Inc. | Graphical user interface for automated process control |
JP4654498B2 (en) * | 2000-08-31 | 2011-03-23 | ソニー株式会社 | Personal authentication system, personal authentication method, information processing apparatus, and program providing medium |
NO20004542L (en) | 2000-09-12 | 2002-03-13 | Autencia As | Identity verification system and method |
AU2001295077A1 (en) | 2000-09-27 | 2002-04-08 | Mastercard International Incorporated | A universal and interoperable system and method utilizing a universal cardholder authentication field (UCAF) for authentication data collection and validation |
WO2002027610A1 (en) | 2000-09-29 | 2002-04-04 | Hnc Software, Inc. | Score based decisioning |
GB2368227B (en) * | 2000-10-17 | 2003-12-10 | Hewlett Packard Co | Contact center |
US7082409B1 (en) * | 2000-11-22 | 2006-07-25 | Richard Sutton Cherry | Fully integrated on-line interactive purchasing club incorporating extremely rapid fulfillment |
US20020073138A1 (en) * | 2000-12-08 | 2002-06-13 | Gilbert Eric S. | De-identification and linkage of data records |
US20070005515A1 (en) | 2001-03-12 | 2007-01-04 | Rosenberg Jonathan B | System and method for providing secure transactions |
US20020147691A1 (en) * | 2001-04-05 | 2002-10-10 | Davis Dustin M. | Method and system for consummating a transaction in a biometric verification system based on prior transactional histories |
WO2002083255A1 (en) * | 2001-04-11 | 2002-10-24 | Walker Digital, Llc | Methods and systems for facilitating game play at a gaming device by means of third party offers |
WO2002084456A2 (en) | 2001-04-12 | 2002-10-24 | Netdesigns Limited | User identity verification system |
US7542931B2 (en) | 2001-06-01 | 2009-06-02 | American Express Travel Related Services Company, Inc. | System and method for global automated address verification |
US6957259B1 (en) * | 2001-06-25 | 2005-10-18 | Bellsouth Intellectual Property Corporation | System and method for regulating emails by maintaining, updating and comparing the profile information for the email source to the target email statistics |
AU2002326635A1 (en) | 2001-08-15 | 2003-03-03 | Shea Writer | Methods for verifying cardholder authenticity and for creating billing address database |
US20040199781A1 (en) * | 2001-08-30 | 2004-10-07 | Erickson Lars Carl | Data source privacy screening systems and methods |
US7111789B2 (en) * | 2001-08-31 | 2006-09-26 | Arcot Systems, Inc. | Enhancements to multi-party authentication and other protocols |
US20030061163A1 (en) | 2001-09-27 | 2003-03-27 | Durfield Richard C. | Method and apparatus for verification/authorization by credit or debit card owner of use of card concurrently with merchant transaction |
US7325143B2 (en) * | 2001-10-15 | 2008-01-29 | Linux Foundation | Digital identity creation and coalescence for service authorization |
EP1436746A4 (en) * | 2001-10-17 | 2007-10-10 | Npx Technologies Ltd | Verification of a person identifier received online |
WO2003042893A1 (en) | 2001-11-15 | 2003-05-22 | First Data Corporation | Online payments |
GB2383497B (en) | 2001-12-21 | 2005-09-07 | Nec Technologies | Transaction verification using a mobile telephone network |
US7046779B2 (en) * | 2002-02-15 | 2006-05-16 | Multimedia Telesys, Inc. | Video conference system and methods for use at multi-station sites |
US7015817B2 (en) * | 2002-05-14 | 2006-03-21 | Shuan Michael Copley | Personal tracking device |
US6853739B2 (en) * | 2002-05-15 | 2005-02-08 | Bio Com, Llc | Identity verification system |
US6937702B1 (en) * | 2002-05-28 | 2005-08-30 | West Corporation | Method, apparatus, and computer readable media for minimizing the risk of fraudulent access to call center resources |
JP4363868B2 (en) * | 2002-08-23 | 2009-11-11 | 株式会社東芝 | Search keyword analysis program, system and method |
US20040210639A1 (en) * | 2003-03-26 | 2004-10-21 | Roy Ben-Yoseph | Identifying and using identities deemed to be known to a user |
-
2002
- 2002-10-16 EP EP02778554A patent/EP1436746A4/en not_active Ceased
- 2002-10-16 CN CN028205383A patent/CN1666205A/en active Pending
- 2002-10-16 WO PCT/US2002/032825 patent/WO2003034633A2/en active Application Filing
- 2002-10-16 JP JP2003537232A patent/JP2005507106A/en active Pending
- 2002-10-16 CA CA2463891A patent/CA2463891C/en not_active Expired - Fee Related
- 2002-10-16 US US10/492,920 patent/US8650103B2/en active Active
- 2002-10-16 NZ NZ532258A patent/NZ532258A/en not_active IP Right Cessation
- 2002-10-16 IL IL16143702A patent/IL161437A0/en unknown
- 2002-10-16 AU AU2002340207A patent/AU2002340207B2/en not_active Ceased
-
2004
- 2004-04-15 IL IL161437A patent/IL161437A/en not_active IP Right Cessation
-
2014
- 2014-02-10 US US14/176,943 patent/US20140222690A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
CN1666205A (en) | 2005-09-07 |
JP2005507106A (en) | 2005-03-10 |
EP1436746A4 (en) | 2007-10-10 |
IL161437A (en) | 2010-11-30 |
IL161437A0 (en) | 2004-09-27 |
US20140222690A1 (en) | 2014-08-07 |
US20040243832A1 (en) | 2004-12-02 |
NZ532258A (en) | 2006-04-28 |
WO2003034633A3 (en) | 2003-11-13 |
CA2463891C (en) | 2012-07-17 |
EP1436746A2 (en) | 2004-07-14 |
AU2002340207B2 (en) | 2008-07-31 |
WO2003034633A2 (en) | 2003-04-24 |
US8650103B2 (en) | 2014-02-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2463891A1 (en) | Verification of a person identifier received online | |
JP2005507106A5 (en) | ||
US10965668B2 (en) | Systems and methods to authenticate users and/or control access made by users based on enhanced digital identity verification | |
US20220038446A1 (en) | Identity Proofing and Portability on Blockchain | |
US9888007B2 (en) | Systems and methods to authenticate users and/or control access made by users on a computer network using identity services | |
US10187369B2 (en) | Systems and methods to authenticate users and/or control access made by users on a computer network based on scanning elements for inspection according to changes made in a relation graph | |
US10250583B2 (en) | Systems and methods to authenticate users and/or control access made by users on a computer network using a graph score | |
US20190122149A1 (en) | Enhanced System and Method for Identity Evaluation Using a Global Score Value | |
CN102317903B (en) | Use social information that user conversation is authenticated | |
US8588748B2 (en) | System and method for mobile identity protection of a user of multiple computer applications, networks or devices | |
US9015263B2 (en) | Domain name searching with reputation rating | |
US7487170B2 (en) | Location information for avoiding unwanted communications systems and methods | |
US7697942B2 (en) | Location based rules architecture systems and methods | |
US20090320101A1 (en) | System and method for authenticating users in a social network | |
US20150213131A1 (en) | Domain name searching with reputation rating | |
US20220131844A1 (en) | Identity access management using access attempts and profile updates | |
AU2002340207A1 (en) | Verification of a person identifier received online | |
CN108055253A (en) | A kind of software login validation method, apparatus and system | |
CN107278306A (en) | User authentication based on personal visit history | |
Anoh et al. | Multi-factor authentication system for securing mobile money transactions using mobile money services in Ivory Coast | |
CN112632520B (en) | Method and system for registering real names of group telephone services | |
JP2002215942A (en) | Communication system with abstract filter | |
KR100476005B1 (en) | Method and system for verifing authenticity of a person based on the ip address | |
CN116128628A (en) | Phishing risk early warning method and system | |
ZA200402931B (en) | Verification of a person identifier received online. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKLA | Lapsed |
Effective date: 20201016 |