CA2463891A1 - Verification of a person identifier received online - Google Patents

Verification of a person identifier received online Download PDF

Info

Publication number
CA2463891A1
CA2463891A1 CA002463891A CA2463891A CA2463891A1 CA 2463891 A1 CA2463891 A1 CA 2463891A1 CA 002463891 A CA002463891 A CA 002463891A CA 2463891 A CA2463891 A CA 2463891A CA 2463891 A1 CA2463891 A1 CA 2463891A1
Authority
CA
Canada
Prior art keywords
person identifier
sender
person
identifier
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002463891A
Other languages
French (fr)
Other versions
CA2463891C (en
Inventor
Saar Wilf
Shvat Shaked
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
PayPal Israel Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2463891A1 publication Critical patent/CA2463891A1/en
Application granted granted Critical
Publication of CA2463891C publication Critical patent/CA2463891C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/33Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer

Abstract

A_system and method for verification of a person identifier received online is described. The method includes receiving a request for verifying a person identifier (P11); and estimating whether (a) P11(100) identifies the same person as another person identifier (P12), (b) sender of P11 is the same person as sender of P12(106), and (c) P12 identifies the sender of P12.

Claims (32)

1. A method of verifying a first person identifier comprising:
a. Receiving a Verification Request including the first person identifier; and b. Estimating whether Verification Conditions including:
i. the first person identifier and a second person identifier satisfy a Same Person Condition, ii. a sender of the first person identifier and a sender of said second person identifier satisfy a Same Sender Condition, and iii. said second person identifier identifies said sender of said second person identifier;
are true.
2. The method of claim 1, further including the step of sending a Verification Report indicating whether the first person identifier identifies said sender of the first person identifier, said Verification Report being based on results of said estimating.
3. The method of claim 1, wherein said Verification Request further includes at least one information element chosen from the group consisting of:
a. Said second person identifier;
b. A first sender indicator relating to the first person identifier;
c. A second sender indicator relating to said second person identifier; and d. Verification Information for said second person identifier.
4. The method of claim 1, wherein said estimating further includes:
a. Sending at least one query to at least one Person Identifier-Sender Indicator Database; and b. Receiving at least one response to said at least one query.
5. The method of claim 4 wherein at least one of said at least one query is a conditional query describing at least one of said Verification Conditions.
6. The method of claim 5 wherein said estimating further includes estimating whether said at least one response to said at least one query satisfies at least one of said Verification Conditions other than said at least one Verification Condition that was described in said at least one query.
7. The method of claim 1, wherein said Same Person Condition is satisfied if the first person identifier and said second person identifier have a Same Person Relation that includes at least one relation between two person identifiers selected from the group consisting of:

a. Said two person identifiers include identical portions;

b. Said two person identifiers include portions that are identical except for spelling differences;

c. A first of said two person identifiers includes an abbreviation of a second of said two person identifiers;

d. Said two person identifiers include numerically close phone numbers;

e. Said two person identifiers include geographically close geographical parameters;

f. A directory record associates a person identifier that has a Same Person Relation with a first of said two person identifiers with another person identifier that has a Same Person Relation with a second of said two person identifiers; and g. Each of said two person identifiers has a respective Same Person Relation with a third person identifier.
8. The method of claim 1, wherein said Same Sender Condition is satisfied if a message containing the first person identifier and a message containing said second person identifier have a Same Sender Relation that includes at least one relation, between a first message and a second message, selected from the group consisting of:

a. Membership of said first message and said second message in a common integral message;

b. A relation between a time said first message was sent and a time said second message was sent;

c. A relation between a reliable network address of a sender of said first message and a reliable network address of a sender of said second message;

d. A first secret contained in said first message and a second secret contained in said second message being derivatives of a common secret;

e. A first secret that was sent to a sender of said first message and a second secret contained in said second message being derivatives of a common secret; and f. Each of said messages having a respective Same Sender Relation with a third message.
9. The method of claim 8, wherein said relation between said reliable network address of said sender of said first message and said reliable network address of said sender of said second message includes at least one relation selected from the group consisting of:

a. Identity of said reliable network address of said sender of said first message and said reliable network address of said sender of said second message;

b. Membership in a common sub-network of said reliable network address of said sender of said first message and said reliable network address of said sender of said second message;

c. Use of said reliable network address of said sender of said first message and said reliable network address of said sender of said second message by a common organization;

d. Use of said reliable networlc address of said sender of said first message and said reliable network address of said sender of said second message by two related organizations;

e. Use of said reliable network address of said sender of said first message and said reliable networlc address of said sender of said second message by a common Internet Service Provider;

f. Use of said reliable network address of said sender of said first message and said reliable network address of said sender of said second message by a common Internet Service Provider Point of Presence; and g. Association of said reliable network address of said sender of said first message and said reliable network address of said sender of said second message with close geographical locations.
10. The method of claim 8, wherein at least one of said reliable network addresses is a reliable network address selected from the group consisting of: An IP address, an IP
address together with a UDP port number, a TCP session handle, and a physical interface identifier.
11. The method of claim 8, wherein at least one of said first and second secrets is a secret selected from the group consisting of: A secret kept by a device, a secret HTTP cookie, a secret HTTP secure cookie, an SMTP header, an HTTP header, a hardware identifier, a secret kept in a software component installed on said device, a secret assigned to a person for online use, a username and password, a secret URL, a network address, an IP address, a UDP port number, and a TCP session handle.
12. The method of claim 1, wherein said second person identifier is considered to identify said sender of said second person identifier if at least one second person identifier condition is true, said second person identifier condition being selected from the group consisting of:

a. Said second person identifier was verified using a standard method for verification of a person identifier;

b. Said second person identifier was verified by performing a successful offline action based on said second person identifier;

c. Said second person identifier was verified by successfully charging an account;

d. Said second person identifier was verified by receiving online a code sent to a mailing address;

e. Said second person identifier was verified by receiving online a code sent in a phone call;

f. Said second person identifier was verified by receiving, during a phone call, a code sent online;

g. Said second person identifier was received in conditions atypical of fraud;

h. Said second person identifier was sent a considerable period of time before the first person identifier was sent;

i. Said second person identifier was sent a considerable period of time after the first person identifier was sent;

j. Said second person identifier was sent to a service that fraudsters lack incentive to defraud;

k. Said second person identifier is associated with significant online activity typical of legitimate users;

l. Said second person identifier was provided by a trustable authorized agent of said sender of said second person identifier; and m. Said second person identifier was verified using the present invention.
13. The method of claim 1 wherein said estimating is effected using at least one estimating method selected from the group consisting of:
a. Rule-based logic;
b. An automatic learning technology;
c. A neural network; and d. Probabilistic analysis.
14. The method of claim 2 wherein said Verification Report includes at least one information element selected from the group consisting of:
a. A positive response;
b. A negative response;
c. Said second person identifier;
d. A sender indicator relating to said second person identifier;
e. Verification Information of said second person identifier;

f. A score describing a probability that the first person identifier and said second person identifier satisfy a Same Person Condition;

g. A score describing a probability that said sender of the first person identifier and said sender of said second person identifier satisfy a Same Sender Condition;

h. A score describing a probability that said second person identifier identifies said sender of said second person identifier; and i. A score describing a probability that the first person identifier identifies said sender of the first person identifier.
15. The method of claim 14 wherein said score describing said probability that the first person identifier identifies said sender of the first person identifier is based on at least one parameter selected from the group consisting of:

a. A probability that the first person identifier and said second person identifier satisfy a Same Person Condition;
b. A probability that said sender of the first person identifier and said sender of said second person identifier satisfy a Same Person Condition;
c. A probability that said second person identifier identifies said sender of said second person identifier;
d. Difficulty in gaining access to a secret upon which said Same Sender Condition is based;
e. Reliability of an address of said sender of the first person identifier;
f. Reliability of an address of said sender of said second person identifier g. Accuracy and reliability of external data sources used in said step of estimating;
h. Popularity of the first person identifier;
i. Popularity of said second person identifier;
j. Tendency of people to change a person identifier;
k. Time elapsed between sending of the first person identifier and sending of said second person identifier; and 1. Time elapsed since charging an account identified by said second person identifier.
16. The method of claim 1, wherein said estimating further includes:
a. Sending at least one query to at least one Person Identifier Directory; and b. Receiving at least one response to said at least one query.
17. The method of claim 1, further including the step of generating at least one hash of at least a part of at least one information element selected from the group consisting of:

a. The first person identifier;
b. Said second person identifier;
c. A first sender indicator relating to the first person identifier; and d. A second sender indicator relating to said second person identifier.
18. The method of claim 17 further including the step of determining a size of said at least one hash, based on at least one consideration selected from the group consisting of:

a. Information confidentiality; and b. An acceptable level of false verifications.
19. The method of claim 1 wherein an entity receiving the first person identifier from said sender of the first person identifier is different than an entity receiving said second person identifier from said sender of said second person identifier.
20. The method of claim 1, wherein said step of estimating is repeated with at least one person identifier other than said second person identifier.
21. The method of claim 1, further including the step of choosing which person identifier from a plurality of person identifiers to use as said second person identifier in said step of estimating.
22. The method of claim 1, further including the step of obtaining at least one sender indicator from said sender of the first person identifier.
23. The method of claim 1, further including the step of combining results of said estimating with results of at least one other method of verifying a person identifier.
24. The method of claim 1, wherein at least one person identifier selected from the group consisting of the first person identifier and said second person identifier includes at least one information element selected from the group consisting o~ a full name, a first name, a middle name, a last name, name initials, a title, an address, a country, a state, a city, a street address, an apartment number, a zip code, a phone number, an email address, a financial account number, a credit card number, a bank account number, a government-issued identifier, a social security number, a driver's license number, a national ID
number, a passport number, personal characteristics, a height, a weight, a gender, a complexion, a race, and a hair color.
25. The method of claim 1, wherein the first person identifier is sent via a network selected from the group comprising: an Internet, a private data network, a CATV data network and a mobile data network.
26. A system for verifying a first person identifier comprising:

a. A Receiver for receiving a Verification Request including the first person identifier; and b. A Verification Estimator for estimating whether the first person identifier and a second person identifier satisfy a Same Person Condition, for estimating whether a sender of the first person identifier and a sender of said second person identifier satisfy a Same Sender Condition, and for estimating whether said second person identifier identifies said sender of said second person identifier.
27. The system of claim 26, further comprising a Reporter for sending a Verification Report indicating whether the first person identifier identifies said sender of the first person identifier, said Verification Report being based on output of said Verification Estimator.
28. The system of claim 26, further including a Person Identifier Directory Query Module for sending a query to a Person Identifier Directory and receiving a response to said query, said response then used by said Verification Estimator.
29. The system of claim 28, further including at least one said Person Identifier Directory.
30. The system of claim 26, further including a Person Identifier-Sender Indicator Database Query Module for sending a query to at least one Person Identifier-Sender Indicator Database and receiving a response to said query, said response then used by said Verification Estimator.
31. The system of claim 30, further including at least one said Person Identifier-Sender Indicator Database.
32. The system of claim 26, further including a Hash Generator for generating at least one hash of at least a part of at least one information element selected from the group comprising:

a. the first person identifier;

b. Said second person identifier;

c. A first sender indicator relating to the first person identifier; and d. A second sender indicator relating to said second person identifier.
CA2463891A 2001-10-17 2002-10-16 Verification of a person identifier received online Expired - Fee Related CA2463891C (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US32951801P 2001-10-17 2001-10-17
US60/329,518 2001-10-17
US37454802P 2002-04-23 2002-04-23
US60/374,548 2002-04-23
PCT/US2002/032825 WO2003034633A2 (en) 2001-10-17 2002-10-16 Verification of a person identifier received online

Publications (2)

Publication Number Publication Date
CA2463891A1 true CA2463891A1 (en) 2003-04-24
CA2463891C CA2463891C (en) 2012-07-17

Family

ID=26986834

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2463891A Expired - Fee Related CA2463891C (en) 2001-10-17 2002-10-16 Verification of a person identifier received online

Country Status (9)

Country Link
US (2) US8650103B2 (en)
EP (1) EP1436746A4 (en)
JP (1) JP2005507106A (en)
CN (1) CN1666205A (en)
AU (1) AU2002340207B2 (en)
CA (1) CA2463891C (en)
IL (2) IL161437A0 (en)
NZ (1) NZ532258A (en)
WO (1) WO2003034633A2 (en)

Families Citing this family (126)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1436746A4 (en) * 2001-10-17 2007-10-10 Npx Technologies Ltd Verification of a person identifier received online
KR100464755B1 (en) * 2002-05-25 2005-01-06 주식회사 파수닷컴 User authentication method using user's e-mail address and hardware information
US20040243704A1 (en) * 2003-04-14 2004-12-02 Alfredo Botelho System and method for determining the unique web users and calculating the reach, frequency and effective reach of user web access
US7409710B1 (en) * 2003-10-14 2008-08-05 Sun Microsystems, Inc. Method and system for dynamically generating a web-based user interface
US7647375B1 (en) 2003-12-22 2010-01-12 Aol Llc Enabling mapping identification of online identities between different messaging services
US7734708B1 (en) * 2003-12-22 2010-06-08 Aol Inc. Enabling identification of online identities between different messaging services
CA2552481C (en) * 2004-01-09 2016-08-02 Npx Technologies Ltd. Detecting relayed communications
US7565356B1 (en) * 2004-04-30 2009-07-21 Sun Microsystems, Inc. Liberty discovery service enhancements
WO2005114886A2 (en) * 2004-05-21 2005-12-01 Rsa Security Inc. System and method of fraud reduction
US7603700B2 (en) * 2004-08-31 2009-10-13 Aol Llc Authenticating a client using linked authentication credentials
US8484456B2 (en) * 2004-12-08 2013-07-09 Alien Camel Pty Ltd. Trusted electronic messaging system
US20060166666A1 (en) * 2005-01-21 2006-07-27 Roach Peter O Jr Method and apparatus for hiding the identity of a mobile subscriber in response to a permission request
US7724728B2 (en) * 2005-04-19 2010-05-25 Cisco Technology, Inc. Policy-based processing of packets
EP1878211A1 (en) * 2005-04-20 2008-01-16 Docaccount AB Method and device for identification of a communication party
DE602005025163D1 (en) * 2005-04-20 2011-01-13 Docaccount Ab METHOD AND SYSTEM FOR THE ELECTRONIC RE-AUTHENTICATION OF A COMMUNICATION PARTICIPANT
US7665658B2 (en) * 2005-06-07 2010-02-23 First Data Corporation Dynamic aggregation of payment transactions
WO2006133515A1 (en) * 2005-06-16 2006-12-21 Cerebrus Solutions Limited A method of confirming the identity of a person
US8726369B1 (en) * 2005-08-11 2014-05-13 Aaron T. Emigh Trusted path, authentication and data security
US20070055673A1 (en) * 2005-09-07 2007-03-08 Rieffanaugh Neal K Jr Verified personal credit search system and method thereof
WO2007061946A2 (en) 2005-11-18 2007-05-31 Lu Larry L Promoting interoperability of presence-based systems through the use of ubiquitous online identities
US9459622B2 (en) 2007-01-12 2016-10-04 Legalforce, Inc. Driverless vehicle commerce network and community
US20070156836A1 (en) * 2006-01-05 2007-07-05 Lenovo(Singapore) Pte. Ltd. System and method for electronic chat identity validation
US9002754B2 (en) 2006-03-17 2015-04-07 Fatdoor, Inc. Campaign in a geo-spatial environment
US9070101B2 (en) 2007-01-12 2015-06-30 Fatdoor, Inc. Peer-to-peer neighborhood delivery multi-copter and method
US8732091B1 (en) * 2006-03-17 2014-05-20 Raj Abhyanker Security in a geo-spatial environment
US9064288B2 (en) 2006-03-17 2015-06-23 Fatdoor, Inc. Government structures and neighborhood leads in a geo-spatial environment
US9037516B2 (en) 2006-03-17 2015-05-19 Fatdoor, Inc. Direct mailing in a geo-spatial environment
US9373149B2 (en) 2006-03-17 2016-06-21 Fatdoor, Inc. Autonomous neighborhood vehicle commerce network and community
US9098545B2 (en) * 2007-07-10 2015-08-04 Raj Abhyanker Hot news neighborhood banter in a geo-spatial social network
US8965409B2 (en) 2006-03-17 2015-02-24 Fatdoor, Inc. User-generated community publication in an online neighborhood social network
JP2007257086A (en) * 2006-03-20 2007-10-04 Fujitsu Ltd Action recording support program, system, device and method
CN101167079B (en) * 2006-03-29 2010-11-17 日本三菱东京日联银行股份有限公司 User affirming device and method
ATE398884T1 (en) * 2006-04-04 2008-07-15 Mueller Marken Gmbh & Co Betr AUTOMATIC VERIFICATION OF MESSENGER CONTACT DETAILS
US20080040275A1 (en) * 2006-04-25 2008-02-14 Uc Group Limited Systems and methods for identifying potentially fraudulent financial transactions and compulsive spending behavior
US8099329B2 (en) * 2006-04-25 2012-01-17 Uc Group Limited Systems and methods for determining taxes owed for financial transactions conducted over a network
US20080021999A1 (en) * 2006-07-18 2008-01-24 Aspect Software, Inc. Remote expert screen pop via data message
US20080033941A1 (en) * 2006-08-07 2008-02-07 Dale Parrish Verfied network identity with authenticated biographical information
US8844003B1 (en) 2006-08-09 2014-09-23 Ravenwhite Inc. Performing authentication
US11075899B2 (en) * 2006-08-09 2021-07-27 Ravenwhite Security, Inc. Cloud authentication
US20100146609A1 (en) * 2006-10-04 2010-06-10 Rob Bartlett Method and system of securing accounts
US8863245B1 (en) 2006-10-19 2014-10-14 Fatdoor, Inc. Nextdoor neighborhood social network method, apparatus, and system
US8365258B2 (en) * 2006-11-16 2013-01-29 Phonefactor, Inc. Multi factor authentication
US9762576B2 (en) 2006-11-16 2017-09-12 Phonefactor, Inc. Enhanced multi factor authentication
US11257080B2 (en) 2007-05-04 2022-02-22 Michael Sasha John Fraud deterrence for secure transactions
US20080313019A1 (en) * 2007-06-14 2008-12-18 Jeffers Martin C System and method for extracting contact information from website traffic statistics
US20080320576A1 (en) * 2007-06-22 2008-12-25 Microsoft Corporation Unified online verification service
US8359355B2 (en) * 2007-10-16 2013-01-22 International Business Machines Corporation System and method for verifying access to content
JP4936549B2 (en) * 2007-10-30 2012-05-23 キヤノン株式会社 Server device, management system, management method, storage medium, program
US8312033B1 (en) 2008-06-26 2012-11-13 Experian Marketing Solutions, Inc. Systems and methods for providing an integrated identifier
US20100106611A1 (en) * 2008-10-24 2010-04-29 Uc Group Ltd. Financial transactions systems and methods
US8589502B2 (en) * 2008-12-31 2013-11-19 International Business Machines Corporation System and method for allowing access to content
US8386573B2 (en) * 2008-12-31 2013-02-26 International Business Machines Corporation System and method for caching linked email data for offline use
US8744956B1 (en) 2010-07-01 2014-06-03 Experian Information Solutions, Inc. Systems and methods for permission arbitrated transaction services
US8931058B2 (en) 2010-07-01 2015-01-06 Experian Information Solutions, Inc. Systems and methods for permission arbitrated transaction services
US8407341B2 (en) * 2010-07-09 2013-03-26 Bank Of America Corporation Monitoring communications
WO2012065128A1 (en) * 2010-11-11 2012-05-18 Ebay Inc. Quick payment using mobile device binding
US9147042B1 (en) 2010-11-22 2015-09-29 Experian Information Solutions, Inc. Systems and methods for data verification
US8839357B2 (en) * 2010-12-22 2014-09-16 Canon U.S.A., Inc. Method, system, and computer-readable storage medium for authenticating a computing device
KR101923611B1 (en) * 2011-04-11 2018-11-29 삼성전자주식회사 Service server, user terminal, service providing method and control method thereof
BR112013030777A2 (en) 2011-06-03 2016-12-06 Uc Group Ltd systems and methods for user registration, validation and monitoring on multiple websites
US20120317172A1 (en) * 2011-06-13 2012-12-13 International Business Machines Corporation Mobile web app infrastructure
US9607336B1 (en) 2011-06-16 2017-03-28 Consumerinfo.Com, Inc. Providing credit inquiry alerts
US10546306B2 (en) 2011-09-07 2020-01-28 Elwha Llc Computational systems and methods for regulating information flow during interactions
US9159055B2 (en) 2011-09-07 2015-10-13 Elwha Llc Computational systems and methods for identifying a communications partner
US9690853B2 (en) 2011-09-07 2017-06-27 Elwha Llc Computational systems and methods for regulating information flow during interactions
US10074113B2 (en) 2011-09-07 2018-09-11 Elwha Llc Computational systems and methods for disambiguating search terms corresponding to network members
US10198729B2 (en) 2011-09-07 2019-02-05 Elwha Llc Computational systems and methods for regulating information flow during interactions
US9432190B2 (en) 2011-09-07 2016-08-30 Elwha Llc Computational systems and methods for double-encrypting data for subsequent anonymous storage
US9167099B2 (en) 2011-09-07 2015-10-20 Elwha Llc Computational systems and methods for identifying a communications partner
US9747561B2 (en) 2011-09-07 2017-08-29 Elwha Llc Computational systems and methods for linking users of devices
US9491146B2 (en) 2011-09-07 2016-11-08 Elwha Llc Computational systems and methods for encrypting data for anonymous storage
US9195848B2 (en) 2011-09-07 2015-11-24 Elwha, Llc Computational systems and methods for anonymized storage of double-encrypted data
US10185814B2 (en) 2011-09-07 2019-01-22 Elwha Llc Computational systems and methods for verifying personal information during transactions
US9928485B2 (en) 2011-09-07 2018-03-27 Elwha Llc Computational systems and methods for regulating information flow during interactions
US10523618B2 (en) * 2011-09-07 2019-12-31 Elwha Llc Computational systems and methods for identifying a communications partner
US9106691B1 (en) 2011-09-16 2015-08-11 Consumerinfo.Com, Inc. Systems and methods of identity protection and management
WO2013116726A1 (en) 2012-02-03 2013-08-08 Ebay Inc. Adding card to mobile wallet using nfc
WO2013142290A1 (en) * 2012-03-22 2013-09-26 Socialogue, Inc. Internet identity management
WO2013150492A1 (en) * 2012-04-05 2013-10-10 Thakker Mitesh L Systems and methods to input or access data using remote submitting mechanism
US9430778B2 (en) * 2012-07-30 2016-08-30 Kount Inc. Authenticating users for accurate online audience measurement
US8856894B1 (en) 2012-11-28 2014-10-07 Consumerinfo.Com, Inc. Always on authentication
US10164989B2 (en) * 2013-03-15 2018-12-25 Nominum, Inc. Distinguishing human-driven DNS queries from machine-to-machine DNS queries
US9633322B1 (en) 2013-03-15 2017-04-25 Consumerinfo.Com, Inc. Adjustment of knowledge-based authentication
US10664936B2 (en) 2013-03-15 2020-05-26 Csidentity Corporation Authentication systems and methods for on-demand products
FR3003976B1 (en) * 2013-03-28 2016-08-26 Cie Ind Et Financiere D'ingenierie Ingenico METHOD FOR DELIVERING A LOCATION ASSERTION
US9721147B1 (en) 2013-05-23 2017-08-01 Consumerinfo.Com, Inc. Digital identity
US10277628B1 (en) * 2013-09-16 2019-04-30 ZapFraud, Inc. Detecting phishing attempts
US9817987B2 (en) * 2013-12-23 2017-11-14 Dropbox, Inc. Restricting access to content
US9515833B2 (en) * 2014-01-06 2016-12-06 Lett.rs LLC Electronic personal signature generation and distribution for personal communication
US20150199742A1 (en) * 2014-01-10 2015-07-16 Raj Abhyanker Trade recommendations in a neighborhood environment with conflict resolution
US9439367B2 (en) 2014-02-07 2016-09-13 Arthi Abhyanker Network enabled gardening with a remotely controllable positioning extension
US9457901B2 (en) 2014-04-22 2016-10-04 Fatdoor, Inc. Quadcopter with a printable payload extension system and method
US9004396B1 (en) 2014-04-24 2015-04-14 Fatdoor, Inc. Skyteboard quadcopter and method
US10373240B1 (en) 2014-04-25 2019-08-06 Csidentity Corporation Systems, methods and computer-program products for eligibility verification
US9022324B1 (en) 2014-05-05 2015-05-05 Fatdoor, Inc. Coordination of aerial vehicles through a central server
US9971985B2 (en) 2014-06-20 2018-05-15 Raj Abhyanker Train based community
US9441981B2 (en) 2014-06-20 2016-09-13 Fatdoor, Inc. Variable bus stops across a bus route in a regional transportation network
JP5905531B2 (en) * 2014-07-08 2016-04-20 ヤフー株式会社 Advertisement distribution apparatus, advertisement distribution method, terminal estimation apparatus, terminal estimation method, and program
US9451020B2 (en) 2014-07-18 2016-09-20 Legalforce, Inc. Distributed communication of independent autonomous vehicles to provide redundancy and performance
US20160086182A1 (en) * 2014-09-24 2016-03-24 Mastercard International Incorporated System, Method and Apparatus to Detect Fraud in Travel Transactions
US10832176B2 (en) 2014-12-08 2020-11-10 Mastercard International Incorporated Cardholder travel detection with internet service
US20160189158A1 (en) * 2014-12-29 2016-06-30 Ebay Inc. Authenticating requests to access accounts based on prior requests
US9721253B2 (en) 2015-05-06 2017-08-01 Forter Ltd. Gating decision system and methods for determining whether to allow material implications to result from online activities
US10255561B2 (en) 2015-05-14 2019-04-09 Mastercard International Incorporated System, method and apparatus for detecting absent airline itineraries
EP3432543B1 (en) 2016-03-14 2022-05-04 Ricoh Company, Ltd. Service providing system, service delivery system, service providing method, and program
JP6283045B2 (en) * 2016-03-16 2018-02-21 ヤフー株式会社 Advertisement distribution apparatus, advertisement distribution method, terminal estimation apparatus, terminal estimation method, and program
CN109074327B (en) * 2016-03-29 2022-02-15 株式会社理光 Service providing system, service delivery system, service providing method, and program
JP6638808B2 (en) * 2016-03-29 2020-01-29 株式会社リコー Service providing system, service giving / receiving system, service providing method, and program
EP3438837A4 (en) 2016-03-29 2019-03-20 Ricoh Company Ltd. Service provision system, service delivery system, service provision method, and program
US10542010B2 (en) * 2016-05-27 2020-01-21 Microsoft Technology Licensing, Llc Account verification in deferred provisioning systems
US20180089676A1 (en) * 2016-09-23 2018-03-29 Paypal, Inc. Dynamic Multi-Website Data Collection and Data Sharing
US20180089742A1 (en) * 2016-09-23 2018-03-29 Paypal, Inc. Dynamic Website Personalization and Data Sharing
US11009886B2 (en) 2017-05-12 2021-05-18 Autonomy Squared Llc Robot pickup method
US10911234B2 (en) 2018-06-22 2021-02-02 Experian Information Solutions, Inc. System and method for a token gateway environment
JP2020024503A (en) 2018-08-06 2020-02-13 キオクシア株式会社 Electronic device and data transmission/reception method
US11003999B1 (en) * 2018-11-09 2021-05-11 Bottomline Technologies, Inc. Customized automated account opening decisioning using machine learning
US11379616B2 (en) * 2019-03-25 2022-07-05 Identiq Protocol Ltd. System and method for providing anonymous validation of a query among a plurality of nodes in a network
KR102127171B1 (en) * 2019-08-30 2020-06-26 주식회사 카카오뱅크 Method, server and application for distributed training deep-learning model for id card recognition, and recognition method using the same model
US11941065B1 (en) 2019-09-13 2024-03-26 Experian Information Solutions, Inc. Single identifier platform for storing entity data
US20210090077A1 (en) * 2019-09-19 2021-03-25 Bank Of America Corporation System architectures for point-of-sale data obfuscation, data removal and data encryption
CN110807181A (en) * 2019-11-14 2020-02-18 北京融易做科技有限公司 Method, device and system for logging in and verifying database in enterprise
US11528267B2 (en) * 2019-12-06 2022-12-13 Bank Of America Corporation System for automated image authentication and external database verification
US20210182808A1 (en) * 2019-12-12 2021-06-17 Visa International Service Association Method, System, and Computer Program Product for Distributing Data from Multiple Data Sources
TWI768280B (en) * 2020-01-13 2022-06-21 玉山商業銀行股份有限公司 System and method for online transaction processing
KR102440878B1 (en) * 2021-12-09 2022-09-05 한국인터넷진흥원 Learning method for learning detection model for fraud detection of virtual asset, detecting method of fraud detection of virtual asset using the detection model, apparatus and computer program for performing the learning method and the detecting method
EP4250205A1 (en) * 2022-03-24 2023-09-27 Dunamu Inc. A method of verifying originator or beneficiary and an electronic device performing thereof

Family Cites Families (93)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4053710A (en) * 1976-03-01 1977-10-11 Ncr Corporation Automatic speaker verification systems employing moment invariants
JPH0561834A (en) 1991-09-03 1993-03-12 Nec Corp Security system for data base system
US5819226A (en) * 1992-09-08 1998-10-06 Hnc Software Inc. Fraud detection using predictive modeling
US5544255A (en) * 1994-08-31 1996-08-06 Peripheral Vision Limited Method and system for the capture, storage, transport and authentication of handwritten signatures
US5826241A (en) 1994-09-16 1998-10-20 First Virtual Holdings Incorporated Computerized system for making payments and authenticating transactions over the internet
US5774525A (en) * 1995-01-23 1998-06-30 International Business Machines Corporation Method and apparatus utilizing dynamic questioning to provide secure access control
US5570093A (en) * 1995-02-10 1996-10-29 Applied Concepts, Inc. Police traffic radar using absolute signal strength information to improve target signal processing accuracy
US5657389A (en) * 1995-05-08 1997-08-12 Image Data, Llc Positive identification system and method
US6070141A (en) * 1995-05-08 2000-05-30 Image Data, Llc System and method of assessing the quality of an identification transaction using an identificaion quality score
US5790677A (en) 1995-06-29 1998-08-04 Microsoft Corporation System and method for secure electronic commerce transactions
JP3506293B2 (en) 1995-10-30 2004-03-15 株式会社リコー Speaker identification system
US5757917A (en) 1995-11-01 1998-05-26 First Virtual Holdings Incorporated Computerized payment system for purchasing goods and services on the internet
US5940476A (en) * 1996-06-28 1999-08-17 Distributed Software Development, Inc. System and method for identifying an unidentified caller
US5684951A (en) * 1996-03-20 1997-11-04 Synopsys, Inc. Method and system for user authorization over a multi-user computer system
US7159116B2 (en) * 1999-12-07 2007-01-02 Blue Spike, Inc. Systems, methods and devices for trusted transactions
JP3488347B2 (en) * 1996-08-29 2004-01-19 株式会社日立製作所 Automatic address distribution system and address distribution server
US6819783B2 (en) * 1996-09-04 2004-11-16 Centerframe, Llc Obtaining person-specific images in a public venue
US6195657B1 (en) * 1996-09-26 2001-02-27 Imana, Inc. Software, method and apparatus for efficient categorization and recommendation of subjects according to multidimensional semantics
US6182222B1 (en) * 1997-03-25 2001-01-30 Electronic Data Systems Corporation Secure data storage system and method
US6119103A (en) 1997-05-27 2000-09-12 Visa International Service Association Financial risk prediction systems and methods therefor
US5913212A (en) * 1997-06-13 1999-06-15 Tele-Publishing, Inc. Personal journal
US6029154A (en) * 1997-07-28 2000-02-22 Internet Commerce Services Corporation Method and system for detecting fraud in a credit card transaction over the internet
US20020007411A1 (en) 1998-08-10 2002-01-17 Shvat Shaked Automatic network user identification
US5966351A (en) * 1997-10-29 1999-10-12 Siemens Information And Communications Networks, Inc. System and method for changing the priority of voice mail messages within the recipient's mailbox
US6095413A (en) * 1997-11-17 2000-08-01 Automated Transaction Corporation System and method for enhanced fraud detection in automated electronic credit card processing
US6233565B1 (en) * 1998-02-13 2001-05-15 Saranac Software, Inc. Methods and apparatus for internet based financial transactions with evidence of payment
US6038333A (en) * 1998-03-16 2000-03-14 Hewlett-Packard Company Person identifier and management system
US5913210A (en) * 1998-03-27 1999-06-15 Call; Charles G. Methods and apparatus for disseminating product information via the internet
US6484260B1 (en) * 1998-04-24 2002-11-19 Identix, Inc. Personal identification system
US6263447B1 (en) * 1998-05-21 2001-07-17 Equifax Inc. System and method for authentication of network users
AU4005999A (en) 1998-05-21 1999-12-06 Equifax, Inc. System and method for authentication of network users and issuing a digital certificate
AU4162199A (en) 1998-06-11 1999-12-30 Aqi Ltd. Method, apparatus and system for securing credit card transactions
IL125826A (en) * 1998-08-17 2001-05-20 Ur Jonathan Shem Method for preventing unauthorized use of credit cards in remote payments and an optional supplemental-code card for use therein
JP2000067005A (en) 1998-08-26 2000-03-03 Nippon Telegr & Teleph Corp <Ntt> Method for confirming person himself and device using the same method and record medium recording program for controlling the same device
US6254000B1 (en) * 1998-11-13 2001-07-03 First Data Corporation System and method for providing a card transaction authorization fraud warning
US6173269B1 (en) * 1998-12-16 2001-01-09 Zowi.Com, Inc Method and apparatus for executing electronic commercial transactions with minors
AU3668800A (en) 1999-04-08 2000-11-14 Cleartogo.Com Credit card security technique
WO2001001280A2 (en) 1999-06-30 2001-01-04 Catalog City, Inc. Method and system for sharing cookie information during internet transactions
JP2001052181A (en) 1999-08-13 2001-02-23 Nippon Telegr & Teleph Corp <Ntt> Personal authenticating method and recording medium recording personal authentication program
AU6179300A (en) 1999-08-25 2001-03-19 Kirichenko, Oleg Apparatus and method for receiving identification information via a first and a second communication network
AU7357400A (en) 1999-09-09 2001-04-10 Hugh Gibbs Taylor Jr. System and method for evaluating credit risks
US6853988B1 (en) * 1999-09-20 2005-02-08 Security First Corporation Cryptographic server with provisions for interoperability between cryptographic systems
WO2001033520A1 (en) 1999-11-04 2001-05-10 David Felger A method of billing a purchase made over a computer network
US6466917B1 (en) 1999-12-03 2002-10-15 Ebay Inc. Method and apparatus for verifying the identity of a participant within an on-line auction environment
WO2001044977A2 (en) 1999-12-14 2001-06-21 Imandi.Com Inc. Combined offline and online verification of user legitimacy for electronic commerce
US6934858B2 (en) 1999-12-15 2005-08-23 Authentify, Inc. System and method of using the public switched telephone network in providing authentication or authorization for online transactions
WO2001044975A2 (en) 1999-12-17 2001-06-21 Zack Network, Inc. Identifying web users in a proxy server
AU2001230474A1 (en) 2000-01-31 2001-08-14 Trivnet Ltd. Applications of automatic internet identification methods
DE60133453T2 (en) * 2000-02-18 2009-05-07 Cypak Ab METHOD AND DEVICE FOR IDENTIFICATION AND AUTHENTICATION
EP1128628A1 (en) * 2000-02-23 2001-08-29 Tradesafely.com Limited Method and apparatus for Internet web site authentication
AU4365801A (en) 2000-03-15 2001-09-24 Mastercard International Inc Method and system for secure payments over a computer network
EP1134707A1 (en) 2000-03-17 2001-09-19 Tradesafely.com Limited Payment authorisation method and apparatus
AU2387901A (en) 2000-03-17 2001-09-24 Tradesafely.Com Limited Payment authorisation method and apparatus
US7778934B2 (en) 2000-04-17 2010-08-17 Verisign, Inc. Authenticated payment
KR20090116813A (en) 2000-04-24 2009-11-11 비자 인터내셔날 써비스 어쏘시에이션 Online payer authentication service
US7577834B1 (en) * 2000-05-09 2009-08-18 Sun Microsystems, Inc. Message authentication using message gates in a distributed computing environment
US6300872B1 (en) * 2000-06-20 2001-10-09 Philips Electronics North America Corp. Object proximity/security adaptive event detection
GB0015147D0 (en) * 2000-06-21 2000-08-09 Jacobs Michael Tracking system
WO2001099071A2 (en) 2000-06-22 2001-12-27 Mastercard International Incorporated An improved method and system for conducting secure payments over a computer network without a pseudo or proxy account number
FI115355B (en) 2000-06-22 2005-04-15 Icl Invia Oyj Arrangement for the authentication and authentication of a secure system user
EP1299866A2 (en) 2000-07-10 2003-04-09 Mastercard International, Inc. Method and system for conducting secure electronic commerce transactions with authorization request data loop-back
US7430537B2 (en) 2000-07-10 2008-09-30 Paypal, Inc. System and method for verifying a financial instrument
US8380628B1 (en) 2000-07-17 2013-02-19 Harris Intellectual Property, Lp System and method for verifying commercial transactions
US7076727B1 (en) * 2000-08-16 2006-07-11 Sparta Systems, Inc. Configuring activities to perform operations on user-defined fields
US7216132B1 (en) * 2000-08-16 2007-05-08 Sparta Systems, Inc. System and method for automated process control
US7266764B1 (en) * 2000-08-16 2007-09-04 Sparta Systems, Inc. Graphical user interface for automated process control
JP4654498B2 (en) * 2000-08-31 2011-03-23 ソニー株式会社 Personal authentication system, personal authentication method, information processing apparatus, and program providing medium
NO20004542L (en) 2000-09-12 2002-03-13 Autencia As Identity verification system and method
AU2001295077A1 (en) 2000-09-27 2002-04-08 Mastercard International Incorporated A universal and interoperable system and method utilizing a universal cardholder authentication field (UCAF) for authentication data collection and validation
WO2002027610A1 (en) 2000-09-29 2002-04-04 Hnc Software, Inc. Score based decisioning
GB2368227B (en) * 2000-10-17 2003-12-10 Hewlett Packard Co Contact center
US7082409B1 (en) * 2000-11-22 2006-07-25 Richard Sutton Cherry Fully integrated on-line interactive purchasing club incorporating extremely rapid fulfillment
US20020073138A1 (en) * 2000-12-08 2002-06-13 Gilbert Eric S. De-identification and linkage of data records
US20070005515A1 (en) 2001-03-12 2007-01-04 Rosenberg Jonathan B System and method for providing secure transactions
US20020147691A1 (en) * 2001-04-05 2002-10-10 Davis Dustin M. Method and system for consummating a transaction in a biometric verification system based on prior transactional histories
WO2002083255A1 (en) * 2001-04-11 2002-10-24 Walker Digital, Llc Methods and systems for facilitating game play at a gaming device by means of third party offers
WO2002084456A2 (en) 2001-04-12 2002-10-24 Netdesigns Limited User identity verification system
US7542931B2 (en) 2001-06-01 2009-06-02 American Express Travel Related Services Company, Inc. System and method for global automated address verification
US6957259B1 (en) * 2001-06-25 2005-10-18 Bellsouth Intellectual Property Corporation System and method for regulating emails by maintaining, updating and comparing the profile information for the email source to the target email statistics
AU2002326635A1 (en) 2001-08-15 2003-03-03 Shea Writer Methods for verifying cardholder authenticity and for creating billing address database
US20040199781A1 (en) * 2001-08-30 2004-10-07 Erickson Lars Carl Data source privacy screening systems and methods
US7111789B2 (en) * 2001-08-31 2006-09-26 Arcot Systems, Inc. Enhancements to multi-party authentication and other protocols
US20030061163A1 (en) 2001-09-27 2003-03-27 Durfield Richard C. Method and apparatus for verification/authorization by credit or debit card owner of use of card concurrently with merchant transaction
US7325143B2 (en) * 2001-10-15 2008-01-29 Linux Foundation Digital identity creation and coalescence for service authorization
EP1436746A4 (en) * 2001-10-17 2007-10-10 Npx Technologies Ltd Verification of a person identifier received online
WO2003042893A1 (en) 2001-11-15 2003-05-22 First Data Corporation Online payments
GB2383497B (en) 2001-12-21 2005-09-07 Nec Technologies Transaction verification using a mobile telephone network
US7046779B2 (en) * 2002-02-15 2006-05-16 Multimedia Telesys, Inc. Video conference system and methods for use at multi-station sites
US7015817B2 (en) * 2002-05-14 2006-03-21 Shuan Michael Copley Personal tracking device
US6853739B2 (en) * 2002-05-15 2005-02-08 Bio Com, Llc Identity verification system
US6937702B1 (en) * 2002-05-28 2005-08-30 West Corporation Method, apparatus, and computer readable media for minimizing the risk of fraudulent access to call center resources
JP4363868B2 (en) * 2002-08-23 2009-11-11 株式会社東芝 Search keyword analysis program, system and method
US20040210639A1 (en) * 2003-03-26 2004-10-21 Roy Ben-Yoseph Identifying and using identities deemed to be known to a user

Also Published As

Publication number Publication date
CN1666205A (en) 2005-09-07
JP2005507106A (en) 2005-03-10
EP1436746A4 (en) 2007-10-10
IL161437A (en) 2010-11-30
IL161437A0 (en) 2004-09-27
US20140222690A1 (en) 2014-08-07
US20040243832A1 (en) 2004-12-02
NZ532258A (en) 2006-04-28
WO2003034633A3 (en) 2003-11-13
CA2463891C (en) 2012-07-17
EP1436746A2 (en) 2004-07-14
AU2002340207B2 (en) 2008-07-31
WO2003034633A2 (en) 2003-04-24
US8650103B2 (en) 2014-02-11

Similar Documents

Publication Publication Date Title
CA2463891A1 (en) Verification of a person identifier received online
JP2005507106A5 (en)
US10965668B2 (en) Systems and methods to authenticate users and/or control access made by users based on enhanced digital identity verification
US20220038446A1 (en) Identity Proofing and Portability on Blockchain
US9888007B2 (en) Systems and methods to authenticate users and/or control access made by users on a computer network using identity services
US10187369B2 (en) Systems and methods to authenticate users and/or control access made by users on a computer network based on scanning elements for inspection according to changes made in a relation graph
US10250583B2 (en) Systems and methods to authenticate users and/or control access made by users on a computer network using a graph score
US20190122149A1 (en) Enhanced System and Method for Identity Evaluation Using a Global Score Value
CN102317903B (en) Use social information that user conversation is authenticated
US8588748B2 (en) System and method for mobile identity protection of a user of multiple computer applications, networks or devices
US9015263B2 (en) Domain name searching with reputation rating
US7487170B2 (en) Location information for avoiding unwanted communications systems and methods
US7697942B2 (en) Location based rules architecture systems and methods
US20090320101A1 (en) System and method for authenticating users in a social network
US20150213131A1 (en) Domain name searching with reputation rating
US20220131844A1 (en) Identity access management using access attempts and profile updates
AU2002340207A1 (en) Verification of a person identifier received online
CN108055253A (en) A kind of software login validation method, apparatus and system
CN107278306A (en) User authentication based on personal visit history
Anoh et al. Multi-factor authentication system for securing mobile money transactions using mobile money services in Ivory Coast
CN112632520B (en) Method and system for registering real names of group telephone services
JP2002215942A (en) Communication system with abstract filter
KR100476005B1 (en) Method and system for verifing authenticity of a person based on the ip address
CN116128628A (en) Phishing risk early warning method and system
ZA200402931B (en) Verification of a person identifier received online.

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed

Effective date: 20201016