WO2005065073A2 - Method and system for identity theft prevention, detection and victim assistance - Google Patents
Method and system for identity theft prevention, detection and victim assistance Download PDFInfo
- Publication number
- WO2005065073A2 WO2005065073A2 PCT/US2004/028569 US2004028569W WO2005065073A2 WO 2005065073 A2 WO2005065073 A2 WO 2005065073A2 US 2004028569 W US2004028569 W US 2004028569W WO 2005065073 A2 WO2005065073 A2 WO 2005065073A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- customer
- identity theft
- victim
- account
- present
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation or account maintenance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/24—Credit schemes, i.e. "pay after"
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
Definitions
- the present invention relates generally to a method and system for providing
- the present invention is a method and system for a hybrid approach that offers an identity theft prevention/detection service combined
- FIG. 1 illustrates a theft prevention process flow of an embodiment of the present invention
- FIG. 2 illustrates a victim assistance process flow of an embodiment of the present invention.
- An embodiment of the present invention relates to identity theft prevention. See FIG. 1.
- a further embodiment relates more particularly to prevention actions
- This embodiment verifies suspicious account data changes that match a fraud indicator system, such as the Known Fraud Indicator System
- KFIS Issuer Clearing Service
- ICS Issuer Clearing Service
- the embodiment further verifies activity with the customer to ensure it was authorized.
- Another embodiment of the present invention relates to prevention actions involving a fee-based product. This embodiment includes a methodology for sending
- the methodology includes working with the customer to establish a true password on all accounts and recommending that the customer update all creditor relationships with a password. Further, in this embodiment, at the time of account data changes (e.g., address), the changes are verified with the customer to ensure they were authorized. In another embodiment, the present invention ensures that any new applications received, which have information matching an enrollee's data, are verified with the customer. In a further embodiment, discounts are offered on preventative merchandise that may assist in protecting the customer (e.g., shredders, locking mailboxes, etc.).
- bank card detection actions are provided against fraudulent applications. For example, postcards are sent to verify suspicious applications; authorization detection strategies are used to detect out-of-pattern spending and payments, and the potential victim is proactively contacted to validate transactions; the KFIS database records all fraudulent addresses and the phone numbers listed on accounts; manual reports look for new accounts with a balance transfer check request; investigations are conducted on accounts that have credit inquiries by collusive credit bureau subscribers; police reports are filed when identity theft perpetrators are identified; and investigative intelligence is shared in a working relationship with law enforcement to prosecute criminals.
- bank card detection actions are provided against Account Take Over (ATO).
- ATO Account Take Over
- an embodiment performs incremental verification when high risk requests are made on an account; authorization detection strategies monitor for high risk ATO transactions; and the KFIS database records all fraudulent addresses and phone numbers that are listed on accounts identified as an ATO. This database then monitors the host system for any other accounts that are
- a further embodiment of the present invention includes high risk transactions reports (e.g., involving address change and card request sent to a high risk zip code area or an overnight card request to alternate shipping address located in a high risk zip code area). Additionally, customers who are victimized by ATO fraud have their account flagged to ensure that a representative handling the customers' next inquiry is aware that the customers have been impacted by ATO fraud.
- Embodiments also include internal collusion detection controls managed, e.g., through an Internal Investigation/Fraud Policy unit.
- Embodiments of the present invention also include identity theft controls such as supporting the prioritization of passwords, IP address capture, enhanced fraud variable TPR, and CBR fraud alerts. Further embodiments include, for example, private label detection actions pertaining to high risk client checks whereby store applications are reviewed that have a higher fraud rate based on historical details. Other embodiments include FEW suspicious activity monitoring such as the billing address/ship-to-address mismatch.
- Additional embodiments of the present invention also relate to the following: Fraud scoring whereby a systemic score attempts to predict the likelihood of fraud on an application; New Account Processing System (NAPS) fraud controls wherein NAPS verification of information is provided by the customer; California identity theft legislation that targets applications from California where the bureau details differ from the application details; a database that looks for bureau variations, such as a suspect
- Embodiments of the present invention also include victim assistance actions.
- Victims are referred to the credit bureaus to apply a victim
- Embodiments of the invention also include instructing the victim to file a police report
- Embodiments of the present invention also comprise the following: Upon notification from the customer, pulling the bureau reports and reviewing the trades with the customer to determine if any are unauthorized; contacting the bureau with the customer on the line to assist him in applying a victim statement; completing all paper
- Embodiments of the present invention further include acting for the customer and/or providing assistance to the customer to make it easier for him or her to recover
- a new account is established and the victim gets his new card in hand, for example, within 24 hours as a fast card and a case is created for tracking and follow-up.
- the affidavit is sent to the customer either, for
- a follow-up is scheduled, for example, within 30 days to re-contact the customer to review yet again the bureau reports for any new inquiries or tradelines that have come up that are either unauthorized or
- Further embodiments of the present invention include providing information which will allow the customer to contact all unauthorized creditors and request that the affected accounts be closed. If approved by the creditor, a universal affidavit, as noted above, is completed and sent to the customer for signature. The customer then sends it to a representative who will forward it to all investigative units. Thereafter, the customer sends the affidavit to other creditors as required.
- Other embodiments of the present invention comprise meeting with a field investigations staff to outline the typical questions used on police reports and to document these items for the customer. The questions are completed and this information is sent to the customer. The customer then takes this information to his or her local law enforcement authority. Further embodiments include filling out the appropriate governmental agency (e.g., Federal Trade Commission, Social Security Administration, etc) documentation and forwarding it to the customer for review arid submission.
- governmental agency e.g., Federal Trade Commission, Social Security Administration, etc
- embodiments of the present invention include working with the customer to determine if an extension of credit to cover necessary transaction activity during the investigation can be facilitated.
- embodiments of the invention provide for a letter to be written to the lender educating the lender that identity theft has been reported and creditors are currently investigating claims. Individual business dispute representatives pro actively contact the victim to explain the actions that will be taken on the accounts. A written explanation of the actions that will be taken to assist the victim is also provided. Unauthorized tradelines continue to be deleted from the bureau
- the unit has access to all card platforms. Certain accounts are assigned to a specialized unit in which a specific person is appointed to work with the victim. This allows a relationship to be established between the victim and the servicing representative, while providing stability during a traumatic event. Additionally, this minimizes the need for the customer to repeatedly explain his or her situation.
- Embodiments of the present invention also includes, at the time of initial enrollment, providing the customer with an identity theft welcome kit that focuses on how to prevent identity theft. This includes an internet link and a checklist of actions that should be taken to minimize the potential of identity theft. Phone numbers to call in the event of suspected identity theft is also included.
- FIG. 1 Embodiments of the present invention have now been described in fulfillment of the above objects. It will be appreciated that these examples are merely illustrative of the invention. Many variations and modifications will be apparent those skilled in the art.
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
BRPI0414119-9A BRPI0414119A (en) | 2003-09-03 | 2004-09-03 | method and system for identifying theft prevention, theft detection and victim assistance |
JP2006525438A JP2007504560A (en) | 2003-09-03 | 2004-09-03 | Method and system for preventing identity theft, detecting and assisting victims |
EP04821029A EP1661054A4 (en) | 2003-09-03 | 2004-09-03 | Method and system for identity theft prevention, detection and victim assistance |
AU2004311581A AU2004311581A1 (en) | 2003-09-03 | 2004-09-03 | Method and system for identity theft prevention, detection and victim assistance |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US49937803P | 2003-09-03 | 2003-09-03 | |
US60/499,378 | 2003-09-03 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2005065073A2 true WO2005065073A2 (en) | 2005-07-21 |
WO2005065073A3 WO2005065073A3 (en) | 2006-11-02 |
Family
ID=34748729
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2004/028569 WO2005065073A2 (en) | 2003-09-03 | 2004-09-03 | Method and system for identity theft prevention, detection and victim assistance |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP1661054A4 (en) |
JP (1) | JP2007504560A (en) |
KR (1) | KR20060073949A (en) |
AU (1) | AU2004311581A1 (en) |
BR (1) | BRPI0414119A (en) |
WO (1) | WO2005065073A2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11488129B2 (en) | 2009-11-06 | 2022-11-01 | Livingsocial, Inc. | Systems and methods to implement point of sale (POS) terminals, process orders and manage order fulfillment |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10102591B2 (en) * | 2011-01-21 | 2018-10-16 | Livingsocial, Inc. | Systems and methods to implement point of sale (POS) terminals, process orders and manage order fulfillment |
CN106330840B (en) | 2015-07-01 | 2020-06-30 | 阿里巴巴集团控股有限公司 | Log-in method and device for loss-reporting account |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5884289A (en) * | 1995-06-16 | 1999-03-16 | Card Alert Services, Inc. | Debit card fraud detection and control system |
JP2001338151A (en) * | 2000-05-29 | 2001-12-07 | Sony Corp | Extra personal information storage substrate, security system for personal information storage substrate and security method for personal information storage substrate |
JP2002358417A (en) * | 2001-03-30 | 2002-12-13 | Mizuho Corporate Bank Ltd | Method, system, and program for banking processing |
US20020173994A1 (en) * | 2001-05-21 | 2002-11-21 | Ferguson Joseph M. | Method and apparatus for insuring an insured from identity theft peril and identity reclamation and credit restoration |
-
2004
- 2004-09-03 KR KR1020067004538A patent/KR20060073949A/en not_active Application Discontinuation
- 2004-09-03 EP EP04821029A patent/EP1661054A4/en not_active Withdrawn
- 2004-09-03 WO PCT/US2004/028569 patent/WO2005065073A2/en active Application Filing
- 2004-09-03 AU AU2004311581A patent/AU2004311581A1/en not_active Abandoned
- 2004-09-03 JP JP2006525438A patent/JP2007504560A/en active Pending
- 2004-09-03 BR BRPI0414119-9A patent/BRPI0414119A/en not_active Application Discontinuation
Non-Patent Citations (1)
Title |
---|
See references of EP1661054A4 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11488129B2 (en) | 2009-11-06 | 2022-11-01 | Livingsocial, Inc. | Systems and methods to implement point of sale (POS) terminals, process orders and manage order fulfillment |
Also Published As
Publication number | Publication date |
---|---|
KR20060073949A (en) | 2006-06-29 |
EP1661054A2 (en) | 2006-05-31 |
EP1661054A4 (en) | 2009-07-15 |
JP2007504560A (en) | 2007-03-01 |
BRPI0414119A (en) | 2006-10-31 |
AU2004311581A1 (en) | 2005-07-21 |
WO2005065073A3 (en) | 2006-11-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20050144143A1 (en) | Method and system for identity theft prevention, detection and victim assistance | |
JP7350819B2 (en) | Transaction monitoring system | |
US11288676B2 (en) | Private confirmation system | |
US20060089905A1 (en) | Credit and identity protection network | |
EP1661054A2 (en) | Method and system for identity theft prevention, detection and victim assistance | |
MXPA06002498A (en) | Method and system for identity theft prevention, detection and victim assistance | |
Kempen | Vehicle scams: stop and think before you hand over your keys or cash | |
Lawson | Identity-related crime victim issues: a discussion paper | |
Taylor-Butts et al. | Fraud Against Businesses in Canada: Results from a National Survey | |
Act | USA Patriot Act | |
AU2016201497A1 (en) | Method and system for identity theft prevention, detection and victim assistance | |
MXPA06005848A (en) | Method and system for identity theft prevention, detection and victim assistance |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2004821029 Country of ref document: EP Ref document number: 2004311581 Country of ref document: AU Ref document number: 1020067004538 Country of ref document: KR Ref document number: PA/a/2006/002498 Country of ref document: MX Ref document number: 2006525438 Country of ref document: JP Ref document number: 1150/DELNP/2006 Country of ref document: IN |
|
ENP | Entry into the national phase in: |
Ref document number: 2004311581 Country of ref document: AU Date of ref document: 20040903 Kind code of ref document: A |
|
WWP | Wipo information: published in national office |
Ref document number: 2004311581 Country of ref document: AU |
|
WWP | Wipo information: published in national office |
Ref document number: 2004821029 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1020067004538 Country of ref document: KR |
|
ENP | Entry into the national phase in: |
Ref document number: PI0414119 Country of ref document: BR |