WO2006017648A1 - Apparatus and method for preventing credit card fraud - Google Patents
Apparatus and method for preventing credit card fraud Download PDFInfo
- Publication number
- WO2006017648A1 WO2006017648A1 PCT/US2005/027708 US2005027708W WO2006017648A1 WO 2006017648 A1 WO2006017648 A1 WO 2006017648A1 US 2005027708 W US2005027708 W US 2005027708W WO 2006017648 A1 WO2006017648 A1 WO 2006017648A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- card
- trigger
- financial
- fraud
- procedure
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation or account maintenance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K5/00—Methods or arrangements for verifying the correctness of markings on a record carrier; Column detection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/03—Credit; Loans; Processing thereof
Definitions
- the present invention relates to devices for the prevention of credit card fraud.
- credit card fraud is a major problem in the credit card industry. Such fraud is achieved in many ways, one method being the theft of a cardholder's wallet or purse and the subsequent unauthorized usage of the credit cards and debit cards stored therein. Often, stolen credit cards are used within the first few hours of the theft. Most credit card fraud is detected before the cardholder knows there is a problem. Adding to this problem is the fact that most cardholders carry more than one credit card. Often, the cardholder does not even know how many or which cards he is carrying, and most cardholders do not keep a separate list of all of their credit and debit cards. Credit card companies often end up paying for the majority of unauthorized usage. This reduces the credit card companies' profits and leads to increased fees for cardholders.
- One proposed solution is for the cardholder to register all of his credit, debit, and other financial institution cards under a single credit card fraud protection plan. This allows the plan administrator to contact the credit card issuers in the event a fraud or theft is reported to the plan administrator by the cardholder. Although such credit card fraud protection plans offer a valuable service to the cardholder, it is still incumbent upon the cardholder to realize that a theft or fraud has taken place and to notify the plan administrator. Unfortunately, the theft is usually not realized until several hours or days have passed.
- an object of the present invention to provide an apparatus and method for preventing and reducing credit card fraud that provides an immediate and reliable notification that theft, fraud, or unauthorized use of a credit, debit, or financial institution card has occurred, and that provides an immediate procedure for canceling and reordering credit cards. It is a further object to provide a system that provides an increase in the arrest rate for credit card theft.
- the first system triggered by use of the trigger card is one that immediately cancels all credit and debit cards stored on a list of cards provided by the cardholder.
- a second system, which is optional, that is triggered by the use of the trigger card is a law- enforcement system that gathers information about the unauthorized user. This second system may include having the clerk request further identification in the form of a state-issued identification card or biometric data, such as a fingerprint.
- a third system triggered by the use of the trigger card is one that notifies various agencies, personnel, or third parties who may need to know of the theft, fraud, or unauthorized use. For example, the notification might be sent to state and federal agencies, credit card issuers, banks, relatives, and to personal email or telephone numbers of the cardholder, among other possibilities.
- a fourth system that is triggered by the use of the trigger card is one that immediately orders and delivers new cards to the cardholder at a pre-designated address by expedited delivery.
- This pre-designated address can be the cardholder's home address, his business address, or a "safe" address, such as a bank or post office box, or to a temporary address if the cardholder is away from home.
- the present invention provides significant advantages, including: (1) immediate response to fraud notification in the form of card cancellation, notification, and delivery of new cards; (2) increased reporting of credit card theft; (3) simplified "back-to-normal" status for cardholders; (4) increased collection of data about fraudulent users; (5) reduced false positive notifications of fraud or theft; and (6) significantly reduced losses to credit card issuers and retail entities due to credit card fraud.
- Figure 1 is a schematic of a wallet storing financial cards and a trigger card according to the present invention
- FIG. 2 is a schematic of a trigger card according to the present invention.
- Figure 3 is a diagram of a system triggered by the trigger card of Figure 2 according to the present invention.
- the present invention represents the discovery that a trigger card that looks and feels like a credit card, but which is not a credit card, may be placed among actual credit and debit cards in a cardholders wallet or purse to prevent credit card fraud.
- the trigger card is stored with the cardholder's other financial cards, but not used by the cardholder. Any attempt to use the trigger card as a credit card is a clear indication of theft or fraud; thereby triggering a range of possible responses tailored to reduce fraud.
- the trigger card and associated system for use will result in more limited fraud exposure and act as a fraud deterrent.
- wallet 11 also represents purses and other devices, including pouches, money clips, checkbook, pockets, drawers, file cabinet, furniture, automobiles, and safes, used by cardholders to carry and store credit, debit, and other financial institution cards.
- Financial cards 13 may be credit cards, debit cards, debit cards, automatic teller machine cards, cash value cards, voucher cards, or any card used for financial transactions.
- financial cards 13 include graphical designs, logos of banks, logos of credit card institutions, such as VISA and MASTERCARD, identification names, identification numbers, code numbers, expiration dates, and one or more magnetic strips or other digital memory means for storing digital data.
- a trigger card 15 is carried or stored randomly among financial cards 13.
- Trigger card 15 looks and feels like a typical financial card, in that trigger card 15 preferably includes graphics, logos of banks, logos of popular credit card institutions, such as VISA and MASTERCARD, identification names, identification numbers, code numbers, expiration dates, and one or more magnetic strips or other digital memory means for storing digital data; however, trigger card 15 is not a financial card.
- Trigger card 15 is preferably manufactured by the same means as financial cards 13.
- trigger card 15 The purpose of trigger card 15 is to fool an unauthorized user into believing that trigger card 15 is a valid credit card.
- trigger card 15 not be identical to any other financial card 13 in wallet 11 , but should look as much like a regular credit card as every other financial card 13 in wallet 11. The importance of this is two fold: first, the user should be able to easily avoid using trigger card 15; second, most cardholders do not have two identical cards from the same issuer, so the pair would stand out as a possible trigger card 15.
- trigger card 15 may include features or indicia that entice a thief or an unauthorized user to attempt to use trigger card 15 before attempting to use any other financial card 13. If a thief can be enticed into using trigger card 15 first, then, as explained below, as soon as trigger card 15 is used, the cardholder's valid financial cards 13 are cancelled. This prevents any unauthorized or fraudulent transactions on valid financial cards 13.
- the front and back of a the preferred embodiment of trigger card 15 is shown.
- the front of trigger card 15 preferably includes typical indicia of a credit or debit card, including a bank logo 17, a 16-digit card number 19, an expiration date 21 , a security label 23, such as a hologram, the cardholder's name 25, a credit card institution logo 27, such as VISA or MASTERCARD, and other marketing images. It is important that these indicia look authentic.
- the back of trigger card 15 is shown in Figure 2B.
- Trigger card 15 preferably includes at least one magnetic strip 29 or other means for storing digital trigger data, a signature block 31 , and a security code 33.
- trigger card 15 In addition to the need for stealth, as more fully explained below, magnetic strip 29 and card number 19 are needed by trigger card 15 and the associated credit card fraud prevention system of the present invention to communicate that trigger card 15 has been used. For the foregoing reasons, it is preferred that trigger card 15 be manufactured with the same materials and in the same fashion as valid financial cards 13.
- trigger cards 15 for use in the present invention undergo the same security and usage upgrades over time that regular financial cards undergo.
- trigger card 15 may include security features that are currently known but not widely used, or may include security or usage features that are not yet known.
- trigger card 15 is easily adaptable to keep up with the latest trends in credit card security and usability.
- System 34 includes conventional card readers 35 that are used to read, process, and display the status of financial transactions.
- Card readers 35 may be point of sale readers, as found at typical sales counters and cash registers, automatic teller machines, and Internet online sales computers.
- Card readers 35 serve as an interface between financial cards 13 and a system of approval and payment.
- Network 37 may be a computer network, telephone network, or any other network suitable for transmitting data.
- Network 37 transmits the data to one or more issuing institutions 39.
- Issuing institutions 39 may be banks, financial services companies, or other institutions or agencies.
- Issuing institutions 39 evaluate the requested transaction and reply through network 37 to card reader 35, either approving or denying the transaction.
- card readers 35 located at point of sale counters and cash registers the approval or denial by issuing institution 39 may be appropriately displayed on a display of card reader 35.
- trigger card 15 is used instead of financial card 13
- card reader 35 transmits selected data stored on magnetic strip 29 over network 37 to a trigger computer 41.
- Trigger computer 41 may be located at issuing institution 39 or may be located at a remote location. It will be appreciated that the data from trigger card 15 may be sent from card reader 35 through network 37 to trigger computer 41 , from issuing institution 39 through network 37 to trigger computer 41 , from institution 39 directly to trigger computer 41 , or directly from card reader 35 directly to trigger computer 41. Variations in the order or direction of transmission of the data from trigger card 15 may be easily controlled by appropriate programming on system 34.
- trigger computer 41 is programmed to initiate certain anti-fraud procedures based upon the receipt of data indicating an attempted use of trigger card 15.
- the procedures initiated by trigger computer 41 include a data acquisition procedure, a card cancellation procedure, a notification procedure, and a card ordering procedure.
- the cancellation procedure includes the immediate and automatic canceling of all financial cards 13 that have been previously chosen and listed by the cardholder to be cancelled by system 34 in the event trigger card 15 is ever used. Alternatively, the spending limits on the associated financial cards 13 may be severely reduced to allow tracing of the fraudulent use and to allow continued limited use in the event of an accidental use of the trigger card 15.
- the data acquisition procedure occurs immediately after trigger card 15 is swiped at a card reader 35 or after the data from trigger card 15 is submitted in an online transaction. In the preferred embodiment, the method and location of use is recorded and transmitted to trigger computer 41 , or other computers dedicated to the carrying out of the various procedures of the invention.
- Trigger card 15 and/or magnetic strip 29 may include certain biometric data about the cardholder, such as fingerprint, retinal scan, facial scan, palm print, etc.
- trigger computer 41 may transmit a request that the user of trigger card 15 submit such information.
- requests for biometric data become more commonplace, such requests may not necessarily alarm a thief that trigger card 15 has been used.
- the data acquisition procedure may allow for a transaction to occur at a low cost to increase the likelihood of capturing the thief.
- a transaction may occur at a low cost to increase the likelihood of capturing the thief.
- trigger card 15 is used at a location with poor data acquisition characteristics, such as a remote automatic teller machine with a low quality camera
- a withdrawal may be allowed so that the thief may use the trigger card 15, or any of the associated financial cards 13, at a location with better data acquisition equipment, such as at a store with a finger print scanner.
- Such options may be at the issuer's discretion depending on the importance of catching every thief, or may be an option selected by the cardholder as an extra protection feature.
- a disable code for canceling the mistaken usage of trigger card 15 by the cardholder may be provided.
- An example may be the entry of a code within a certain time limit after using the trigger card 15, such as within thirty seconds after usage. This additional feature would not delay the response of the trigger computer 41 unduly, but would allow the cardholder some ability to recover from the mistaken use of trigger card 15.
- the notification procedure preferably requires that trigger computer 41 be connected to an external network 43 for automated communication to the cardholder and any other listed parties. For example, trigger computer 41 could send an email notification to the cardholder.
- an email may be sent to the card holder's spouse, children, attorney, company, security service, or any other entity that the card holder would want notified of the use of the trigger card 15.
- an automated telephone message may be sent to a list of numbers selected by the cardholder. The message may be computer generated, including the date, time, and location of the unauthorized use of trigger card 15.
- any automated communication may include a personal message pre-recorded by the card holder, such as an introduction to the email, or a voice message added to the telephone notification.
- the notification may include notification of the proper authorities or an appropriate law-enforcement agency based upon the location of the unauthorized use.
- the card ordering procedure includes immediate ordering and delivery of replacement financial cards 13 for all financial cards 13 that were cancelled by system 34 and issuance of a new trigger card 15.
- Delivery may be automatic to a home address, a business address, or a "safe" address, such as a bank or post office box, or to a temporary address if the cardholder is away from home, or delivery of the replacement financial cards 13 may be deferred until the cardholder has replied to the notification. While home delivery tends to be safest, this may be of no help when the cardholder is traveling. Therefore, home delivery may be initiated immediately, or delivery may be delayed pending confirmation of the cardholder's location. This confirmation may be automated by email, text messaging, web page entry, or telephone, for example. Alternatively, the confirmation may be handled by personal communication, such as over the telephone or in person at a financial institution, to ensure that no continuing fraud is perpetrated by the theft of a communication device along with trigger card 15.
- one method for associating financial cards 13 with trigger card 15 is to provide a specially adapted card reader 35 inside a financial institution, such as a bank lobby.
- the cardholder simply swipes trigger card 15 in the special card reader 35 and initiates a signup menu instead of a transaction menu.
- the cardholder then swipes any financial cards 13 that need to be associated with the trigger card 15. This procedure might require a code to prevent a thief from swiping various financial cards 13 in an attempt to find a trigger card 15.
- the present invention may carried out by using a trigger number, as opposed to an actual trigger card.
- a trigger number is placed in with a group or list of actual valid financial card numbers stored in a list or electronic database. This embodiment protects databases of credit card numbers from being stolen and used electronically, even before the actual credit cards have been created.
- one or more selected trigger numbers which are not valid numbers for a financial cards and which cannot be validated into valid financial cards, are placed in one or more lists or databases of numbers which can be used as or to create valid financial cards. If a list or database containing a trigger number is accessed, copied, or otherwise used by unauthorized means, the trigger number activates a system or process that cancels all of the valid numbers in the list or database and makes them inoperable. In particular, any attempted use of a trigger number as a financial card number, cancels and/or invalidates all of the numbers or financial cards associated with that list or database, initiates response, cancellation, and notification procedures, such as those explained above, and records and tracks the location of the computer from which the unauthorized access initiated.
- This system prevents and deters unauthorized users from hacking into and stealing credit cards numbers from electronic databases, both before the numbers can be used to create valid financial cards and after the cards have been created.
Abstract
Description
Claims
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0625721A GB2430295A (en) | 2004-08-06 | 2005-08-05 | Apparatus and method for preventing credit card fraud |
CA002571662A CA2571662A1 (en) | 2004-08-06 | 2005-08-05 | Apparatus and method for preventing credit card fraud |
JP2007524979A JP2008509479A (en) | 2004-08-06 | 2005-08-05 | Apparatus and method for preventing unauthorized use of credit card |
EP05778782A EP1784758A4 (en) | 2004-08-06 | 2005-08-05 | Apparatus and method for preventing credit card fraud |
AU2005271453A AU2005271453A1 (en) | 2004-08-06 | 2005-08-05 | Apparatus and method for preventing credit card fraud |
US11/253,180 US20060032909A1 (en) | 2004-08-06 | 2005-10-18 | System and method for providing database security measures |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/913,636 | 2004-08-06 | ||
US10/913,636 US6955294B1 (en) | 2004-08-06 | 2004-08-06 | Apparatus and method for preventing credit card fraud |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006017648A1 true WO2006017648A1 (en) | 2006-02-16 |
Family
ID=35066038
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2005/027708 WO2006017648A1 (en) | 2004-08-06 | 2005-08-05 | Apparatus and method for preventing credit card fraud |
Country Status (9)
Country | Link |
---|---|
US (2) | US6955294B1 (en) |
EP (1) | EP1784758A4 (en) |
JP (1) | JP2008509479A (en) |
KR (1) | KR20070038091A (en) |
AU (1) | AU2005271453A1 (en) |
CA (1) | CA2571662A1 (en) |
GB (1) | GB2430295A (en) |
WO (1) | WO2006017648A1 (en) |
ZA (1) | ZA200610807B (en) |
Families Citing this family (92)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6163771A (en) * | 1997-08-28 | 2000-12-19 | Walker Digital, Llc | Method and device for generating a single-use financial account number |
US7805376B2 (en) | 2002-06-14 | 2010-09-28 | American Express Travel Related Services Company, Inc. | Methods and apparatus for facilitating a transaction |
US6901387B2 (en) | 2001-12-07 | 2005-05-31 | General Electric Capital Financial | Electronic purchasing method and apparatus for performing the same |
US7577585B2 (en) | 2001-12-07 | 2009-08-18 | American Express Travel Related Services Company, Inc. | Method and system for completing transactions involving partial shipments |
US9400589B1 (en) | 2002-05-30 | 2016-07-26 | Consumerinfo.Com, Inc. | Circular rotational interface for display of consumer credit information |
US9710852B1 (en) | 2002-05-30 | 2017-07-18 | Consumerinfo.Com, Inc. | Credit report timeline user interface |
US7451113B1 (en) * | 2003-03-21 | 2008-11-11 | Mighty Net, Inc. | Card management system and method |
US7413112B2 (en) * | 2004-03-16 | 2008-08-19 | American Express Travel Related Services Company, Inc. | Method and system for manual authorization |
US8732004B1 (en) | 2004-09-22 | 2014-05-20 | Experian Information Solutions, Inc. | Automated analysis of data to generate prospect notifications based on trigger events |
US8063781B2 (en) * | 2005-07-06 | 2011-11-22 | First Data Corporation | Secure RFID packaging |
US20070043577A1 (en) * | 2005-08-16 | 2007-02-22 | Sheldon Kasower | Apparatus and method of enabling a victim of identity theft to resolve and prevent fraud |
US20080228541A1 (en) * | 2005-10-24 | 2008-09-18 | Megdal Myles G | Using commercial share of wallet in private equity investments |
US20080033852A1 (en) * | 2005-10-24 | 2008-02-07 | Megdal Myles G | Computer-based modeling of spending behaviors of entities |
US20080221973A1 (en) * | 2005-10-24 | 2008-09-11 | Megdal Myles G | Using commercial share of wallet to rate investments |
US20080221971A1 (en) * | 2005-10-24 | 2008-09-11 | Megdal Myles G | Using commercial share of wallet to rate business prospects |
US20080228540A1 (en) * | 2005-10-24 | 2008-09-18 | Megdal Myles G | Using commercial share of wallet to compile marketing company lists |
US8036979B1 (en) | 2006-10-05 | 2011-10-11 | Experian Information Solutions, Inc. | System and method for generating a finance attribute from tradeline data |
US20080265017A1 (en) * | 2006-10-24 | 2008-10-30 | West Sammie J | Credit card and security system |
US7606766B2 (en) * | 2006-12-21 | 2009-10-20 | American Express Travel Related Services Company, Inc. | Computer system and computer-implemented method for selecting invoice settlement options |
US8606666B1 (en) | 2007-01-31 | 2013-12-10 | Experian Information Solutions, Inc. | System and method for providing an aggregation tool |
US8606626B1 (en) | 2007-01-31 | 2013-12-10 | Experian Information Solutions, Inc. | Systems and methods for providing a direct marketing campaign planning environment |
US8285656B1 (en) | 2007-03-30 | 2012-10-09 | Consumerinfo.Com, Inc. | Systems and methods for data verification |
WO2008147918A2 (en) | 2007-05-25 | 2008-12-04 | Experian Information Solutions, Inc. | System and method for automated detection of never-pay data sets |
WO2009026450A1 (en) * | 2007-08-21 | 2009-02-26 | Daniel Jonathan Baron | Methods and systems for preauthorizing venue-based credit accounts |
US8127986B1 (en) | 2007-12-14 | 2012-03-06 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US9990674B1 (en) * | 2007-12-14 | 2018-06-05 | Consumerinfo.Com, Inc. | Card registry systems and methods |
CN101525958B (en) * | 2008-03-06 | 2012-09-26 | 旭丽电子(广州)有限公司 | Anti-theft lock |
US8312033B1 (en) | 2008-06-26 | 2012-11-13 | Experian Marketing Solutions, Inc. | Systems and methods for providing an integrated identifier |
US9256904B1 (en) | 2008-08-14 | 2016-02-09 | Experian Information Solutions, Inc. | Multi-bureau credit file freeze and unfreeze |
US8287640B2 (en) | 2008-09-29 | 2012-10-16 | Clearwater International, Llc | Stable foamed cement slurry compositions and methods for making and using same |
US8060424B2 (en) | 2008-11-05 | 2011-11-15 | Consumerinfo.Com, Inc. | On-line method and system for monitoring and reporting unused available credit |
US20100264226A1 (en) * | 2009-02-19 | 2010-10-21 | Mastercard International, Incorporated | Payment card having acceptance attributes on a single side |
US9652802B1 (en) | 2010-03-24 | 2017-05-16 | Consumerinfo.Com, Inc. | Indirect monitoring and reporting of a user's credit data |
US20110238465A1 (en) * | 2010-03-25 | 2011-09-29 | Leesa Shapiro Willet | System for Controlling Card Transactions |
US8931058B2 (en) | 2010-07-01 | 2015-01-06 | Experian Information Solutions, Inc. | Systems and methods for permission arbitrated transaction services |
US8744956B1 (en) | 2010-07-01 | 2014-06-03 | Experian Information Solutions, Inc. | Systems and methods for permission arbitrated transaction services |
US8930262B1 (en) | 2010-11-02 | 2015-01-06 | Experian Technology Ltd. | Systems and methods of assisted strategy design |
US9147042B1 (en) | 2010-11-22 | 2015-09-29 | Experian Information Solutions, Inc. | Systems and methods for data verification |
EP2676197B1 (en) | 2011-02-18 | 2018-11-28 | CSidentity Corporation | System and methods for identifying compromised personally identifiable information on the internet |
US9558519B1 (en) | 2011-04-29 | 2017-01-31 | Consumerinfo.Com, Inc. | Exposing reporting cycle information |
US9665854B1 (en) | 2011-06-16 | 2017-05-30 | Consumerinfo.Com, Inc. | Authentication alerts |
US9483606B1 (en) | 2011-07-08 | 2016-11-01 | Consumerinfo.Com, Inc. | Lifescore |
US9106691B1 (en) | 2011-09-16 | 2015-08-11 | Consumerinfo.Com, Inc. | Systems and methods of identity protection and management |
US8738516B1 (en) | 2011-10-13 | 2014-05-27 | Consumerinfo.Com, Inc. | Debt services candidate locator |
US11030562B1 (en) | 2011-10-31 | 2021-06-08 | Consumerinfo.Com, Inc. | Pre-data breach monitoring |
US9853959B1 (en) | 2012-05-07 | 2017-12-26 | Consumerinfo.Com, Inc. | Storage and maintenance of personal data |
US9654541B1 (en) | 2012-11-12 | 2017-05-16 | Consumerinfo.Com, Inc. | Aggregating user web browsing data |
US9916621B1 (en) | 2012-11-30 | 2018-03-13 | Consumerinfo.Com, Inc. | Presentation of credit score factors |
US10255598B1 (en) | 2012-12-06 | 2019-04-09 | Consumerinfo.Com, Inc. | Credit card account data extraction |
US9697263B1 (en) | 2013-03-04 | 2017-07-04 | Experian Information Solutions, Inc. | Consumer data request fulfillment system |
US9870589B1 (en) | 2013-03-14 | 2018-01-16 | Consumerinfo.Com, Inc. | Credit utilization tracking and reporting |
US10102570B1 (en) | 2013-03-14 | 2018-10-16 | Consumerinfo.Com, Inc. | Account vulnerability alerts |
US8812387B1 (en) | 2013-03-14 | 2014-08-19 | Csidentity Corporation | System and method for identifying related credit inquiries |
US9406085B1 (en) | 2013-03-14 | 2016-08-02 | Consumerinfo.Com, Inc. | System and methods for credit dispute processing, resolution, and reporting |
US10664936B2 (en) | 2013-03-15 | 2020-05-26 | Csidentity Corporation | Authentication systems and methods for on-demand products |
US9633322B1 (en) | 2013-03-15 | 2017-04-25 | Consumerinfo.Com, Inc. | Adjustment of knowledge-based authentication |
US10685398B1 (en) | 2013-04-23 | 2020-06-16 | Consumerinfo.Com, Inc. | Presenting credit score information |
US9721147B1 (en) | 2013-05-23 | 2017-08-01 | Consumerinfo.Com, Inc. | Digital identity |
US9443268B1 (en) | 2013-08-16 | 2016-09-13 | Consumerinfo.Com, Inc. | Bill payment and reporting |
US10586234B2 (en) * | 2013-11-13 | 2020-03-10 | Mastercard International Incorporated | System and method for detecting fraudulent network events |
US10325314B1 (en) | 2013-11-15 | 2019-06-18 | Consumerinfo.Com, Inc. | Payment reporting systems |
US10102536B1 (en) | 2013-11-15 | 2018-10-16 | Experian Information Solutions, Inc. | Micro-geographic aggregation system |
US9477737B1 (en) | 2013-11-20 | 2016-10-25 | Consumerinfo.Com, Inc. | Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules |
US9529851B1 (en) | 2013-12-02 | 2016-12-27 | Experian Information Solutions, Inc. | Server architecture for electronic data quality processing |
US20150161611A1 (en) * | 2013-12-10 | 2015-06-11 | Sas Institute Inc. | Systems and Methods for Self-Similarity Measure |
US10262362B1 (en) | 2014-02-14 | 2019-04-16 | Experian Information Solutions, Inc. | Automatic generation of code for attributes |
USD760256S1 (en) | 2014-03-25 | 2016-06-28 | Consumerinfo.Com, Inc. | Display screen or portion thereof with graphical user interface |
USD759690S1 (en) | 2014-03-25 | 2016-06-21 | Consumerinfo.Com, Inc. | Display screen or portion thereof with graphical user interface |
USD759689S1 (en) | 2014-03-25 | 2016-06-21 | Consumerinfo.Com, Inc. | Display screen or portion thereof with graphical user interface |
US9892457B1 (en) | 2014-04-16 | 2018-02-13 | Consumerinfo.Com, Inc. | Providing credit data in search results |
US10373240B1 (en) | 2014-04-25 | 2019-08-06 | Csidentity Corporation | Systems, methods and computer-program products for eligibility verification |
US10339527B1 (en) | 2014-10-31 | 2019-07-02 | Experian Information Solutions, Inc. | System and architecture for electronic fraud detection |
US10242019B1 (en) | 2014-12-19 | 2019-03-26 | Experian Information Solutions, Inc. | User behavior segmentation using latent topic detection |
CN106302083B (en) * | 2015-05-14 | 2020-11-03 | 钉钉控股(开曼)有限公司 | Instant messaging method and server |
US11151468B1 (en) | 2015-07-02 | 2021-10-19 | Experian Information Solutions, Inc. | Behavior analysis using distributed representations of event data |
SG10201508034PA (en) * | 2015-09-28 | 2017-04-27 | Mastercard Asia Pacific Pte Ltd | Device For Facilitating Identification Of A Fraudulent Payment Card |
US10757154B1 (en) | 2015-11-24 | 2020-08-25 | Experian Information Solutions, Inc. | Real-time event-based notification system |
US11227001B2 (en) | 2017-01-31 | 2022-01-18 | Experian Information Solutions, Inc. | Massive scale heterogeneous data ingestion and user resolution |
US10735183B1 (en) | 2017-06-30 | 2020-08-04 | Experian Information Solutions, Inc. | Symmetric encryption for private smart contracts among multiple parties in a private peer-to-peer network |
US10699028B1 (en) | 2017-09-28 | 2020-06-30 | Csidentity Corporation | Identity security architecture systems and methods |
US10896472B1 (en) | 2017-11-14 | 2021-01-19 | Csidentity Corporation | Security and identity verification system and architecture |
US10911234B2 (en) | 2018-06-22 | 2021-02-02 | Experian Information Solutions, Inc. | System and method for a token gateway environment |
US11265324B2 (en) | 2018-09-05 | 2022-03-01 | Consumerinfo.Com, Inc. | User permissions for access to secure data at third-party |
US10963434B1 (en) | 2018-09-07 | 2021-03-30 | Experian Information Solutions, Inc. | Data architecture for supporting multiple search models |
US11315179B1 (en) | 2018-11-16 | 2022-04-26 | Consumerinfo.Com, Inc. | Methods and apparatuses for customized card recommendations |
US11620403B2 (en) | 2019-01-11 | 2023-04-04 | Experian Information Solutions, Inc. | Systems and methods for secure data aggregation and computation |
US11238656B1 (en) | 2019-02-22 | 2022-02-01 | Consumerinfo.Com, Inc. | System and method for an augmented reality experience via an artificial intelligence bot |
US11941065B1 (en) | 2019-09-13 | 2024-03-26 | Experian Information Solutions, Inc. | Single identifier platform for storing entity data |
US11488214B2 (en) * | 2019-10-03 | 2022-11-01 | Capital One Services, Llc | High authentication layer to determine a person's location when considering sending a secure object |
US11438370B2 (en) | 2020-07-16 | 2022-09-06 | Capital One Services, Llc | Email security platform |
US11880377B1 (en) | 2021-03-26 | 2024-01-23 | Experian Information Solutions, Inc. | Systems and methods for entity resolution |
US20230252476A1 (en) * | 2022-02-10 | 2023-08-10 | Capital One Services, Llc | Computationally efficient theft detection |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6494367B1 (en) * | 1999-10-15 | 2002-12-17 | Ajit Kumar Zacharias | Secure multi-application card system |
US20030001005A1 (en) * | 1998-10-28 | 2003-01-02 | Mastercard International Incorporated | System and method for using a prepaid card |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6068184A (en) * | 1998-04-27 | 2000-05-30 | Barnett; Donald A. | Security card and system for use thereof |
US6442286B1 (en) * | 1998-12-22 | 2002-08-27 | Stmicroelectronics, Inc. | High security flash memory and method |
JP4273557B2 (en) * | 1999-02-23 | 2009-06-03 | 株式会社日立製作所 | ID management method |
JP2001338248A (en) * | 2000-05-26 | 2001-12-07 | Nec Corp | Card information certifying system |
JP2002063530A (en) * | 2000-08-23 | 2002-02-28 | Hitachi Ltd | Card management system and processing method of card information |
US20020047049A1 (en) * | 2000-09-13 | 2002-04-25 | David Perron | Authentication device with self-personalization capabilities |
CA2320514A1 (en) * | 2000-09-19 | 2002-03-19 | Payplease.Com | System for and method of effecting payments online and offline |
US6400270B1 (en) * | 2000-11-02 | 2002-06-04 | Robert Person | Wallet protection system |
US20020173994A1 (en) * | 2001-05-21 | 2002-11-21 | Ferguson Joseph M. | Method and apparatus for insuring an insured from identity theft peril and identity reclamation and credit restoration |
US20030115467A1 (en) * | 2001-12-19 | 2003-06-19 | Aull Kenneth W. | Public key infrastructure token issuance and binding |
US20030216997A1 (en) * | 2002-05-16 | 2003-11-20 | Cohen Morris E. | Financial cards |
JP3924200B2 (en) * | 2002-05-21 | 2007-06-06 | 東日本旅客鉄道株式会社 | IC card issuance system |
US20040007618A1 (en) * | 2002-07-10 | 2004-01-15 | Scott Oram | Prepaid credit card method |
US20040098351A1 (en) * | 2002-11-15 | 2004-05-20 | Ibgc Corporation | Interest bearing gift card and related methods and systems |
-
2004
- 2004-08-06 US US10/913,636 patent/US6955294B1/en active Active
-
2005
- 2005-08-05 GB GB0625721A patent/GB2430295A/en active Pending
- 2005-08-05 AU AU2005271453A patent/AU2005271453A1/en not_active Abandoned
- 2005-08-05 KR KR1020077000089A patent/KR20070038091A/en not_active Application Discontinuation
- 2005-08-05 CA CA002571662A patent/CA2571662A1/en not_active Abandoned
- 2005-08-05 EP EP05778782A patent/EP1784758A4/en not_active Withdrawn
- 2005-08-05 WO PCT/US2005/027708 patent/WO2006017648A1/en active Application Filing
- 2005-08-05 JP JP2007524979A patent/JP2008509479A/en active Pending
- 2005-10-18 US US11/253,180 patent/US20060032909A1/en not_active Abandoned
-
2006
- 2006-12-21 ZA ZA200610807A patent/ZA200610807B/en unknown
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030001005A1 (en) * | 1998-10-28 | 2003-01-02 | Mastercard International Incorporated | System and method for using a prepaid card |
US6494367B1 (en) * | 1999-10-15 | 2002-12-17 | Ajit Kumar Zacharias | Secure multi-application card system |
Non-Patent Citations (1)
Title |
---|
See also references of EP1784758A4 * |
Also Published As
Publication number | Publication date |
---|---|
AU2005271453A1 (en) | 2006-02-16 |
JP2008509479A (en) | 2008-03-27 |
CA2571662A1 (en) | 2006-02-16 |
ZA200610807B (en) | 2008-06-25 |
US20060032909A1 (en) | 2006-02-16 |
GB0625721D0 (en) | 2007-02-07 |
EP1784758A1 (en) | 2007-05-16 |
US6955294B1 (en) | 2005-10-18 |
GB2430295A (en) | 2007-03-21 |
EP1784758A4 (en) | 2010-01-06 |
KR20070038091A (en) | 2007-04-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6955294B1 (en) | Apparatus and method for preventing credit card fraud | |
US6068184A (en) | Security card and system for use thereof | |
US6422462B1 (en) | Apparatus and methods for improved credit cards and credit card transactions | |
US11379816B2 (en) | Secure electronic payment system | |
US20030216997A1 (en) | Financial cards | |
US20070073619A1 (en) | Biometric anti-fraud plastic card | |
Levi et al. | The prevention of cheque and credit card fraud | |
US20010034717A1 (en) | Fraud resistant credit card using encryption, encrypted cards on computing devices | |
US20020032657A1 (en) | Credit card duplication prevention system and method | |
US20040177046A1 (en) | Credit card protection system | |
US20060206350A1 (en) | Security method and apparatus for preventing credit card fraud | |
WO1996017316A1 (en) | Electronic money recovering system | |
Sivakumar et al. | Fraud detection in credit card transactions: classification, risks and prevention techniques | |
Arthur Williams | Credit card fraud in Trinidad and Tobago | |
RU2816675C2 (en) | System and method for protection against theft of funds during contact and contactless payment from bank card | |
Warwick | Reducing Crime by Eliminating Cash. | |
JP2932306B2 (en) | Automatic cash transaction method | |
WO1996007150A1 (en) | A method and apparatus for verifying a transaction | |
Buresh | Is Identity Theft Using Skimmers a Serious Threat or a Minor Inconvenience? | |
WO2009157003A1 (en) | A system and method for preventing misuse of stolen, lost, duplicated, forged and counterfeited credit card/debit card | |
Joshi | Black Card Forensics | |
Mashinskaya | URGENT PROBLEMS RELATED TO THE USAGE OF BANK CARDS | |
Preiss | The consequences of anonymous access to the financial payments system | |
KR200287479Y1 (en) | Magnetic card improved preservation function | |
JPH11203357A (en) | Card and card system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 2006/10807 Country of ref document: ZA |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2571662 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2005271453 Country of ref document: AU Ref document number: 2005778782 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 0625721.6 Country of ref document: GB Ref document number: 3892/KOLNP/2006 Country of ref document: IN Ref document number: 0625721 Country of ref document: GB |
|
ENP | Entry into the national phase |
Ref document number: 2007524979 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020077000089 Country of ref document: KR |
|
ENP | Entry into the national phase |
Ref document number: 2005271453 Country of ref document: AU Date of ref document: 20050805 Kind code of ref document: A |
|
WWP | Wipo information: published in national office |
Ref document number: 2005271453 Country of ref document: AU |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWP | Wipo information: published in national office |
Ref document number: 1020077000089 Country of ref document: KR |
|
WWP | Wipo information: published in national office |
Ref document number: 2005778782 Country of ref document: EP |