US20060032909A1 - System and method for providing database security measures - Google Patents
System and method for providing database security measures Download PDFInfo
- Publication number
- US20060032909A1 US20060032909A1 US11/253,180 US25318005A US2006032909A1 US 20060032909 A1 US20060032909 A1 US 20060032909A1 US 25318005 A US25318005 A US 25318005A US 2006032909 A1 US2006032909 A1 US 2006032909A1
- Authority
- US
- United States
- Prior art keywords
- trigger
- card
- account
- database system
- electronic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation or account maintenance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K5/00—Methods or arrangements for verifying the correctness of markings on a record carrier; Column detection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/03—Credit; Loans; Processing thereof
Definitions
- the present invention relates generally to the prevention of credit card fraud and more particularly, to a system and method for providing database security measures.
- credit card fraud is a major problem in the credit card industry. Such fraud is achieved in many ways, one method being the theft of a cardholder's wallet or purse and the subsequent unauthorized usage of the credit cards and debit cards stored therein. Often, stolen credit cards are used within the first few hours of the theft. Most credit card fraud is detected before the cardholder knows there is a problem. Adding to this problem is the fact that most cardholders carry more than one credit card. Often, the cardholder does not even know how many or which cards he is carrying, and most cardholders do not keep a separate list of all of their credit and debit cards. Credit card companies often end up paying for the majority of unauthorized usage. This reduces the credit card companies' profits and leads to increased fees for cardholders.
- a trigger card that looks and feels like a credit card and that is carried by a cardholder along with his other credit and debit cards. Although the trigger card looks and feels like a regular credit card, any attempted use of the trigger card immediately signals the theft, fraud, or unauthorized use of the card and sets a variety of systems into action.
- the first system triggered by use of the trigger card is one that immediately cancels, some, all, or any predetermined number of credit and debit cards stored on a list of cards provided by the cardholder.
- a second system, which is optional, that is triggered by the use of the trigger card is a law-enforcement system that gathers information about the unauthorized user.
- This second system may include having the clerk request further identification in the form of a state-issued identification card or biometric data, such as a fingerprint.
- a third system triggered by the use of the trigger card is one that notifies various agencies, personnel, or third parties who may need to know of the theft, fraud, or unauthorized use. For example, the notification might be sent to state and federal agencies, credit card issuers, credit reporting or monitoring companies, banks, relatives, and to personal email or telephone numbers of the cardholder, among other possibilities.
- a fourth system that is triggered by the use of the trigger card is one that immediately orders and delivers new cards to the cardholder at a pre-designated address by expedited delivery. This pre-designated address can be the cardholder's home address, his business address, or a “safe” address, such as a bank or post office box, or to a temporary address if the cardholder is away from home.
- the present invention provides significant advantages, including: (1) immediate response to fraud notification in the form of card cancellation, notification, and delivery of new cards; (2) increased reporting of credit card theft; (3) simplified “back-to-normal” status for cardholders; (4) increased collection of data about fraudulent users; (5) reduced false positive notifications of fraud or theft; and (6) significantly reduced losses to credit card issuers and retail entities due to credit card fraud.
- FIG. 1 is a schematic of a wallet storing financial cards and a trigger card according to the present invention
- FIG. 2 is a schematic of a trigger card according to the present invention.
- FIG. 4 depicts a high level flowchart illustrating security measures of the present invention.
- the present invention represents the discovery that a trigger card that looks and feels like a credit card, but which is not a credit card, may be placed among actual credit and debit cards in a cardholders wallet or purse to prevent credit card fraud.
- the trigger card is stored with the cardholder's other financial cards, but not used by the cardholder. Any attempt to use the trigger card as a credit card is a clear indication of theft or fraud; thereby triggering a range of possible responses tailored to reduce fraud.
- the trigger card and associated system for use will result in more limited fraud exposure and act as a fraud deterrent.
- wallet 11 also represents purses and other devices, including pouches, money clips, checkbook, pockets, drawers, file cabinet, furniture, automobiles, and safes, used by cardholders to carry and store credit, debit, and other financial institution cards.
- Financial cards 13 may be credit cards, debit cards, debit cards, automatic teller machine cards, cash value cards, voucher cards, or any card used for financial transactions.
- financial cards 13 include graphical designs, logos of banks, logos of credit card institutions, such as VISA and MASTERCARD, identification names, identification numbers, code numbers, expiration dates, and one or more magnetic strips or other digital memory means for storing digital data.
- a trigger card 15 is carried or stored randomly among financial cards 13 .
- Trigger card 15 looks and feels like a typical financial card, in that trigger card 15 preferably includes graphics, logos of banks, logos of popular credit card institutions, such as VISA and MASTERCARD, identification names, identification numbers, code numbers, expiration dates, and one or more magnetic strips or other digital memory means for storing digital data; however, trigger card 15 is not a financial card.
- Trigger card 15 is preferably manufactured by the same means as financial cards 13 .
- trigger card 15 The purpose of trigger card 15 is to fool an unauthorized user into believing that trigger card 15 is a valid credit card. Thus, it is preferred that trigger card 15 not be identical to any other financial card 13 in wallet 11 , but should look as much like a regular credit card as every other financial card 13 in wallet 11 . The importance of this is two fold: first, the user should be able to easily avoid using trigger card 15 ; second, most cardholders do not have two identical cards from the same issuer, so the pair would stand out as a possible trigger card 15 .
- trigger card 15 may include features or indicia that entice a thief or an unauthorized user to attempt to use trigger card 15 before attempting to use any other financial card 13 . If a thief can be enticed into using trigger card 15 first, then, as explained below, as soon as trigger card 15 is used, the cardholder's valid financial cards 13 are cancelled. This prevents any unauthorized or fraudulent transactions on valid financial cards 13 .
- the front and back of a preferred embodiment of trigger card 15 is shown.
- the front of trigger card 15 preferably includes typical indicia of a credit or debit card, including a bank logo 17 , a 16 -digit card number 19 , an expiration date 21 , a security label 23 , such as a hologram, the cardholder's name 25 , a credit card institution logo 27 , such as VISA or MASTERCARD, and other marketing images. It is important that these indicia look authentic.
- the back of trigger card 15 is shown in FIG. 2B .
- trigger card 15 In addition to the need for stealth, as more fully explained below, magnetic strip 29 and card number 19 are utilized by trigger card 15 and the associated credit card fraud prevention system of the present invention to communicate that trigger card 15 has been used. For the foregoing reasons, it is preferred that trigger card 15 be manufactured with the same materials and in the same fashion as valid financial cards 13 .
- trigger card 15 Upon transfer of information from magnetic strip 29 of financial card 13 to card reader 35 , either by manual entry of card number 19 , expiration date 21 , and/or other data; or by swiping magnetic strip 29 through card reader 35 ; data about financial card 13 and the current transaction is transmitted to a network 37 .
- trigger card 15 comprising any type of digital storage means, including but not limited to a miniature transponder programmable means of storing digital trigger data or an RF chip that provides for wireless transmission of digital trigger data.
- trigger card 15 if trigger card 15 is used instead of financial card 13 , card reader 35 transmits selected data stored on magnetic strip 29 over network 37 to a trigger computer 41 .
- Trigger computer 41 may be located at issuing institution 39 or may be located at a remote location. It will be appreciated that the data from trigger card 15 may be sent from card reader 35 through network 37 to trigger computer 41 , from issuing institution 39 through network 37 to trigger computer 41 , from institution 39 directly to trigger computer 41 , or directly from card reader 35 directly to trigger computer 41 . Variations in the order or direction of transmission of the data from trigger card 15 may be easily controlled by appropriate programming on system 34 .
- trigger computer 41 is programmed to initiate certain anti-fraud procedures based upon the receipt of data indicating an attempted use of trigger card 15 .
- the procedures initiated by trigger computer 41 include a data acquisition procedure, a card cancellation procedure, a notification procedure, and a card ordering procedure.
- the cancellation procedure includes the immediate and automatic canceling of all financial cards 13 that have been previously chosen and listed by the cardholder to be cancelled by system 34 in the event trigger card 15 is ever used. Alternatively, the spending limits on the associated financial cards 13 may be severely reduced to allow tracing of the fraudulent use and to allow continued limited use in the event of an accidental use of the trigger card 15 .
- the data acquisition procedure occurs immediately after trigger card 15 is swiped at a card reader 35 or after the data from trigger card 15 is submitted in an online transaction.
- the method and location of use is recorded and transmitted to trigger computer 41 , or other computers dedicated to the carrying out of the various procedures of the invention.
- the data acquisition procedure may be enhanced in several ways upon the use of trigger card 15 , such as by trigger computer 41 informing card reader 35 that an official identification card (ID) is required to continue with the transaction.
- Trigger card 15 and/or magnetic strip 29 may include certain biometric data about the cardholder, such as fingerprint, retinal scan, facial scan, palm print, etc.
- trigger computer 41 may transmit a request that the user of trigger card 15 submit such information. As such requests for biometric data become more commonplace, such requests may not necessarily alarm a thief that trigger card 15 has been used.
- the notification procedure preferably requires that trigger computer 41 be connected to an external network 43 for automated communication to the cardholder and any other listed parties.
- trigger computer 41 could send an email notification to the cardholder.
- an email may be sent to the card holder's spouse, children, attorney, company, security service, credit reporting institution, credit monitoring institution, credit card fraud monitoring division, or any other entity that the card holder would want notified of the use of the trigger card 15 .
- an automated telephone message may be sent to a list of numbers selected by the cardholder. The message may be computer generated, including the date, time, and location of the unauthorized use of trigger card 15 .
- any automated communication may include a personal message pre-recorded by the card holder, such as an introduction to the email, or a voice message added to the telephone notification.
- the notification may include notification of the proper authorities or an appropriate law-enforcement agency based upon the location of the unauthorized use.
- one method for associating financial cards 13 with trigger card 15 is to provide a specially adapted card reader 35 inside a financial institution, such as a bank lobby.
- the cardholder simply swipes trigger card 15 in the special card reader 35 and initiates a signup menu instead of a transaction menu.
- the cardholder then swipes any financial cards 13 that need to be associated with the trigger card 15 .
- This procedure might require a code to prevent a thief from swiping various financial cards 13 in an attempt to find a trigger card 15 .
- the specially adapted card reader 35 provides the cardholder the option of setting up a profile in which certain actions are automatically initiated upon the activation of trigger card 15 .
- the profile may include canceling some or all financial cards 13 , limiting the credit limits of some or all of financial cards 13 , ordering some or all replacement financial cards 13 , or other like actions.
- Flowchart 400 starts at step 402 with the activation of trigger card 15 .
- trigger card 15 may be activated by fraudulent means via card readers 35 located at point of sale counters and cash registers or via computers 36 using internet online transactions.
- step 402 after trigger card 15 is activated via fraudulent activity a digital trigger red flag is transmitted to monitoring institutions 40 .
- Monitoring institutions 40 may be any type of credit reporting company, credit monitoring company, or any other company associated with consumer credit. It is recalled from the above discussion that upon transfer of information from trigger card 15 to card readers 35 or computers 36 , data about trigger card 15 and the current transaction is transmitted to issuing institutions 39 . Step 402 occurs substantially concurrently as this transfer of information to issuing institutions 39 .
- step 412 the process ends at step 412 , in which monitoring institutions 40 transmits a report to issuing institutions 39 , thereby curtailing fraudulent activity, credit card fraud, and identity theft.
- Electronic database system 500 is adapted for use with one or more issuing institutions 39 .
- Electronic database system 500 is also adapted to communicate with a network or other communication access connections, via communications line 502 , as described above in connection with FIG. 3 .
- Database system 500 comprises one or more data blocks, such as for example, data block A 510 , data block B 520 , and data block C 530 .
- database system 500 is shown and described as having data block A 510 , data block B 520 , and data block C 530 , the present invention contemplates more, fewer, or any number of data blocks associated with database system 500 , according to the needs of issuing institutions 39 .
- Data block C 530 comprises account information and other personal consumer data associated with financial information stored at issuing institutions 39 .
- data block C 530 may comprise an account number, an account type, either a normal account or a trigger account, or any other financial or personal consumer data.
- data block A 510 and data block B 520 each comprise account information and other personal consumer data associated with financial information stored at issuing institutions 39 , similar to those shown and described in data block C 530 .
- the number of accounts and various account types associated with the data block A 510 , data block B 520 , and data block C 530 may be more, fewer, or any amount, according the needs of issuing institutions 39 .
- This embodiment of the present invention is in place to curtail identity theft from taking place at the issuing institution, or other electronic databases associated with financial data.
- FIG. 5 shows a trigger account associated with every ten accounts, represented by the account number and further represented by a trigger line associated with every ten accounts.
- a trigger line may be denoted via an alpha trigger indicator, a numeric trigger indicator, or even an alphanumeric trigger indicator.
- the trigger account does not have a valid financial value associated with it, but instead is designed for the purpose of fooling an unauthorized user into believing that the trigger account is a valid normal account.
- the trigger account and in particular the trigger indicator may further be encrypted into the account information and may be provided as a stealth means to denote the trigger account. These options are available for the trigger indicator to further insure that the trigger account is indistinguishable from a normal account to anyone but issuing institutions 39 .
- a trigger line may include an alphanumeric trigger indicator, such as for example, an X 1 following the account number, a special number or character placed in the address line, or any other like encrypted form.
- FIG. 5 shows a trigger line of data being associated with every ten accounts, the present invention contemplates a trigger line of data associated with every hundred accounts, every thousand accounts, every ten thousand accounts, every randomly generated number of accounts, or according to the needs of issuing institutions 39 .
- data block C 530 comprises 10,000 accounts.
- data block A 510 comprises 10,000 accounts and data block B 520 comprises 10,000 accounts.
- database system 500 comprises a total of 30,000 accounts. If database system 500 is accessed, hacked, copied, or otherwise compromised by unauthorized means, the trigger lines associated with each trigger account activate a system or process that automatically cancels, some, all, or any predetermined number of normal accounts in data block A 510 , data block B 520 , and data block C 530 , or otherwise makes them inoperable. For example, if trigger account 0010 of data block C 530 is compromised, a 20 block of both forward and reverse accounts is automatically cancelled and reissued.
- trigger account 0100 of data block C 530 is compromised, a 200 block of both forward and reverse accounts is automatically cancelled and reissued. Still additionally, if trigger account 1000 of data block C 530 is compromised, a 2000 block of both forward and reverse accounts is automatically cancelled and reissued. In essence, an unauthorized access to any of the data blocks within data system 500 may automatically cancel some, all, or any predetermined number of normal accounts associated with data block A 510 , data block B 520 , or data block C 530 .
- issuing institutions 39 may selectively cancel and reissue normal accounts based on the above system and process. Therefore, issuing institutions 39 are no longer required to cancel all existing normal accounts associated with database system 500 , upon the compromise of only a small amount of data or even an unknown amount of data. Instead, issuing institutions 39 can quickly respond to any unauthorized access, by only canceling the affected accounts, thereby providing less time for other unauthorized information to be used and to simultaneously minimize the inconvenience of a cancelled account to its financial customer.
- computer 36 comprises database 500 .
- database 500 may, prevent the unauthorized access to personal consumer accounts stored on a home or office computer.
- financial software associated with computer 36 provides for a trigger account associated with the valid normal financial accounts. If computer 36 is accessed, hacked, copied, or otherwise compromised by unauthorized means, the trigger lines associated with each trigger account activate a system or process that automatically cancels, some, all, or any predetermined number of normal accounts in database system 500 , or otherwise makes them inoperable.
- This embodiment of the present invention is in place to curtail identity theft from taking place at computer 36 , or other electronic databases associated with personal financial data.
- the present invention may be carried out by using a trigger number, as opposed to an actual trigger card.
- a trigger number is placed in with a group or list of actual valid financial card numbers stored in a list or electronic database. This embodiment protects databases of credit card numbers from being stolen and used electronically, even before the actual credit cards have been created.
- one or more selected trigger numbers which are not valid numbers for a financial cards and which cannot be validated into valid financial cards, are placed in one or more lists or databases of numbers which can be used as or to create valid financial cards. If a list or database containing a trigger number is accessed, copied, or otherwise used by unauthorized means, the trigger number activates a system or process that cancels, some, all, or any number of the valid numbers in the list or database and makes them inoperable.
- any attempted use of a trigger number as a financial card number cancels and/or invalidates all of the numbers or financial cards associated with that list or database, initiates response, cancellation, and notification procedures, such as those explained above, and records and tracks the location of the computer from which the unauthorized access initiated.
- This system prevents and deters unauthorized users from hacking into, and stealing credit cards numbers from electronic databases, both before the numbers can be used to create valid financial cards and after the cards have been created.
Abstract
A trigger card and system for preventing credit and debit card fraud is disclosed. The trigger card is adapted to be indistinguishable from typical credit cards and other cards issued by financial institutions. The system is adapted to receive signals when a standard card reader reads the trigger card. The system is further adapted to initiate an automated procedure to reduce fraud upon receipt of the signal indicating that the trigger card has been read by the card reader.
Description
- This application is a continuation-in-part (CIP) of U.S. patent application Ser. No. 10/913,636, filed on 6 Aug. 2004, titled “APPARATUS AND METHOD FOR PREVENTING CREDIT CARD FRAUD,” and this application claims priority to International Application No. PCT/US2005/027708, filed 5 Aug. 2005, titled “APPARATUS AND METHOD FOR PREVENTING CREDIT CARD FRAUD,” both of which are incorporated herein by reference as if fully set forth herein.
- 1. Field of the Invention
- The present invention relates generally to the prevention of credit card fraud and more particularly, to a system and method for providing database security measures.
- 2. Description of Related Art
- It is well known that credit card fraud is a major problem in the credit card industry. Such fraud is achieved in many ways, one method being the theft of a cardholder's wallet or purse and the subsequent unauthorized usage of the credit cards and debit cards stored therein. Often, stolen credit cards are used within the first few hours of the theft. Most credit card fraud is detected before the cardholder knows there is a problem. Adding to this problem is the fact that most cardholders carry more than one credit card. Often, the cardholder does not even know how many or which cards he is carrying, and most cardholders do not keep a separate list of all of their credit and debit cards. Credit card companies often end up paying for the majority of unauthorized usage. This reduces the credit card companies' profits and leads to increased fees for cardholders.
- Because cardholders often carry more than one credit or debit card, even if one credit card company notices irregular purchases on the credit card and restricts the use of that particular credit or debit card, the fraud continues because the thief simply switches to another credit card in the wallet or purse. Because the cards are usually issued by different companies, it is unlikely that the fraudulent use of one card will be reported to the issuing companies of the other cards. Thus, even if the theft is noticed by the cardholder, it is very difficult and time consuming to contact every financial institution that has issued a credit or debit card to the cardholder.
- These methods of restricting the use of credit cards are not without their problems. Computerized monitoring systems occasionally restrict the valid use of a credit card merely when the cardholder's purchasing habits change. For instance, it is possible for a generally frugal shopper to have their credit card locked by the issuing company when the cardholder goes on an unusual shopping spree or travels to an unusual location. The prospect of angering customers by such mistakes makes automated monitoring an undesirable alternative of fraud protection for most credit card companies.
- One proposed solution is for the cardholder to register all of his credit, debit, and other financial institution cards under a single credit card fraud protection plan. This allows the plan administrator to contact the credit card issuers in the event a fraud or theft is reported to the plan administrator by the cardholder. Although such credit card fraud protection plans offer a valuable service to the cardholder, it is still incumbent upon the cardholder to realize that a theft or fraud has taken place and to notify the plan administrator. Unfortunately, the theft is usually not realized until several hours or days have passed. This is true for many different reasons, including: the theft occurs while the cardholder is sleeping; the cards are stolen from the cardholders home while the cardholder is away or out of town; the thief only steals the cards, and not the entire wallet or purse; the cards are not actually stolen, but the numbers, expiration dates, and code numbers are copied for use over the phone or the Internet; and a wide variety of other reasons.
- Therefore, although there have been significant developments in the area of credit card fraud prevention, considerable shortcomings remain.
- There is a need for credit card fraud prevention system that provides an immediate and reliable indication that theft, fraud, or unauthorized use has occurred. There is also a need for a system which increases the arrest rate for credit card theft.
- Therefore, it is an object of the present invention to provide an apparatus and method for preventing and reducing credit card fraud that provides an immediate and reliable notification that theft, fraud, or unauthorized use of a credit, debit, or financial institution card has occurred, and that provides an immediate procedure for canceling and reordering credit cards. It is a further object to provide a system that provides an increase in the arrest rate for credit card theft.
- These objects are achieved by providing a trigger card that looks and feels like a credit card and that is carried by a cardholder along with his other credit and debit cards. Although the trigger card looks and feels like a regular credit card, any attempted use of the trigger card immediately signals the theft, fraud, or unauthorized use of the card and sets a variety of systems into action. The first system triggered by use of the trigger card is one that immediately cancels, some, all, or any predetermined number of credit and debit cards stored on a list of cards provided by the cardholder. A second system, which is optional, that is triggered by the use of the trigger card is a law-enforcement system that gathers information about the unauthorized user. This second system may include having the clerk request further identification in the form of a state-issued identification card or biometric data, such as a fingerprint. A third system triggered by the use of the trigger card is one that notifies various agencies, personnel, or third parties who may need to know of the theft, fraud, or unauthorized use. For example, the notification might be sent to state and federal agencies, credit card issuers, credit reporting or monitoring companies, banks, relatives, and to personal email or telephone numbers of the cardholder, among other possibilities. A fourth system that is triggered by the use of the trigger card is one that immediately orders and delivers new cards to the cardholder at a pre-designated address by expedited delivery. This pre-designated address can be the cardholder's home address, his business address, or a “safe” address, such as a bank or post office box, or to a temporary address if the cardholder is away from home.
- The present invention provides significant advantages, including: (1) immediate response to fraud notification in the form of card cancellation, notification, and delivery of new cards; (2) increased reporting of credit card theft; (3) simplified “back-to-normal” status for cardholders; (4) increased collection of data about fraudulent users; (5) reduced false positive notifications of fraud or theft; and (6) significantly reduced losses to credit card issuers and retail entities due to credit card fraud.
- Additional objectives, features, and advantages will be apparent in the written description that follows.
- The novel features believed characteristic of the invention are set forth in the appended claims. However, the invention itself, as well as, a preferred mode of use, and further objectives and advantages thereof, will best be understood by reference to the following detailed description when read in conjunction with the accompanying drawings, wherein:
-
FIG. 1 is a schematic of a wallet storing financial cards and a trigger card according to the present invention; -
FIG. 2 is a schematic of a trigger card according to the present invention; -
FIG. 3 is a diagram of a system triggered by the trigger card ofFIG. 2 according to the present invention; -
FIG. 4 depicts a high level flowchart illustrating security measures of the present invention; and -
FIG. 5 is a diagram of a database system according to the present invention. - The present invention represents the discovery that a trigger card that looks and feels like a credit card, but which is not a credit card, may be placed among actual credit and debit cards in a cardholders wallet or purse to prevent credit card fraud. The trigger card is stored with the cardholder's other financial cards, but not used by the cardholder. Any attempt to use the trigger card as a credit card is a clear indication of theft or fraud; thereby triggering a range of possible responses tailored to reduce fraud. The trigger card and associated system for use will result in more limited fraud exposure and act as a fraud deterrent.
- Referring to
FIG. 1 in the drawings, aconventional wallet 11 is shown withfinancial cards 13. It will be appreciated thatwallet 11 also represents purses and other devices, including pouches, money clips, checkbook, pockets, drawers, file cabinet, furniture, automobiles, and safes, used by cardholders to carry and store credit, debit, and other financial institution cards.Financial cards 13 may be credit cards, debit cards, debit cards, automatic teller machine cards, cash value cards, voucher cards, or any card used for financial transactions. As is typical,financial cards 13 include graphical designs, logos of banks, logos of credit card institutions, such as VISA and MASTERCARD, identification names, identification numbers, code numbers, expiration dates, and one or more magnetic strips or other digital memory means for storing digital data. - In accordance with the present invention, a
trigger card 15 is carried or stored randomly amongfinancial cards 13.Trigger card 15 looks and feels like a typical financial card, in thattrigger card 15 preferably includes graphics, logos of banks, logos of popular credit card institutions, such as VISA and MASTERCARD, identification names, identification numbers, code numbers, expiration dates, and one or more magnetic strips or other digital memory means for storing digital data; however,trigger card 15 is not a financial card.Trigger card 15 is preferably manufactured by the same means asfinancial cards 13. - The purpose of
trigger card 15 is to fool an unauthorized user into believing thattrigger card 15 is a valid credit card. Thus, it is preferred thattrigger card 15 not be identical to any otherfinancial card 13 inwallet 11, but should look as much like a regular credit card as every otherfinancial card 13 inwallet 11. The importance of this is two fold: first, the user should be able to easily avoid usingtrigger card 15; second, most cardholders do not have two identical cards from the same issuer, so the pair would stand out as apossible trigger card 15. Also, manyfinancial cards 13 offer varying levels of membership with varying issuer logos, card designs, and indicators, such as “Platinum Card,” “Gold Card,” or “Exclusive.” These options are available fortrigger card 15 to further insure that thetrigger card 15 is indistinguishable from afinancial card 13 to anyone but the cardholder. Indeed,trigger card 15 may include features or indicia that entice a thief or an unauthorized user to attempt to usetrigger card 15 before attempting to use any otherfinancial card 13. If a thief can be enticed into usingtrigger card 15 first, then, as explained below, as soon astrigger card 15 is used, the cardholder's validfinancial cards 13 are cancelled. This prevents any unauthorized or fraudulent transactions on validfinancial cards 13. - Referring now to
FIGS. 2A and 2B in the drawings, the front and back of a preferred embodiment oftrigger card 15 is shown. As shown inFIG. 2A , the front oftrigger card 15 preferably includes typical indicia of a credit or debit card, including abank logo 17, a 16-digit card number 19, anexpiration date 21, asecurity label 23, such as a hologram, the cardholder'sname 25, a creditcard institution logo 27, such as VISA or MASTERCARD, and other marketing images. It is important that these indicia look authentic. The back oftrigger card 15 is shown inFIG. 2B .Trigger card 15 preferably includes at least onemagnetic strip 29 or other means for storing digital trigger data, asignature block 31, and asecurity code 33. Althoughtrigger card 15 is shown and described as comprising a means for storing digital trigger data in the form ofmagnetic strip 29, the present invention contemplatestrigger card 15 comprising any type of digital storage means according to particular needs. For example,trigger card 15 may comprise a miniature transponder programmable means of storing digital trigger data rather thanmagnetic strip 15. In addition or as an alternative,trigger card 15 may comprise a Radio Frequency (RF) chip that provides for wireless transmission of digital trigger data rather thanmagnetic strip 29. Thus,trigger card 15 may include a contactless means of transmitting digital trigger data via the miniature transponder or a wireless means of transmitting digital trigger data via the RF chip oftrigger card 15. - In addition to the need for stealth, as more fully explained below,
magnetic strip 29 andcard number 19 are utilized bytrigger card 15 and the associated credit card fraud prevention system of the present invention to communicate thattrigger card 15 has been used. For the foregoing reasons, it is preferred thattrigger card 15 be manufactured with the same materials and in the same fashion as validfinancial cards 13. - It will be appreciated that
trigger cards 15 for use in the present invention undergo the same security and usage upgrades over time that regular financial cards undergo. As such,trigger card 15 may include security features that are currently known but not widely used, or may include security or usage features that are not yet known. In other words, triggercard 15 is easily adaptable to keep up with the latest trends in credit card security and usability. - Referring now to
FIG. 3 in the drawings, asystem 34 according to the present invention that utilizestrigger card 15 to prevent fraud is illustrated.System 34 includesconventional card readers 35 that are used to read, process, and display the status of financial transactions.Card readers 35 may be point of sale readers, as found at typical sales counters and cash registers, automatic teller machines, or any other type of transactional based means.System 34 further comprises one ormore computers 36 for use with internet online sales, as described in more detail below.Card readers 35 serve as an interface betweenfinancial cards 13 and a system of approval and payment. Upon transfer of information frommagnetic strip 29 offinancial card 13 tocard reader 35, either by manual entry ofcard number 19,expiration date 21, and/or other data; or by swipingmagnetic strip 29 throughcard reader 35; data aboutfinancial card 13 and the current transaction is transmitted to anetwork 37. It is recalled from the above discussion that althoughtrigger card 15 is shown and described as comprising a means for storing digital trigger data in the form ofmagnetic strip 29, the present invention contemplatestrigger card 15 comprising any type of digital storage means, including but not limited to a miniature transponder programmable means of storing digital trigger data or an RF chip that provides for wireless transmission of digital trigger data. -
Network 37 may be a computer network, telephone network, wireless network, the internet, or any other network suitable for transmitting data.Network 37 transmits the data to one ormore issuing institutions 39. In addition or as an alternative,network 37 may transmit data to one ormore monitoring institutions 40, as described in more detail below.Monitoring institutions 40 may be any type of credit reporting agency or other institutions or agencies. Issuinginstitutions 39 may be banks, financial services companies, or other institutions or agencies. Issuinginstitutions 39 evaluate the requested transaction and reply throughnetwork 37 tocard reader 35, either approving or denying the transaction. Forcard readers 35 located at point of sale counters and cash registers, the approval or denial by issuinginstitution 39 may be appropriately displayed on a display ofcard reader 35. - According to the present invention, if
trigger card 15 is used instead offinancial card 13,card reader 35 transmits selected data stored onmagnetic strip 29 overnetwork 37 to atrigger computer 41.Trigger computer 41 may be located at issuinginstitution 39 or may be located at a remote location. It will be appreciated that the data fromtrigger card 15 may be sent fromcard reader 35 throughnetwork 37 to triggercomputer 41, from issuinginstitution 39 throughnetwork 37 to triggercomputer 41, frominstitution 39 directly to triggercomputer 41, or directly fromcard reader 35 directly to triggercomputer 41. Variations in the order or direction of transmission of the data fromtrigger card 15 may be easily controlled by appropriate programming onsystem 34. In the preferred embodiment, triggercomputer 41 is programmed to initiate certain anti-fraud procedures based upon the receipt of data indicating an attempted use oftrigger card 15. - The procedures initiated by
trigger computer 41 include a data acquisition procedure, a card cancellation procedure, a notification procedure, and a card ordering procedure. The cancellation procedure includes the immediate and automatic canceling of allfinancial cards 13 that have been previously chosen and listed by the cardholder to be cancelled bysystem 34 in theevent trigger card 15 is ever used. Alternatively, the spending limits on the associatedfinancial cards 13 may be severely reduced to allow tracing of the fraudulent use and to allow continued limited use in the event of an accidental use of thetrigger card 15. - The data acquisition procedure occurs immediately after
trigger card 15 is swiped at acard reader 35 or after the data fromtrigger card 15 is submitted in an online transaction. In the preferred embodiment, the method and location of use is recorded and transmitted to triggercomputer 41, or other computers dedicated to the carrying out of the various procedures of the invention. The data acquisition procedure may be enhanced in several ways upon the use oftrigger card 15, such as bytrigger computer 41 informingcard reader 35 that an official identification card (ID) is required to continue with the transaction.Trigger card 15 and/ormagnetic strip 29 may include certain biometric data about the cardholder, such as fingerprint, retinal scan, facial scan, palm print, etc. As such,trigger computer 41 may transmit a request that the user oftrigger card 15 submit such information. As such requests for biometric data become more commonplace, such requests may not necessarily alarm a thief that triggercard 15 has been used. - It should be appreciated that in one embodiment of the invention the data acquisition procedure may allow for a transaction to occur at a low cost to increase the likelihood of capturing the thief. For instance, if
trigger card 15 is used at a location with poor data acquisition characteristics, such as a remote automatic teller machine with a low quality camera, a withdrawal may be allowed so that the thief may use thetrigger card 15, or any of the associatedfinancial cards 13, at a location with better data acquisition equipment, such as at a store with a finger print scanner. Such options may be at the issuer's discretion depending on the importance of catching every thief, or may be an option selected by the cardholder as an extra protection feature. - Because of the common usage of
financial cards 13, in one embodiment of the invention, a disable code for canceling the mistaken usage oftrigger card 15 by the cardholder may be provided. An example may be the entry of a code within a certain time limit after using thetrigger card 15, such as within thirty seconds after usage. This additional feature would not delay the response of thetrigger computer 41 unduly, but would allow the cardholder some ability to recover from the mistaken use oftrigger card 15. - The notification procedure preferably requires that
trigger computer 41 be connected to anexternal network 43 for automated communication to the cardholder and any other listed parties. For example, triggercomputer 41 could send an email notification to the cardholder. Additionally, if the cardholder wishes to list other email addresses to be notified, an email may be sent to the card holder's spouse, children, attorney, company, security service, credit reporting institution, credit monitoring institution, credit card fraud monitoring division, or any other entity that the card holder would want notified of the use of thetrigger card 15. Likewise, an automated telephone message may be sent to a list of numbers selected by the cardholder. The message may be computer generated, including the date, time, and location of the unauthorized use oftrigger card 15. Additionally, any automated communication may include a personal message pre-recorded by the card holder, such as an introduction to the email, or a voice message added to the telephone notification. Additionally, the notification may include notification of the proper authorities or an appropriate law-enforcement agency based upon the location of the unauthorized use. - The card ordering procedure includes immediate ordering and delivery of replacement
financial cards 13 for allfinancial cards 13 that were cancelled bysystem 34 and issuance of anew trigger card 15. Delivery may be automatic to a home address, a business address, or a “safe” address, such as a bank or post office box, or to a temporary address if the cardholder is away from home, or delivery of the replacementfinancial cards 13 may be deferred until the cardholder has replied to the notification. While home delivery tends to be safest, this may be of no help when the cardholder is traveling. Therefore, home delivery may be initiated immediately, or delivery may be delayed pending confirmation of the cardholder's location. This confirmation may be automated by email, text messaging, web page entry, or telephone, for example. Alternatively, the confirmation may be handled by personal communication, such as over the telephone or in person at a financial institution, to ensure that no continuing fraud is perpetrated by the theft of a communication device along withtrigger card 15. - In one embodiment of the present invention, one method for associating
financial cards 13 withtrigger card 15 is to provide a specially adaptedcard reader 35 inside a financial institution, such as a bank lobby. The cardholder simply swipestrigger card 15 in thespecial card reader 35 and initiates a signup menu instead of a transaction menu. The cardholder then swipes anyfinancial cards 13 that need to be associated with thetrigger card 15. This procedure might require a code to prevent a thief from swiping variousfinancial cards 13 in an attempt to find atrigger card 15. In addition or as an alternative, the specially adaptedcard reader 35 provides the cardholder the option of setting up a profile in which certain actions are automatically initiated upon the activation oftrigger card 15. For example, the profile may include canceling some or allfinancial cards 13, limiting the credit limits of some or all offinancial cards 13, ordering some or all replacementfinancial cards 13, or other like actions. - Referring now to
FIG. 4 in the drawings, the preferred embodiment of ahigh level flowchart 400 of the present invention is illustrated.Flowchart 400 starts atstep 402 with the activation oftrigger card 15. It is recalled from the above discussion, thattrigger card 15 may be activated by fraudulent means viacard readers 35 located at point of sale counters and cash registers or viacomputers 36 using internet online transactions. Next as represented bystep 402, aftertrigger card 15 is activated via fraudulent activity a digital trigger red flag is transmitted tomonitoring institutions 40.Monitoring institutions 40 may be any type of credit reporting company, credit monitoring company, or any other company associated with consumer credit. It is recalled from the above discussion that upon transfer of information fromtrigger card 15 tocard readers 35 orcomputers 36, data abouttrigger card 15 and the current transaction is transmitted to issuinginstitutions 39. Step 402 occurs substantially concurrently as this transfer of information to issuinginstitutions 39. - The process continues with
step 404, in whichmonitoring institutions 40 initiates a security measure based on the digital trigger red flag received from the fraudulent activation oftrigger card 15.Monitoring institutions 40 are capable of substantially simultaneously initiating multiple security measures associated with the account of the fraudulently activatedtrigger card 15. As an example and not by way of limitation,monitoring institutions 40 may initiate security measures to monitor the account for any suspicious activity, such as for example, request for additional lines of credit, requests for increase in credit limit or credit line, requests for change of address, unusual activity or buying habits, or the like. - The security measures continue with
inquiry step 408, in which a determination is made as to whether the fraudulent use was initiated via a computer. If the fraudulent activity was initiated via a computer, the process continues withstep 410. Next instep 410, computer trigger software is initiated to identify the exact location and pertinentinformation regarding computers 36. For example, if the fraudulent activity was initiated via a computer or keyboard associated with a computer, issuinginstitutions 39 automatically, or through other means, initiates computer trigger software to trace the transaction to the exact computer or keyboard. In addition, computer trigger software may take a snap shot or a finger print of the transaction for additional security measures, thereby creating a means to prosecute, trace fraud rings, use cookies, implant spy software, and the like. On the other hand, if the fraudulent activity was not initiated via a computer, the process continues withstep 412. - Next the process ends at
step 412, in whichmonitoring institutions 40 transmits a report to issuinginstitutions 39, thereby curtailing fraudulent activity, credit card fraud, and identity theft. - Referring now to
FIG. 5 in the drawings, the preferred embodiment of anelectronic database system 500 according to the present invention is illustrated. In this embodiment,electronic database system 500 is adapted for use with one ormore issuing institutions 39.Electronic database system 500 is also adapted to communicate with a network or other communication access connections, viacommunications line 502, as described above in connection withFIG. 3 .Database system 500 comprises one or more data blocks, such as for example, data block A 510,data block B 520, anddata block C 530. Although,database system 500 is shown and described as havingdata block A 510,data block B 520, anddata block C 530, the present invention contemplates more, fewer, or any number of data blocks associated withdatabase system 500, according to the needs of issuinginstitutions 39. -
Data block C 530 comprises account information and other personal consumer data associated with financial information stored at issuinginstitutions 39. For example,data block C 530 may comprise an account number, an account type, either a normal account or a trigger account, or any other financial or personal consumer data. Additionallydata block A 510 anddata block B 520 each comprise account information and other personal consumer data associated with financial information stored at issuinginstitutions 39, similar to those shown and described indata block C 530. In addition or as an alternative, the number of accounts and various account types associated with thedata block A 510,data block B 520, anddata block C 530 may be more, fewer, or any amount, according the needs of issuinginstitutions 39. This embodiment of the present invention is in place to curtail identity theft from taking place at the issuing institution, or other electronic databases associated with financial data. - For simplicity and clarity, only so much of
database system 500 is shown and described, as is unique to the present invention or necessary for an understanding of the present invention. As such,FIG. 5 shows a trigger account associated with every ten accounts, represented by the account number and further represented by a trigger line associated with every ten accounts. However, it is understood that a trigger line may be denoted via an alpha trigger indicator, a numeric trigger indicator, or even an alphanumeric trigger indicator. In addition, the trigger account does not have a valid financial value associated with it, but instead is designed for the purpose of fooling an unauthorized user into believing that the trigger account is a valid normal account. The trigger account and in particular the trigger indicator may further be encrypted into the account information and may be provided as a stealth means to denote the trigger account. These options are available for the trigger indicator to further insure that the trigger account is indistinguishable from a normal account to anyone but issuinginstitutions 39. - For example, a trigger line may include an alphanumeric trigger indicator, such as for example, an X1 following the account number, a special number or character placed in the address line, or any other like encrypted form. Although
FIG. 5 shows a trigger line of data being associated with every ten accounts, the present invention contemplates a trigger line of data associated with every hundred accounts, every thousand accounts, every ten thousand accounts, every randomly generated number of accounts, or according to the needs of issuinginstitutions 39. - To further explain the operation of
database system 500, an example is now given. In the following exampledata block C 530 comprises 10,000 accounts. Likewise, data block A 510 comprises 10,000 accounts anddata block B 520 comprises 10,000 accounts. Accordingly,database system 500 comprises a total of 30,000 accounts. Ifdatabase system 500 is accessed, hacked, copied, or otherwise compromised by unauthorized means, the trigger lines associated with each trigger account activate a system or process that automatically cancels, some, all, or any predetermined number of normal accounts indata block A 510,data block B 520, anddata block C 530, or otherwise makes them inoperable. For example, iftrigger account 0010 ofdata block C 530 is compromised, a 20 block of both forward and reverse accounts is automatically cancelled and reissued. Additionally, if trigger account 0100 ofdata block C 530 is compromised, a 200 block of both forward and reverse accounts is automatically cancelled and reissued. Still additionally, if trigger account 1000 ofdata block C 530 is compromised, a 2000 block of both forward and reverse accounts is automatically cancelled and reissued. In essence, an unauthorized access to any of the data blocks withindata system 500 may automatically cancel some, all, or any predetermined number of normal accounts associated withdata block A 510,data block B 520, ordata block C 530. - Accordingly, in the event of unauthorized access to
database system 500, issuinginstitutions 39 may selectively cancel and reissue normal accounts based on the above system and process. Therefore, issuinginstitutions 39 are no longer required to cancel all existing normal accounts associated withdatabase system 500, upon the compromise of only a small amount of data or even an unknown amount of data. Instead, issuinginstitutions 39 can quickly respond to any unauthorized access, by only canceling the affected accounts, thereby providing less time for other unauthorized information to be used and to simultaneously minimize the inconvenience of a cancelled account to its financial customer. - In an alternate embodiment of the present invention,
computer 36 comprisesdatabase 500. In this embodiment,database 500 may, prevent the unauthorized access to personal consumer accounts stored on a home or office computer. In this manner, financial software associated withcomputer 36 provides for a trigger account associated with the valid normal financial accounts. Ifcomputer 36 is accessed, hacked, copied, or otherwise compromised by unauthorized means, the trigger lines associated with each trigger account activate a system or process that automatically cancels, some, all, or any predetermined number of normal accounts indatabase system 500, or otherwise makes them inoperable. This embodiment of the present invention is in place to curtail identity theft from taking place atcomputer 36, or other electronic databases associated with personal financial data. - In an alternate embodiment, the present invention may be carried out by using a trigger number, as opposed to an actual trigger card. In this embodiment, a trigger number is placed in with a group or list of actual valid financial card numbers stored in a list or electronic database. This embodiment protects databases of credit card numbers from being stolen and used electronically, even before the actual credit cards have been created.
- In this trigger-number embodiment, one or more selected trigger numbers, which are not valid numbers for a financial cards and which cannot be validated into valid financial cards, are placed in one or more lists or databases of numbers which can be used as or to create valid financial cards. If a list or database containing a trigger number is accessed, copied, or otherwise used by unauthorized means, the trigger number activates a system or process that cancels, some, all, or any number of the valid numbers in the list or database and makes them inoperable. In particular, any attempted use of a trigger number as a financial card number, cancels and/or invalidates all of the numbers or financial cards associated with that list or database, initiates response, cancellation, and notification procedures, such as those explained above, and records and tracks the location of the computer from which the unauthorized access initiated. This system prevents and deters unauthorized users from hacking into, and stealing credit cards numbers from electronic databases, both before the numbers can be used to create valid financial cards and after the cards have been created.
- It is apparent that an invention with significant advantages has been described and illustrated. Although the present invention is shown in a limited number of forms, it is not limited to just these forms, but is amenable to various changes and modifications without departing from the spirit thereof.
Claims (20)
1. An electronic database system for providing database security measures, the electronic database system comprising:
one or more blocks of data for storing and retrieving data associated with the electronic database system;
one or more financial accounts stored in the one or more blocks of data; and
one or more trigger accounts stored in the one or more blocks of data;
wherein the trigger account is not and cannot be a financial account.
2. The electronic database system of claim 1 , further comprising:
an issuing institution coupled with the electronic database system and operable to initiate the database security measures; and
a network capable of providing communication with the issuing institution and the transactional entities.
3. The electronic database system of claim 1 , wherein the trigger account is associated with a predetermined number of financial accounts.
4. The electronic database system of claim 3 , wherein the trigger account is represented by a trigger line.
5. The electronic database system of claim 4 , wherein a trigger line may be denoted from the group consisting of an alpha trigger indicator, a numeric trigger indicator, or an alphanumeric trigger indicator.
6. The electronic database system of claim 5 , wherein the trigger indicator is encrypted into the account information of the trigger account and is provided as a stealth means to denote the trigger account.
7. The electronic database system of claim 1 , further comprising:
a notification procedure in which selected parties are notified in response to an unauthorized access of a the trigger account.
8. The electronic database system of claim 1 , wherein the database security measures comprise:
a financial account cancellation procedure in which predetermined financial accounts associated with the trigger account are cancelled in response to the unauthorized access to the electronic database system.
9. The electronic database system of claim 8 , wherein the database security measures comprise:
a financial account ordering procedure in which predetermined replacement financial account information associated with the trigger account is ordered in response to the unauthorized access to the electronic database system.
10. The electronic database system of claim 1 , wherein the database security measures automatically respond to any unauthorized access by only canceling the affected financial accounts.
11. The electronic database system of claim 1 , further comprising:
a computer coupled with the electronic database system and operable to initiate the database security measures; and
a network capable of providing communication with the issuing institution and the transactional entities.
12. An electronic security measure system comprising:
one or more security measures activated at one or more monitoring institutions in response to the transmission of a digital red flag transmitted by a trigger card that is not and cannot be a valid financial card.
13. The electronic security measure system of claim 12 , wherein the one or more security measures is activated through the transfer of information from a transmitting device selected from the group consisting of a card reader, a cash register, or an automatic teller machine.
14. The electronic security measure system of claim 12 , wherein the one or more security measures is activated through the use of an internet online transaction.
15. The electronic security measure system of claim 12 , wherein the one or more security measures monitor the account for suspicious activity selected from the group consisting of:
requests for additional lines of credit;
requests for increase in credit limit
requests for increase in credit amount;
requests for change of address;
unusual activity; and
unusual buying habits.
16. The electronic security measure system of claim 12 , further comprising:
a computer trigger software for tracing the transaction to the exact computer or keyboard associated with the fraudulent transaction.
17. The electronic security measure system of claim 16 , wherein the computer trigger software is further operable to generate a snap shot of the fraudulent transaction for additional security measures.
18. The electronic security measure system of claim 12 , further comprising:
a notification procedure in which selected issuing institutions are notified in response to the transmission of the digital trigger red flag over the network to the one or more monitoring institutions.
19. A method for providing database security measures, comprising the steps of:
storing financial accounts in an electronic database system coupled to an issuing institution;
storing trigger accounts in an electronic database system coupled to an issuing institution; and
encrypting a trigger indicator into the account information of the trigger account.
20. The method according to claim 19 , further comprising the steps of:
canceling a predetermined financial account associated with the trigger account in response to an unauthorized access to the electronic database system; and
ordering predetermined replacement financial accounts associated with the trigger account in response to the unauthorized access to the electronic database system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/253,180 US20060032909A1 (en) | 2004-08-06 | 2005-10-18 | System and method for providing database security measures |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/913,636 US6955294B1 (en) | 2004-08-06 | 2004-08-06 | Apparatus and method for preventing credit card fraud |
PCT/US2005/027708 WO2006017648A1 (en) | 2004-08-06 | 2005-08-05 | Apparatus and method for preventing credit card fraud |
WOPCT/US05/27708 | 2005-08-05 | ||
US11/253,180 US20060032909A1 (en) | 2004-08-06 | 2005-10-18 | System and method for providing database security measures |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/913,636 Continuation-In-Part US6955294B1 (en) | 2004-08-06 | 2004-08-06 | Apparatus and method for preventing credit card fraud |
Publications (1)
Publication Number | Publication Date |
---|---|
US20060032909A1 true US20060032909A1 (en) | 2006-02-16 |
Family
ID=35066038
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/913,636 Active US6955294B1 (en) | 2004-08-06 | 2004-08-06 | Apparatus and method for preventing credit card fraud |
US11/253,180 Abandoned US20060032909A1 (en) | 2004-08-06 | 2005-10-18 | System and method for providing database security measures |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/913,636 Active US6955294B1 (en) | 2004-08-06 | 2004-08-06 | Apparatus and method for preventing credit card fraud |
Country Status (9)
Country | Link |
---|---|
US (2) | US6955294B1 (en) |
EP (1) | EP1784758A4 (en) |
JP (1) | JP2008509479A (en) |
KR (1) | KR20070038091A (en) |
AU (1) | AU2005271453A1 (en) |
CA (1) | CA2571662A1 (en) |
GB (1) | GB2430295A (en) |
WO (1) | WO2006017648A1 (en) |
ZA (1) | ZA200610807B (en) |
Cited By (80)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070010213A1 (en) * | 2005-07-06 | 2007-01-11 | First Data Corporation | Secure RFID Packaging |
US20070043577A1 (en) * | 2005-08-16 | 2007-02-22 | Sheldon Kasower | Apparatus and method of enabling a victim of identity theft to resolve and prevent fraud |
US20080033852A1 (en) * | 2005-10-24 | 2008-02-07 | Megdal Myles G | Computer-based modeling of spending behaviors of entities |
US20080221973A1 (en) * | 2005-10-24 | 2008-09-11 | Megdal Myles G | Using commercial share of wallet to rate investments |
US20080221971A1 (en) * | 2005-10-24 | 2008-09-11 | Megdal Myles G | Using commercial share of wallet to rate business prospects |
US20080228541A1 (en) * | 2005-10-24 | 2008-09-18 | Megdal Myles G | Using commercial share of wallet in private equity investments |
US20080228540A1 (en) * | 2005-10-24 | 2008-09-18 | Megdal Myles G | Using commercial share of wallet to compile marketing company lists |
US20090055269A1 (en) * | 2007-08-21 | 2009-02-26 | Daniel Jonathan Baron | Methods and Systems for Preauthorizing Venue-Based Credit Accounts |
US20100145840A1 (en) * | 2003-03-21 | 2010-06-10 | Mighty Net, Inc. | Card management system and method |
US20100306105A1 (en) * | 1997-08-28 | 2010-12-02 | Walker Digital, Llc | Method and device for generating a single-use financial account number |
US8127986B1 (en) * | 2007-12-14 | 2012-03-06 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US8744956B1 (en) | 2010-07-01 | 2014-06-03 | Experian Information Solutions, Inc. | Systems and methods for permission arbitrated transaction services |
US8931058B2 (en) | 2010-07-01 | 2015-01-06 | Experian Information Solutions, Inc. | Systems and methods for permission arbitrated transaction services |
US20150134512A1 (en) * | 2013-11-13 | 2015-05-14 | Mastercard International Incorporated | System and method for detecting fraudulent network events |
US20150161611A1 (en) * | 2013-12-10 | 2015-06-11 | Sas Institute Inc. | Systems and Methods for Self-Similarity Measure |
US9147042B1 (en) | 2010-11-22 | 2015-09-29 | Experian Information Solutions, Inc. | Systems and methods for data verification |
US9251541B2 (en) | 2007-05-25 | 2016-02-02 | Experian Information Solutions, Inc. | System and method for automated detection of never-pay data sets |
US9256904B1 (en) | 2008-08-14 | 2016-02-09 | Experian Information Solutions, Inc. | Multi-bureau credit file freeze and unfreeze |
US9342783B1 (en) | 2007-03-30 | 2016-05-17 | Consumerinfo.Com, Inc. | Systems and methods for data verification |
USD759690S1 (en) | 2014-03-25 | 2016-06-21 | Consumerinfo.Com, Inc. | Display screen or portion thereof with graphical user interface |
USD759689S1 (en) | 2014-03-25 | 2016-06-21 | Consumerinfo.Com, Inc. | Display screen or portion thereof with graphical user interface |
USD760256S1 (en) | 2014-03-25 | 2016-06-28 | Consumerinfo.Com, Inc. | Display screen or portion thereof with graphical user interface |
US9400589B1 (en) | 2002-05-30 | 2016-07-26 | Consumerinfo.Com, Inc. | Circular rotational interface for display of consumer credit information |
US9406085B1 (en) | 2013-03-14 | 2016-08-02 | Consumerinfo.Com, Inc. | System and methods for credit dispute processing, resolution, and reporting |
US9443268B1 (en) | 2013-08-16 | 2016-09-13 | Consumerinfo.Com, Inc. | Bill payment and reporting |
US9477737B1 (en) | 2013-11-20 | 2016-10-25 | Consumerinfo.Com, Inc. | Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules |
US9508092B1 (en) | 2007-01-31 | 2016-11-29 | Experian Information Solutions, Inc. | Systems and methods for providing a direct marketing campaign planning environment |
US9529851B1 (en) | 2013-12-02 | 2016-12-27 | Experian Information Solutions, Inc. | Server architecture for electronic data quality processing |
US9536263B1 (en) | 2011-10-13 | 2017-01-03 | Consumerinfo.Com, Inc. | Debt services candidate locator |
US9542553B1 (en) | 2011-09-16 | 2017-01-10 | Consumerinfo.Com, Inc. | Systems and methods of identity protection and management |
US9558519B1 (en) | 2011-04-29 | 2017-01-31 | Consumerinfo.Com, Inc. | Exposing reporting cycle information |
US9563916B1 (en) | 2006-10-05 | 2017-02-07 | Experian Information Solutions, Inc. | System and method for generating a finance attribute from tradeline data |
US9607336B1 (en) | 2011-06-16 | 2017-03-28 | Consumerinfo.Com, Inc. | Providing credit inquiry alerts |
US20170091769A1 (en) * | 2015-09-28 | 2017-03-30 | Mastercard Asia/Pacific Pte. Ltd. | Device for facilitating identification of a fraudulent payment card |
US9633322B1 (en) | 2013-03-15 | 2017-04-25 | Consumerinfo.Com, Inc. | Adjustment of knowledge-based authentication |
US9654541B1 (en) | 2012-11-12 | 2017-05-16 | Consumerinfo.Com, Inc. | Aggregating user web browsing data |
US9652802B1 (en) | 2010-03-24 | 2017-05-16 | Consumerinfo.Com, Inc. | Indirect monitoring and reporting of a user's credit data |
US9697263B1 (en) | 2013-03-04 | 2017-07-04 | Experian Information Solutions, Inc. | Consumer data request fulfillment system |
US9710852B1 (en) | 2002-05-30 | 2017-07-18 | Consumerinfo.Com, Inc. | Credit report timeline user interface |
US9721147B1 (en) | 2013-05-23 | 2017-08-01 | Consumerinfo.Com, Inc. | Digital identity |
US9830646B1 (en) | 2012-11-30 | 2017-11-28 | Consumerinfo.Com, Inc. | Credit score goals and alerts systems and methods |
US9853959B1 (en) | 2012-05-07 | 2017-12-26 | Consumerinfo.Com, Inc. | Storage and maintenance of personal data |
US9870589B1 (en) | 2013-03-14 | 2018-01-16 | Consumerinfo.Com, Inc. | Credit utilization tracking and reporting |
US9892457B1 (en) | 2014-04-16 | 2018-02-13 | Consumerinfo.Com, Inc. | Providing credit data in search results |
US9990674B1 (en) * | 2007-12-14 | 2018-06-05 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US10075446B2 (en) | 2008-06-26 | 2018-09-11 | Experian Marketing Solutions, Inc. | Systems and methods for providing an integrated identifier |
US10078868B1 (en) | 2007-01-31 | 2018-09-18 | Experian Information Solutions, Inc. | System and method for providing an aggregation tool |
US10102536B1 (en) | 2013-11-15 | 2018-10-16 | Experian Information Solutions, Inc. | Micro-geographic aggregation system |
US10102570B1 (en) | 2013-03-14 | 2018-10-16 | Consumerinfo.Com, Inc. | Account vulnerability alerts |
US10176233B1 (en) | 2011-07-08 | 2019-01-08 | Consumerinfo.Com, Inc. | Lifescore |
US10242019B1 (en) | 2014-12-19 | 2019-03-26 | Experian Information Solutions, Inc. | User behavior segmentation using latent topic detection |
US10255598B1 (en) | 2012-12-06 | 2019-04-09 | Consumerinfo.Com, Inc. | Credit card account data extraction |
US10262362B1 (en) | 2014-02-14 | 2019-04-16 | Experian Information Solutions, Inc. | Automatic generation of code for attributes |
US10325314B1 (en) | 2013-11-15 | 2019-06-18 | Consumerinfo.Com, Inc. | Payment reporting systems |
US10339527B1 (en) | 2014-10-31 | 2019-07-02 | Experian Information Solutions, Inc. | System and architecture for electronic fraud detection |
US10373240B1 (en) | 2014-04-25 | 2019-08-06 | Csidentity Corporation | Systems, methods and computer-program products for eligibility verification |
US10417704B2 (en) | 2010-11-02 | 2019-09-17 | Experian Technology Ltd. | Systems and methods of assisted strategy design |
US10586279B1 (en) | 2004-09-22 | 2020-03-10 | Experian Information Solutions, Inc. | Automated analysis of data to generate prospect notifications based on trigger events |
US10592982B2 (en) | 2013-03-14 | 2020-03-17 | Csidentity Corporation | System and method for identifying related credit inquiries |
US10593004B2 (en) | 2011-02-18 | 2020-03-17 | Csidentity Corporation | System and methods for identifying compromised personally identifiable information on the internet |
US10621657B2 (en) | 2008-11-05 | 2020-04-14 | Consumerinfo.Com, Inc. | Systems and methods of credit information reporting |
US10664936B2 (en) | 2013-03-15 | 2020-05-26 | Csidentity Corporation | Authentication systems and methods for on-demand products |
US10671749B2 (en) | 2018-09-05 | 2020-06-02 | Consumerinfo.Com, Inc. | Authenticated access and aggregation database platform |
US10685398B1 (en) | 2013-04-23 | 2020-06-16 | Consumerinfo.Com, Inc. | Presenting credit score information |
US10699028B1 (en) | 2017-09-28 | 2020-06-30 | Csidentity Corporation | Identity security architecture systems and methods |
US10735183B1 (en) | 2017-06-30 | 2020-08-04 | Experian Information Solutions, Inc. | Symmetric encryption for private smart contracts among multiple parties in a private peer-to-peer network |
US10757154B1 (en) | 2015-11-24 | 2020-08-25 | Experian Information Solutions, Inc. | Real-time event-based notification system |
US10896472B1 (en) | 2017-11-14 | 2021-01-19 | Csidentity Corporation | Security and identity verification system and architecture |
US10911234B2 (en) | 2018-06-22 | 2021-02-02 | Experian Information Solutions, Inc. | System and method for a token gateway environment |
US10963434B1 (en) | 2018-09-07 | 2021-03-30 | Experian Information Solutions, Inc. | Data architecture for supporting multiple search models |
US11030562B1 (en) | 2011-10-31 | 2021-06-08 | Consumerinfo.Com, Inc. | Pre-data breach monitoring |
US11151468B1 (en) | 2015-07-02 | 2021-10-19 | Experian Information Solutions, Inc. | Behavior analysis using distributed representations of event data |
US11227001B2 (en) | 2017-01-31 | 2022-01-18 | Experian Information Solutions, Inc. | Massive scale heterogeneous data ingestion and user resolution |
US11238656B1 (en) | 2019-02-22 | 2022-02-01 | Consumerinfo.Com, Inc. | System and method for an augmented reality experience via an artificial intelligence bot |
US11315179B1 (en) | 2018-11-16 | 2022-04-26 | Consumerinfo.Com, Inc. | Methods and apparatuses for customized card recommendations |
US11438370B2 (en) | 2020-07-16 | 2022-09-06 | Capital One Services, Llc | Email security platform |
US11620403B2 (en) | 2019-01-11 | 2023-04-04 | Experian Information Solutions, Inc. | Systems and methods for secure data aggregation and computation |
US11880377B1 (en) | 2021-03-26 | 2024-01-23 | Experian Information Solutions, Inc. | Systems and methods for entity resolution |
US11941065B1 (en) | 2019-09-13 | 2024-03-26 | Experian Information Solutions, Inc. | Single identifier platform for storing entity data |
US11954655B1 (en) | 2021-12-15 | 2024-04-09 | Consumerinfo.Com, Inc. | Authentication alerts |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7805376B2 (en) | 2002-06-14 | 2010-09-28 | American Express Travel Related Services Company, Inc. | Methods and apparatus for facilitating a transaction |
US6901387B2 (en) | 2001-12-07 | 2005-05-31 | General Electric Capital Financial | Electronic purchasing method and apparatus for performing the same |
US7577585B2 (en) | 2001-12-07 | 2009-08-18 | American Express Travel Related Services Company, Inc. | Method and system for completing transactions involving partial shipments |
US7413112B2 (en) * | 2004-03-16 | 2008-08-19 | American Express Travel Related Services Company, Inc. | Method and system for manual authorization |
US20080265017A1 (en) * | 2006-10-24 | 2008-10-30 | West Sammie J | Credit card and security system |
US7606766B2 (en) * | 2006-12-21 | 2009-10-20 | American Express Travel Related Services Company, Inc. | Computer system and computer-implemented method for selecting invoice settlement options |
CN101525958B (en) * | 2008-03-06 | 2012-09-26 | 旭丽电子(广州)有限公司 | Anti-theft lock |
US8287640B2 (en) | 2008-09-29 | 2012-10-16 | Clearwater International, Llc | Stable foamed cement slurry compositions and methods for making and using same |
US20100264226A1 (en) * | 2009-02-19 | 2010-10-21 | Mastercard International, Incorporated | Payment card having acceptance attributes on a single side |
US20110238465A1 (en) * | 2010-03-25 | 2011-09-29 | Leesa Shapiro Willet | System for Controlling Card Transactions |
CN106302083B (en) * | 2015-05-14 | 2020-11-03 | 钉钉控股(开曼)有限公司 | Instant messaging method and server |
US11488214B2 (en) * | 2019-10-03 | 2022-11-01 | Capital One Services, Llc | High authentication layer to determine a person's location when considering sending a secure object |
US20230252476A1 (en) * | 2022-02-10 | 2023-08-10 | Capital One Services, Llc | Computationally efficient theft detection |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6068184A (en) * | 1998-04-27 | 2000-05-30 | Barnett; Donald A. | Security card and system for use thereof |
US20020047049A1 (en) * | 2000-09-13 | 2002-04-25 | David Perron | Authentication device with self-personalization capabilities |
US20020120563A1 (en) * | 2000-09-19 | 2002-08-29 | Mcwilliam William J. | System and method for effecting anonymous payments |
US20020164057A1 (en) * | 1998-12-22 | 2002-11-07 | Stmicroelectronics Inc. | High security flash memory and method |
US6494367B1 (en) * | 1999-10-15 | 2002-12-17 | Ajit Kumar Zacharias | Secure multi-application card system |
US20030001005A1 (en) * | 1998-10-28 | 2003-01-02 | Mastercard International Incorporated | System and method for using a prepaid card |
US20030216997A1 (en) * | 2002-05-16 | 2003-11-20 | Cohen Morris E. | Financial cards |
US20040007618A1 (en) * | 2002-07-10 | 2004-01-15 | Scott Oram | Prepaid credit card method |
US20040243498A1 (en) * | 2002-11-15 | 2004-12-02 | Harry Duke | Interest bearing gift card mechanisms |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4273557B2 (en) * | 1999-02-23 | 2009-06-03 | 株式会社日立製作所 | ID management method |
JP2001338248A (en) * | 2000-05-26 | 2001-12-07 | Nec Corp | Card information certifying system |
JP2002063530A (en) * | 2000-08-23 | 2002-02-28 | Hitachi Ltd | Card management system and processing method of card information |
US6400270B1 (en) * | 2000-11-02 | 2002-06-04 | Robert Person | Wallet protection system |
US20020173994A1 (en) * | 2001-05-21 | 2002-11-21 | Ferguson Joseph M. | Method and apparatus for insuring an insured from identity theft peril and identity reclamation and credit restoration |
US20030115467A1 (en) * | 2001-12-19 | 2003-06-19 | Aull Kenneth W. | Public key infrastructure token issuance and binding |
JP3924200B2 (en) * | 2002-05-21 | 2007-06-06 | 東日本旅客鉄道株式会社 | IC card issuance system |
-
2004
- 2004-08-06 US US10/913,636 patent/US6955294B1/en active Active
-
2005
- 2005-08-05 WO PCT/US2005/027708 patent/WO2006017648A1/en active Application Filing
- 2005-08-05 JP JP2007524979A patent/JP2008509479A/en active Pending
- 2005-08-05 AU AU2005271453A patent/AU2005271453A1/en not_active Abandoned
- 2005-08-05 CA CA002571662A patent/CA2571662A1/en not_active Abandoned
- 2005-08-05 EP EP05778782A patent/EP1784758A4/en not_active Withdrawn
- 2005-08-05 GB GB0625721A patent/GB2430295A/en active Pending
- 2005-08-05 KR KR1020077000089A patent/KR20070038091A/en not_active Application Discontinuation
- 2005-10-18 US US11/253,180 patent/US20060032909A1/en not_active Abandoned
-
2006
- 2006-12-21 ZA ZA200610807A patent/ZA200610807B/en unknown
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6068184A (en) * | 1998-04-27 | 2000-05-30 | Barnett; Donald A. | Security card and system for use thereof |
US20030001005A1 (en) * | 1998-10-28 | 2003-01-02 | Mastercard International Incorporated | System and method for using a prepaid card |
US20020164057A1 (en) * | 1998-12-22 | 2002-11-07 | Stmicroelectronics Inc. | High security flash memory and method |
US6494367B1 (en) * | 1999-10-15 | 2002-12-17 | Ajit Kumar Zacharias | Secure multi-application card system |
US20020047049A1 (en) * | 2000-09-13 | 2002-04-25 | David Perron | Authentication device with self-personalization capabilities |
US20020120563A1 (en) * | 2000-09-19 | 2002-08-29 | Mcwilliam William J. | System and method for effecting anonymous payments |
US20030216997A1 (en) * | 2002-05-16 | 2003-11-20 | Cohen Morris E. | Financial cards |
US20040007618A1 (en) * | 2002-07-10 | 2004-01-15 | Scott Oram | Prepaid credit card method |
US20040243498A1 (en) * | 2002-11-15 | 2004-12-02 | Harry Duke | Interest bearing gift card mechanisms |
Cited By (189)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8315948B2 (en) | 1997-08-28 | 2012-11-20 | Walker Digital, Llc | Method and device for generating a single-use financial account number |
US20100306105A1 (en) * | 1997-08-28 | 2010-12-02 | Walker Digital, Llc | Method and device for generating a single-use financial account number |
US9400589B1 (en) | 2002-05-30 | 2016-07-26 | Consumerinfo.Com, Inc. | Circular rotational interface for display of consumer credit information |
US9710852B1 (en) | 2002-05-30 | 2017-07-18 | Consumerinfo.Com, Inc. | Credit report timeline user interface |
US8781953B2 (en) | 2003-03-21 | 2014-07-15 | Consumerinfo.Com, Inc. | Card management system and method |
US20100145840A1 (en) * | 2003-03-21 | 2010-06-10 | Mighty Net, Inc. | Card management system and method |
US10586279B1 (en) | 2004-09-22 | 2020-03-10 | Experian Information Solutions, Inc. | Automated analysis of data to generate prospect notifications based on trigger events |
US11861756B1 (en) | 2004-09-22 | 2024-01-02 | Experian Information Solutions, Inc. | Automated analysis of data to generate prospect notifications based on trigger events |
US11562457B2 (en) | 2004-09-22 | 2023-01-24 | Experian Information Solutions, Inc. | Automated analysis of data to generate prospect notifications based on trigger events |
US11373261B1 (en) | 2004-09-22 | 2022-06-28 | Experian Information Solutions, Inc. | Automated analysis of data to generate prospect notifications based on trigger events |
US8063781B2 (en) * | 2005-07-06 | 2011-11-22 | First Data Corporation | Secure RFID packaging |
US20070010213A1 (en) * | 2005-07-06 | 2007-01-11 | First Data Corporation | Secure RFID Packaging |
US20070043577A1 (en) * | 2005-08-16 | 2007-02-22 | Sheldon Kasower | Apparatus and method of enabling a victim of identity theft to resolve and prevent fraud |
US20080228540A1 (en) * | 2005-10-24 | 2008-09-18 | Megdal Myles G | Using commercial share of wallet to compile marketing company lists |
US20080228541A1 (en) * | 2005-10-24 | 2008-09-18 | Megdal Myles G | Using commercial share of wallet in private equity investments |
US20080221971A1 (en) * | 2005-10-24 | 2008-09-11 | Megdal Myles G | Using commercial share of wallet to rate business prospects |
US20080221973A1 (en) * | 2005-10-24 | 2008-09-11 | Megdal Myles G | Using commercial share of wallet to rate investments |
US20080033852A1 (en) * | 2005-10-24 | 2008-02-07 | Megdal Myles G | Computer-based modeling of spending behaviors of entities |
US11631129B1 (en) | 2006-10-05 | 2023-04-18 | Experian Information Solutions, Inc | System and method for generating a finance attribute from tradeline data |
US9563916B1 (en) | 2006-10-05 | 2017-02-07 | Experian Information Solutions, Inc. | System and method for generating a finance attribute from tradeline data |
US10121194B1 (en) | 2006-10-05 | 2018-11-06 | Experian Information Solutions, Inc. | System and method for generating a finance attribute from tradeline data |
US10963961B1 (en) | 2006-10-05 | 2021-03-30 | Experian Information Solutions, Inc. | System and method for generating a finance attribute from tradeline data |
US10078868B1 (en) | 2007-01-31 | 2018-09-18 | Experian Information Solutions, Inc. | System and method for providing an aggregation tool |
US10891691B2 (en) | 2007-01-31 | 2021-01-12 | Experian Information Solutions, Inc. | System and method for providing an aggregation tool |
US11443373B2 (en) | 2007-01-31 | 2022-09-13 | Experian Information Solutions, Inc. | System and method for providing an aggregation tool |
US10692105B1 (en) | 2007-01-31 | 2020-06-23 | Experian Information Solutions, Inc. | Systems and methods for providing a direct marketing campaign planning environment |
US11803873B1 (en) | 2007-01-31 | 2023-10-31 | Experian Information Solutions, Inc. | Systems and methods for providing a direct marketing campaign planning environment |
US9916596B1 (en) | 2007-01-31 | 2018-03-13 | Experian Information Solutions, Inc. | Systems and methods for providing a direct marketing campaign planning environment |
US10650449B2 (en) | 2007-01-31 | 2020-05-12 | Experian Information Solutions, Inc. | System and method for providing an aggregation tool |
US11908005B2 (en) | 2007-01-31 | 2024-02-20 | Experian Information Solutions, Inc. | System and method for providing an aggregation tool |
US10402901B2 (en) | 2007-01-31 | 2019-09-03 | Experian Information Solutions, Inc. | System and method for providing an aggregation tool |
US11176570B1 (en) | 2007-01-31 | 2021-11-16 | Experian Information Solutions, Inc. | Systems and methods for providing a direct marketing campaign planning environment |
US9508092B1 (en) | 2007-01-31 | 2016-11-29 | Experian Information Solutions, Inc. | Systems and methods for providing a direct marketing campaign planning environment |
US10311466B1 (en) | 2007-01-31 | 2019-06-04 | Experian Information Solutions, Inc. | Systems and methods for providing a direct marketing campaign planning environment |
US11308170B2 (en) | 2007-03-30 | 2022-04-19 | Consumerinfo.Com, Inc. | Systems and methods for data verification |
US10437895B2 (en) | 2007-03-30 | 2019-10-08 | Consumerinfo.Com, Inc. | Systems and methods for data verification |
US9342783B1 (en) | 2007-03-30 | 2016-05-17 | Consumerinfo.Com, Inc. | Systems and methods for data verification |
US9251541B2 (en) | 2007-05-25 | 2016-02-02 | Experian Information Solutions, Inc. | System and method for automated detection of never-pay data sets |
US20090055269A1 (en) * | 2007-08-21 | 2009-02-26 | Daniel Jonathan Baron | Methods and Systems for Preauthorizing Venue-Based Credit Accounts |
US9230283B1 (en) | 2007-12-14 | 2016-01-05 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US10262364B2 (en) * | 2007-12-14 | 2019-04-16 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US10878499B2 (en) * | 2007-12-14 | 2020-12-29 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US9767513B1 (en) * | 2007-12-14 | 2017-09-19 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US8464939B1 (en) | 2007-12-14 | 2013-06-18 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US11379916B1 (en) * | 2007-12-14 | 2022-07-05 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US9990674B1 (en) * | 2007-12-14 | 2018-06-05 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US8127986B1 (en) * | 2007-12-14 | 2012-03-06 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US11631130B1 (en) * | 2007-12-14 | 2023-04-18 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US9542682B1 (en) | 2007-12-14 | 2017-01-10 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US10614519B2 (en) * | 2007-12-14 | 2020-04-07 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US11769112B2 (en) | 2008-06-26 | 2023-09-26 | Experian Marketing Solutions, Llc | Systems and methods for providing an integrated identifier |
US10075446B2 (en) | 2008-06-26 | 2018-09-11 | Experian Marketing Solutions, Inc. | Systems and methods for providing an integrated identifier |
US11157872B2 (en) | 2008-06-26 | 2021-10-26 | Experian Marketing Solutions, Llc | Systems and methods for providing an integrated identifier |
US9792648B1 (en) | 2008-08-14 | 2017-10-17 | Experian Information Solutions, Inc. | Multi-bureau credit file freeze and unfreeze |
US9489694B2 (en) | 2008-08-14 | 2016-11-08 | Experian Information Solutions, Inc. | Multi-bureau credit file freeze and unfreeze |
US10650448B1 (en) | 2008-08-14 | 2020-05-12 | Experian Information Solutions, Inc. | Multi-bureau credit file freeze and unfreeze |
US9256904B1 (en) | 2008-08-14 | 2016-02-09 | Experian Information Solutions, Inc. | Multi-bureau credit file freeze and unfreeze |
US11004147B1 (en) | 2008-08-14 | 2021-05-11 | Experian Information Solutions, Inc. | Multi-bureau credit file freeze and unfreeze |
US10115155B1 (en) | 2008-08-14 | 2018-10-30 | Experian Information Solution, Inc. | Multi-bureau credit file freeze and unfreeze |
US11636540B1 (en) | 2008-08-14 | 2023-04-25 | Experian Information Solutions, Inc. | Multi-bureau credit file freeze and unfreeze |
US10621657B2 (en) | 2008-11-05 | 2020-04-14 | Consumerinfo.Com, Inc. | Systems and methods of credit information reporting |
US10909617B2 (en) | 2010-03-24 | 2021-02-02 | Consumerinfo.Com, Inc. | Indirect monitoring and reporting of a user's credit data |
US9652802B1 (en) | 2010-03-24 | 2017-05-16 | Consumerinfo.Com, Inc. | Indirect monitoring and reporting of a user's credit data |
US8744956B1 (en) | 2010-07-01 | 2014-06-03 | Experian Information Solutions, Inc. | Systems and methods for permission arbitrated transaction services |
US8931058B2 (en) | 2010-07-01 | 2015-01-06 | Experian Information Solutions, Inc. | Systems and methods for permission arbitrated transaction services |
US10417704B2 (en) | 2010-11-02 | 2019-09-17 | Experian Technology Ltd. | Systems and methods of assisted strategy design |
US9684905B1 (en) | 2010-11-22 | 2017-06-20 | Experian Information Solutions, Inc. | Systems and methods for data verification |
US9147042B1 (en) | 2010-11-22 | 2015-09-29 | Experian Information Solutions, Inc. | Systems and methods for data verification |
US10593004B2 (en) | 2011-02-18 | 2020-03-17 | Csidentity Corporation | System and methods for identifying compromised personally identifiable information on the internet |
US9558519B1 (en) | 2011-04-29 | 2017-01-31 | Consumerinfo.Com, Inc. | Exposing reporting cycle information |
US11861691B1 (en) | 2011-04-29 | 2024-01-02 | Consumerinfo.Com, Inc. | Exposing reporting cycle information |
US11232413B1 (en) | 2011-06-16 | 2022-01-25 | Consumerinfo.Com, Inc. | Authentication alerts |
US9607336B1 (en) | 2011-06-16 | 2017-03-28 | Consumerinfo.Com, Inc. | Providing credit inquiry alerts |
US10685336B1 (en) | 2011-06-16 | 2020-06-16 | Consumerinfo.Com, Inc. | Authentication alerts |
US10115079B1 (en) | 2011-06-16 | 2018-10-30 | Consumerinfo.Com, Inc. | Authentication alerts |
US10719873B1 (en) | 2011-06-16 | 2020-07-21 | Consumerinfo.Com, Inc. | Providing credit inquiry alerts |
US9665854B1 (en) | 2011-06-16 | 2017-05-30 | Consumerinfo.Com, Inc. | Authentication alerts |
US10176233B1 (en) | 2011-07-08 | 2019-01-08 | Consumerinfo.Com, Inc. | Lifescore |
US10798197B2 (en) | 2011-07-08 | 2020-10-06 | Consumerinfo.Com, Inc. | Lifescore |
US11665253B1 (en) | 2011-07-08 | 2023-05-30 | Consumerinfo.Com, Inc. | LifeScore |
US10642999B2 (en) | 2011-09-16 | 2020-05-05 | Consumerinfo.Com, Inc. | Systems and methods of identity protection and management |
US9542553B1 (en) | 2011-09-16 | 2017-01-10 | Consumerinfo.Com, Inc. | Systems and methods of identity protection and management |
US11087022B2 (en) | 2011-09-16 | 2021-08-10 | Consumerinfo.Com, Inc. | Systems and methods of identity protection and management |
US10061936B1 (en) | 2011-09-16 | 2018-08-28 | Consumerinfo.Com, Inc. | Systems and methods of identity protection and management |
US11790112B1 (en) | 2011-09-16 | 2023-10-17 | Consumerinfo.Com, Inc. | Systems and methods of identity protection and management |
US9972048B1 (en) | 2011-10-13 | 2018-05-15 | Consumerinfo.Com, Inc. | Debt services candidate locator |
US9536263B1 (en) | 2011-10-13 | 2017-01-03 | Consumerinfo.Com, Inc. | Debt services candidate locator |
US11200620B2 (en) | 2011-10-13 | 2021-12-14 | Consumerinfo.Com, Inc. | Debt services candidate locator |
US11030562B1 (en) | 2011-10-31 | 2021-06-08 | Consumerinfo.Com, Inc. | Pre-data breach monitoring |
US11568348B1 (en) | 2011-10-31 | 2023-01-31 | Consumerinfo.Com, Inc. | Pre-data breach monitoring |
US9853959B1 (en) | 2012-05-07 | 2017-12-26 | Consumerinfo.Com, Inc. | Storage and maintenance of personal data |
US11356430B1 (en) | 2012-05-07 | 2022-06-07 | Consumerinfo.Com, Inc. | Storage and maintenance of personal data |
US11012491B1 (en) | 2012-11-12 | 2021-05-18 | ConsumerInfor.com, Inc. | Aggregating user web browsing data |
US11863310B1 (en) | 2012-11-12 | 2024-01-02 | Consumerinfo.Com, Inc. | Aggregating user web browsing data |
US10277659B1 (en) | 2012-11-12 | 2019-04-30 | Consumerinfo.Com, Inc. | Aggregating user web browsing data |
US9654541B1 (en) | 2012-11-12 | 2017-05-16 | Consumerinfo.Com, Inc. | Aggregating user web browsing data |
US10366450B1 (en) | 2012-11-30 | 2019-07-30 | Consumerinfo.Com, Inc. | Credit data analysis |
US9830646B1 (en) | 2012-11-30 | 2017-11-28 | Consumerinfo.Com, Inc. | Credit score goals and alerts systems and methods |
US10963959B2 (en) | 2012-11-30 | 2021-03-30 | Consumerinfo. Com, Inc. | Presentation of credit score factors |
US11132742B1 (en) | 2012-11-30 | 2021-09-28 | Consumerlnfo.com, Inc. | Credit score goals and alerts systems and methods |
US11651426B1 (en) | 2012-11-30 | 2023-05-16 | Consumerlnfo.com, Inc. | Credit score goals and alerts systems and methods |
US11308551B1 (en) | 2012-11-30 | 2022-04-19 | Consumerinfo.Com, Inc. | Credit data analysis |
US10255598B1 (en) | 2012-12-06 | 2019-04-09 | Consumerinfo.Com, Inc. | Credit card account data extraction |
US9697263B1 (en) | 2013-03-04 | 2017-07-04 | Experian Information Solutions, Inc. | Consumer data request fulfillment system |
US10592982B2 (en) | 2013-03-14 | 2020-03-17 | Csidentity Corporation | System and method for identifying related credit inquiries |
US11769200B1 (en) | 2013-03-14 | 2023-09-26 | Consumerinfo.Com, Inc. | Account vulnerability alerts |
US10043214B1 (en) | 2013-03-14 | 2018-08-07 | Consumerinfo.Com, Inc. | System and methods for credit dispute processing, resolution, and reporting |
US9406085B1 (en) | 2013-03-14 | 2016-08-02 | Consumerinfo.Com, Inc. | System and methods for credit dispute processing, resolution, and reporting |
US10102570B1 (en) | 2013-03-14 | 2018-10-16 | Consumerinfo.Com, Inc. | Account vulnerability alerts |
US11113759B1 (en) | 2013-03-14 | 2021-09-07 | Consumerinfo.Com, Inc. | Account vulnerability alerts |
US9697568B1 (en) | 2013-03-14 | 2017-07-04 | Consumerinfo.Com, Inc. | System and methods for credit dispute processing, resolution, and reporting |
US10929925B1 (en) | 2013-03-14 | 2021-02-23 | Consumerlnfo.com, Inc. | System and methods for credit dispute processing, resolution, and reporting |
US11514519B1 (en) | 2013-03-14 | 2022-11-29 | Consumerinfo.Com, Inc. | System and methods for credit dispute processing, resolution, and reporting |
US9870589B1 (en) | 2013-03-14 | 2018-01-16 | Consumerinfo.Com, Inc. | Credit utilization tracking and reporting |
US10169761B1 (en) | 2013-03-15 | 2019-01-01 | ConsumerInfo.com Inc. | Adjustment of knowledge-based authentication |
US11288677B1 (en) | 2013-03-15 | 2022-03-29 | Consumerlnfo.com, Inc. | Adjustment of knowledge-based authentication |
US11164271B2 (en) | 2013-03-15 | 2021-11-02 | Csidentity Corporation | Systems and methods of delayed authentication and billing for on-demand products |
US10664936B2 (en) | 2013-03-15 | 2020-05-26 | Csidentity Corporation | Authentication systems and methods for on-demand products |
US10740762B2 (en) | 2013-03-15 | 2020-08-11 | Consumerinfo.Com, Inc. | Adjustment of knowledge-based authentication |
US9633322B1 (en) | 2013-03-15 | 2017-04-25 | Consumerinfo.Com, Inc. | Adjustment of knowledge-based authentication |
US11790473B2 (en) | 2013-03-15 | 2023-10-17 | Csidentity Corporation | Systems and methods of delayed authentication and billing for on-demand products |
US11775979B1 (en) | 2013-03-15 | 2023-10-03 | Consumerinfo.Com, Inc. | Adjustment of knowledge-based authentication |
US10685398B1 (en) | 2013-04-23 | 2020-06-16 | Consumerinfo.Com, Inc. | Presenting credit score information |
US9721147B1 (en) | 2013-05-23 | 2017-08-01 | Consumerinfo.Com, Inc. | Digital identity |
US11803929B1 (en) | 2013-05-23 | 2023-10-31 | Consumerinfo.Com, Inc. | Digital identity |
US10453159B2 (en) | 2013-05-23 | 2019-10-22 | Consumerinfo.Com, Inc. | Digital identity |
US11120519B2 (en) | 2013-05-23 | 2021-09-14 | Consumerinfo.Com, Inc. | Digital identity |
US9443268B1 (en) | 2013-08-16 | 2016-09-13 | Consumerinfo.Com, Inc. | Bill payment and reporting |
US20150134512A1 (en) * | 2013-11-13 | 2015-05-14 | Mastercard International Incorporated | System and method for detecting fraudulent network events |
US10586234B2 (en) * | 2013-11-13 | 2020-03-10 | Mastercard International Incorporated | System and method for detecting fraudulent network events |
US10102536B1 (en) | 2013-11-15 | 2018-10-16 | Experian Information Solutions, Inc. | Micro-geographic aggregation system |
US10580025B2 (en) | 2013-11-15 | 2020-03-03 | Experian Information Solutions, Inc. | Micro-geographic aggregation system |
US10325314B1 (en) | 2013-11-15 | 2019-06-18 | Consumerinfo.Com, Inc. | Payment reporting systems |
US10269065B1 (en) | 2013-11-15 | 2019-04-23 | Consumerinfo.Com, Inc. | Bill payment and reporting |
US10628448B1 (en) | 2013-11-20 | 2020-04-21 | Consumerinfo.Com, Inc. | Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules |
US10025842B1 (en) | 2013-11-20 | 2018-07-17 | Consumerinfo.Com, Inc. | Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules |
US9477737B1 (en) | 2013-11-20 | 2016-10-25 | Consumerinfo.Com, Inc. | Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules |
US11461364B1 (en) | 2013-11-20 | 2022-10-04 | Consumerinfo.Com, Inc. | Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules |
US9529851B1 (en) | 2013-12-02 | 2016-12-27 | Experian Information Solutions, Inc. | Server architecture for electronic data quality processing |
US20150161611A1 (en) * | 2013-12-10 | 2015-06-11 | Sas Institute Inc. | Systems and Methods for Self-Similarity Measure |
US11847693B1 (en) | 2014-02-14 | 2023-12-19 | Experian Information Solutions, Inc. | Automatic generation of code for attributes |
US11107158B1 (en) | 2014-02-14 | 2021-08-31 | Experian Information Solutions, Inc. | Automatic generation of code for attributes |
US10262362B1 (en) | 2014-02-14 | 2019-04-16 | Experian Information Solutions, Inc. | Automatic generation of code for attributes |
USD760256S1 (en) | 2014-03-25 | 2016-06-28 | Consumerinfo.Com, Inc. | Display screen or portion thereof with graphical user interface |
USD759690S1 (en) | 2014-03-25 | 2016-06-21 | Consumerinfo.Com, Inc. | Display screen or portion thereof with graphical user interface |
USD759689S1 (en) | 2014-03-25 | 2016-06-21 | Consumerinfo.Com, Inc. | Display screen or portion thereof with graphical user interface |
US9892457B1 (en) | 2014-04-16 | 2018-02-13 | Consumerinfo.Com, Inc. | Providing credit data in search results |
US10482532B1 (en) | 2014-04-16 | 2019-11-19 | Consumerinfo.Com, Inc. | Providing credit data in search results |
US10373240B1 (en) | 2014-04-25 | 2019-08-06 | Csidentity Corporation | Systems, methods and computer-program products for eligibility verification |
US11074641B1 (en) | 2014-04-25 | 2021-07-27 | Csidentity Corporation | Systems, methods and computer-program products for eligibility verification |
US11587150B1 (en) | 2014-04-25 | 2023-02-21 | Csidentity Corporation | Systems and methods for eligibility verification |
US11436606B1 (en) | 2014-10-31 | 2022-09-06 | Experian Information Solutions, Inc. | System and architecture for electronic fraud detection |
US11941635B1 (en) | 2014-10-31 | 2024-03-26 | Experian Information Solutions, Inc. | System and architecture for electronic fraud detection |
US10990979B1 (en) | 2014-10-31 | 2021-04-27 | Experian Information Solutions, Inc. | System and architecture for electronic fraud detection |
US10339527B1 (en) | 2014-10-31 | 2019-07-02 | Experian Information Solutions, Inc. | System and architecture for electronic fraud detection |
US11010345B1 (en) | 2014-12-19 | 2021-05-18 | Experian Information Solutions, Inc. | User behavior segmentation using latent topic detection |
US10445152B1 (en) | 2014-12-19 | 2019-10-15 | Experian Information Solutions, Inc. | Systems and methods for dynamic report generation based on automatic modeling of complex data structures |
US10242019B1 (en) | 2014-12-19 | 2019-03-26 | Experian Information Solutions, Inc. | User behavior segmentation using latent topic detection |
US11151468B1 (en) | 2015-07-02 | 2021-10-19 | Experian Information Solutions, Inc. | Behavior analysis using distributed representations of event data |
US20170091769A1 (en) * | 2015-09-28 | 2017-03-30 | Mastercard Asia/Pacific Pte. Ltd. | Device for facilitating identification of a fraudulent payment card |
US11159593B1 (en) | 2015-11-24 | 2021-10-26 | Experian Information Solutions, Inc. | Real-time event-based notification system |
US11729230B1 (en) | 2015-11-24 | 2023-08-15 | Experian Information Solutions, Inc. | Real-time event-based notification system |
US10757154B1 (en) | 2015-11-24 | 2020-08-25 | Experian Information Solutions, Inc. | Real-time event-based notification system |
US11227001B2 (en) | 2017-01-31 | 2022-01-18 | Experian Information Solutions, Inc. | Massive scale heterogeneous data ingestion and user resolution |
US11681733B2 (en) | 2017-01-31 | 2023-06-20 | Experian Information Solutions, Inc. | Massive scale heterogeneous data ingestion and user resolution |
US11652607B1 (en) | 2017-06-30 | 2023-05-16 | Experian Information Solutions, Inc. | Symmetric encryption for private smart contracts among multiple parties in a private peer-to-peer network |
US10735183B1 (en) | 2017-06-30 | 2020-08-04 | Experian Information Solutions, Inc. | Symmetric encryption for private smart contracts among multiple parties in a private peer-to-peer network |
US11157650B1 (en) | 2017-09-28 | 2021-10-26 | Csidentity Corporation | Identity security architecture systems and methods |
US11580259B1 (en) | 2017-09-28 | 2023-02-14 | Csidentity Corporation | Identity security architecture systems and methods |
US10699028B1 (en) | 2017-09-28 | 2020-06-30 | Csidentity Corporation | Identity security architecture systems and methods |
US10896472B1 (en) | 2017-11-14 | 2021-01-19 | Csidentity Corporation | Security and identity verification system and architecture |
US10911234B2 (en) | 2018-06-22 | 2021-02-02 | Experian Information Solutions, Inc. | System and method for a token gateway environment |
US11588639B2 (en) | 2018-06-22 | 2023-02-21 | Experian Information Solutions, Inc. | System and method for a token gateway environment |
US10880313B2 (en) | 2018-09-05 | 2020-12-29 | Consumerinfo.Com, Inc. | Database platform for realtime updating of user data from third party sources |
US11399029B2 (en) | 2018-09-05 | 2022-07-26 | Consumerinfo.Com, Inc. | Database platform for realtime updating of user data from third party sources |
US11265324B2 (en) | 2018-09-05 | 2022-03-01 | Consumerinfo.Com, Inc. | User permissions for access to secure data at third-party |
US10671749B2 (en) | 2018-09-05 | 2020-06-02 | Consumerinfo.Com, Inc. | Authenticated access and aggregation database platform |
US10963434B1 (en) | 2018-09-07 | 2021-03-30 | Experian Information Solutions, Inc. | Data architecture for supporting multiple search models |
US11734234B1 (en) | 2018-09-07 | 2023-08-22 | Experian Information Solutions, Inc. | Data architecture for supporting multiple search models |
US11315179B1 (en) | 2018-11-16 | 2022-04-26 | Consumerinfo.Com, Inc. | Methods and apparatuses for customized card recommendations |
US11620403B2 (en) | 2019-01-11 | 2023-04-04 | Experian Information Solutions, Inc. | Systems and methods for secure data aggregation and computation |
US11238656B1 (en) | 2019-02-22 | 2022-02-01 | Consumerinfo.Com, Inc. | System and method for an augmented reality experience via an artificial intelligence bot |
US11842454B1 (en) | 2019-02-22 | 2023-12-12 | Consumerinfo.Com, Inc. | System and method for an augmented reality experience via an artificial intelligence bot |
US11941065B1 (en) | 2019-09-13 | 2024-03-26 | Experian Information Solutions, Inc. | Single identifier platform for storing entity data |
US11438370B2 (en) | 2020-07-16 | 2022-09-06 | Capital One Services, Llc | Email security platform |
US11880377B1 (en) | 2021-03-26 | 2024-01-23 | Experian Information Solutions, Inc. | Systems and methods for entity resolution |
US11954655B1 (en) | 2021-12-15 | 2024-04-09 | Consumerinfo.Com, Inc. | Authentication alerts |
US11954731B2 (en) | 2023-03-06 | 2024-04-09 | Experian Information Solutions, Inc. | System and method for generating a finance attribute from tradeline data |
US11962681B2 (en) | 2023-04-04 | 2024-04-16 | Experian Information Solutions, Inc. | Symmetric encryption for private smart contracts among multiple parties in a private peer-to-peer network |
Also Published As
Publication number | Publication date |
---|---|
GB0625721D0 (en) | 2007-02-07 |
GB2430295A (en) | 2007-03-21 |
CA2571662A1 (en) | 2006-02-16 |
JP2008509479A (en) | 2008-03-27 |
KR20070038091A (en) | 2007-04-09 |
ZA200610807B (en) | 2008-06-25 |
WO2006017648A1 (en) | 2006-02-16 |
EP1784758A4 (en) | 2010-01-06 |
AU2005271453A1 (en) | 2006-02-16 |
EP1784758A1 (en) | 2007-05-16 |
US6955294B1 (en) | 2005-10-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6955294B1 (en) | Apparatus and method for preventing credit card fraud | |
US11288676B2 (en) | Private confirmation system | |
US5530438A (en) | Method of providing an alert of a financial transaction | |
US6068184A (en) | Security card and system for use thereof | |
US6422462B1 (en) | Apparatus and methods for improved credit cards and credit card transactions | |
US11379816B2 (en) | Secure electronic payment system | |
US20120203698A1 (en) | Method and System for Fraud Detection and Notification | |
US8645280B2 (en) | Electronic credit card with fraud protection | |
US20070073619A1 (en) | Biometric anti-fraud plastic card | |
US20030216997A1 (en) | Financial cards | |
US20010034717A1 (en) | Fraud resistant credit card using encryption, encrypted cards on computing devices | |
US20030135463A1 (en) | Credit authorization system and method | |
US20040177046A1 (en) | Credit card protection system | |
WO2011153355A2 (en) | Electronic credit card with fraud protection | |
EP1393271A2 (en) | Systems and method for approval of credit/debit account transactions using a wireless device | |
GB2398159A (en) | Electronic payment authorisation using a mobile communications device | |
RU2816675C2 (en) | System and method for protection against theft of funds during contact and contactless payment from bank card | |
Munyua | Operational response strategies to payment card fraud by commercial banks in Kenya | |
Upendar et al. | An overview of plastic card frauds and solutions for avoiding fraudster transactions | |
Buresh | Is Identity Theft Using Skimmers a Serious Threat or a Minor Inconvenience? | |
WO2009157003A1 (en) | A system and method for preventing misuse of stolen, lost, duplicated, forged and counterfeited credit card/debit card | |
Andreeva | RISK IN CARD PAYMENTS | |
KR200287479Y1 (en) | Magnetic card improved preservation function | |
JP2001306978A (en) | Electronic money recovery system | |
JP2006216001A (en) | Card security system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |