WO2001031483A2 - A system and method for verifying on-line information presented by internet users - Google Patents

A system and method for verifying on-line information presented by internet users Download PDF

Info

Publication number
WO2001031483A2
WO2001031483A2 PCT/US2000/029199 US0029199W WO0131483A2 WO 2001031483 A2 WO2001031483 A2 WO 2001031483A2 US 0029199 W US0029199 W US 0029199W WO 0131483 A2 WO0131483 A2 WO 0131483A2
Authority
WO
WIPO (PCT)
Prior art keywords
line user
information
user
application
line
Prior art date
Application number
PCT/US2000/029199
Other languages
French (fr)
Other versions
WO2001031483A3 (en
Inventor
Matt Ho
Greg M. Allio
Paul Guthrie
Rick Holloman Wesson
Original Assignee
Stock Power, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Stock Power, Inc. filed Critical Stock Power, Inc.
Priority to AU12254/01A priority Critical patent/AU1225401A/en
Publication of WO2001031483A2 publication Critical patent/WO2001031483A2/en
Publication of WO2001031483A3 publication Critical patent/WO2001031483A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising

Definitions

  • the present invention relates to a system and method for verifying on-line information, and more particularly, to a system and method for using a multi -layered identification scheme to identify Internet users.
  • a page of information on the Web may include references to other Web pages and may include a broad range of multimedia data including textual, graphical, audio, and animation information.
  • Internet users retrieve information from the Internet, through the Web, by 'visiting' a web site on a computer that is connected to the Internet.
  • the web site is, in general terms, a server application that displays information stored on a network server computer.
  • the web site accepts connections from client programs, such as Internet browser applications.
  • Browser applications such as Microsoft Internet Explorer TM or Netscape Navigator TM, allow Internet users to access information displayed on the web site. Most browser applications display information on computer screens and permit a user to navigate through the Web using a mouse.
  • Web browsing uses the client-server paradigm.
  • URL Uniform Resource Locator
  • the browser application becomes a client and it contacts a server application specified in the URL to request the document.
  • the browser application displays the document for the user.
  • the two applications follow the HyperText Transport Protocol (HTTP).
  • HTTP HyperText Transport Protocol
  • HTTP allows the browser application to request a specific article, which the server application then returns.
  • HTTP defines the exact format for requests sent from the browser application to the server application as well as the format of replies that the server application returns.
  • CSP Customer Stock Plan
  • the system accurately links anonymous Internet users to a real world address by using a multi-layered authentication process.
  • the authentication process includes a normalization component, a reflexive check component, an internal check component, a cross-reference check component, and a physical location check component.
  • the normalization component checks that all required fields have been filled out in the proper format.
  • the reflexive check component checks that values and formats of predetermined data elements are correct by using predefined rules.
  • the internal check component validates the information entered by the user against information previously entered by other users.
  • the cross-reference check component uses third party and external data sources to determine whether multiple data elements are valid when considered together.
  • the physical location check component binds the information given by the user to a physical address, thereby accurately confirming a user's identity. Since there is cost associated with processing each component, the inventive system performs the checks in a predefined order to accurately and efficiently authenticate information presented by the user while minimizing cost.
  • the user Upon selecting to participate in the CSP or another on-line purchase/reward plan, the user is directed to a web site utilizing the inventive system.
  • the user may be directed to a third party's web site.
  • the inventive system web site or the third party's web site is used to collect personal information from the user and to provide access to other investment information.
  • the authentication process requires the user to enter personal and financial information.
  • the authentication process then normalizes the information collected from the user into a standardized format for manipulation by the system.
  • the authentication process verifies the user's address and other personal information using information obtained from third parties.
  • the system requires the user to call from a previously specified phone number to activate the assigned account.
  • the authentication component verifies the calling phone number used by the Internet user against the calling telephone's phone number as supplied by Automatic Number Identification (ANI), thus binding the user to a specific place and time.
  • ANI Automatic Number Identification
  • the present invention provides a system for using a multi-layer identity verification scheme by linking the on-line user to a physical address when the on-line user fills out an application on the system, the system comprising: a normalization component for ensuring that the user fills out all required fields in the application and for checking that all required fields have been filled out in proper formats; a reflexive check component for using predefined rules to validate that structures and values of predetermined data elements in the application are correct; an internal check component for comparing the information entered by the on-line user against information entered by previous on-line users; a cross-reference check component for determining whether multiple data elements are valid when considered against an external data source; and a physical location component for binding and verifying certain information given by the user to a physical address.
  • the present invention also provides a system for using a multi-layer identity verification scheme by linking the on-line user to a physical address when the on-line user fills out an application on the system, the system comprising: a plurality of components for ensuring that the user fills out all required fields in the application, for checking that all required fields have been filled out in proper formats, for using predefined rules to validate that structures and values of predetermined data elements in the application are correct, for comparing the information entered by the on-line user against information entered by previous on-line users, for determining whether multiple data elements are valid when considered against an external data source; and for binding and verifying certain information given by the user to the physical address; and means for executing the each of the plurality of components in a predefined order to accurately and efficiently authenticate information presented by the user while minimizing cost
  • the present invention also provides a method for using a multi-layer identification scheme to identify an on-line user by linking the on-line user to a physical address when the on-line user fills out an application on a system, the method
  • the present invention also provides a system for using a multi-layer identification scheme to identify an on-line user by linking the on-line user to a physical address when the on-line user fills out an application on the system, the system comprising: a web page for enabling the on-line user to enter information in the application and means for submitting the entered information to a rules engine; means for checking that predefined information entered by the on-line user was not previously submitted by another user and for obtaining a certificate for the user; means, in a normalization component, for ensuring that the user fills out all required fields in the application in a proper format and normalizing information in the required fields; means, in a reflexive check component, for using a credit card verification algorithm to verify credit card information, for performing a cyclic redundancy check to determine a valid format for a bank routing number, and for validating the telephone number to determine whether the telephone number is associated with a standard residential telephone line; means, in an internal check component, for comparing the information entered by the on-line user against information entered by previous
  • Fig. 1 illustrates a computer network in which the inventive system may be incorporated;
  • Fig. 2 illustrates the TCP/IP Layering Model Protocol used during communications between components on the computer network
  • Fig. 3 illustrates a rules engine for performing checks on information supplied by a subscriber of the system
  • Fig. 4 illustrates the information that an investor is required to enter to purchase stock on-line
  • Fig. 5 illustrates how the normalization component normalizes all information entered by the investor
  • Fig. 6 illustrates the steps implemented by reflexive check component
  • Fig. 7 illustrates the steps implemented by internal check component
  • Fig. 8 illustrates the steps implemented by cross-reference check component
  • Fig. 9 illustrates the steps implemented by the ANI check.
  • Fig. 1 is an example of a local area network (LAN) 100 that is configured to utilize a non-repudiation protocol.
  • LAN 100 comprises a server 102, four computer systems 104- 110, and peripherals, such as printers and other devices 112, that may be shared by components on LAN 100.
  • Computer systems 104-110 may serve as clients for server 102 and/or as clients and/or servers for each other and/or for other components connected to LAN 100.
  • Components on LAN 100 are preferably connected together by cable media, for example copper or fiber-optic cable and the network topology may be a token ring topology 114. It should be apparent to those of ordinary skill in the art that other media, for example, wireless media, such as optical and radio frequency, may also connect LAN 100 components. It should also be apparent that other network topologies, such as Ethernet, may be used. Data may be transferred between components on LAN 100 in packets, i.e., blocks of data that are individually transmitted over LAN 100. Routers 120, 122 create an expanded network by connecting LAN 100 to other computer networks, such as the Internet, other LANs or Wide Area Networks (WAN).
  • cable media for example copper or fiber-optic cable and the network topology may be a token ring topology 114.
  • other media for example, wireless media, such as optical and radio frequency
  • network topologies such as Ethernet
  • Data may be transferred between components on LAN 100 in packets, i.e., blocks of data that are individually transmitted over
  • Routers are hardware devices that may include a conventional processor, memory, and separate I/O interface for each network to which it connects. Hence, components on the expanded network may share information and services with each other. In order for communications to occur between components of physically connected networks, all components on the expanded network and the routers that connect them must adhere to a standard protocol. Computer networks connected to the Internet and to other networks typically use TCP/IP Layering Model Protocol. It should be noted that other internetworking protocols may be used.
  • TCP/IP Layering Model comprises an application layer (Layer 5) 202, a transport layer (Layer 4) 204, an Internet layer (Layer 3) 206, a network interface layer (Layer 2) 208, and a physical layer (Layer 1) 210.
  • Application layer protocols 202 specify how each software application connected to the network uses the network.
  • Transport layer protocols 204 specify how to ensure reliable transfer among complex protocols.
  • Internet layer protocols 206 specify the format of packets sent across the network as well as mechanisms used to forward packets from a computer through one or more routers to a final destination.
  • Network interface layer protocols 208 specify how to organize data into frames and how a computer transmits frames over the network.
  • Physical layer protocols 210 correspond to the basic network hardware.
  • Fig. 3 illustrates a rules engine 300 for performing checks on information supplied by a subscriber of the system.
  • Rules engine 300 includes a normalization component 302, a reflexive check component 304, an internal check component 306, a cross-reference check component 308, and a physical location check component 310.
  • Normalization component 302 is used to ensure that the subscriber has filled out required information fields and that the information in the required information fields is in the proper format.
  • Reflexive check component 304 uses predefined rules to validate structures of particular data elements in order to determine whether those data elements have been entered in the correct sequence.
  • Internal check component 306 uses information that was previously entered by other subscribers to determine whether an attempt is being made to impersonate another subscriber.
  • Cross-reference check component 308 uses external data sources to determine whether multiple data elements are valid when considered together.
  • Physical location check component 310 binds and verifies information given by the subscriber to a physical location. Since there is cost associated with performing each check in rules engine 300, the system performs the checks in a predefined order to accurately and efficiently verify information while minimizing cost. Thus, the checks that cost the least and are the most powerful in identifying valid and inaccurate information are utilized first. Specifically, in a preferred embodiment of the invention, when a subscriber registers with the system, the subscriber enters information into a user interface on a system web site and submits the information for on-line processing.
  • a subscriber/investor applying to purchase equity on-line directly from a public company is required to enter personal information on-line.
  • the present invention may be used to verify on-line information related to any activity where the identity of an on-line person needs to be verified.
  • Fig. 4 illustrates the information that an investor may be required to enter to purchase equity on-line.
  • the investor is required to enter a name, address, telephone number, e-mail address, credit card information, bank information and social security number.
  • the user may be required to enter other information to purchase equity on-line.
  • the system verifies that the social security number and bank account were not previously submitted by another investor and requests a certificate for the new investor.
  • the information is stored and rules engine 300 is called.
  • Rules engine 300 queries a database for fields used by components 302-310 to perform a series of checks and either accepts or rejects the registration application.
  • normalization component 302 normalizes all information entered by the investor so that the resulting data can be properly utilized by algorithms in rules engine 300. Normalization component 302 formats the information by checking that all fields have data. If a field is blank, normalization check component 302 rejects the registration application. Normalization component 302 then changes the street number, zip code, phone number, credit card number, checking account number, check routing number and social security number fields to integers, and removes non-integer characters. Other normalization schemes will be known to those of ordinary skill in the art, and are within the scope of the present invention.
  • reflexive check component 304 Upon normalizing, the information reflexive check component 304 processes the information.
  • Fig. 6 illustrates the steps implemented by reflexive check component 304.
  • reflexive check component 304 ensures that the requested information in the registration form has been filled out. If the requested information has not been provided, and the fields in the registration application are blank, the registration application is rejected.
  • reflexive check component 304 uses a credit card verification algorithm to check that the credit card number is in a valid format and to determine the type of credit card, such as VisaTM or MasterCardTM. If the credit card information fails this test, reflexive check component 304 rejects the registration application.
  • reflexive check component 304 also performs a cyclic redundancy check on the bank routing number from the user's check to determine if it is in a valid format. If the check routing number format is invalid, reflexive check component 304 rejects the registration application. Thereafter, in Step 6040, reflexive check component 304 compares the area code and prefix in the telephone number against a telephone company database. This enables reflexive check component 304 to determine whether the prefix is valid and whether it is contained within the area code entered, and to determine whether the telephone line associated with the telephone number is a standard residential phone line, as opposed to a PBX, cell phone, pager, etc. If the telephone line is not a standard residential line, component 304 rejects the registration application. In Step 6050, reflexive check component 304 forwards the information to internal check component 306.
  • Fig. 7 illustrates the steps implemented by internal check component 306.
  • internal check component 306 compares the investor's social security number, credit card number, checking account and routing number against the social security numbers, credit card numbers, checking accounts and routing numbers associated with active accounts in a system database. Each active account contains information supplied by other investors.
  • Step 7020 internal check component 306 rejects the registration application if the social security number, credit card number, or checking account and routing number combination is currently in the system database of active accounts. Internal check component 306 does not check the checking account against pending accounts in the database so that investors applying jointly at the same time can use the same account information. However, once an account becomes active, a new investor cannot use the same account information.
  • Step 7030 upon processing the information, internal check component 306 transmits the information to cross-reference check component 308.
  • Fig. 8 illustrates the steps implemented by cross-reference check component 308.
  • cross-reference check component 308 uses a census bureau zip code file and a conversion routine to convert the latitude/longitude of the centroid of the zip code to a telephone company coordinate system.
  • cross-reference check component 308 uses a telephone company database to look up the coordinates of a telephone switch indicated by the telephone area code and prefix.
  • cross-reference check component 308 then calculates the distance between the zip code and the telephone switch coordinates. The application is rejected if the distance is greater than a predefined threshold.
  • cross-reference check component 308 checks the available credit on the credit card and the application is rejected if there is insufficient funds on the credit card to pay for the processing fee.
  • cross-reference check component 308 uses the investor's social security number and an external database to verify and cross check the investor's name and address. The application is rejected if the name and address verification fails.
  • cross-reference check component 308 searches the investor's data in the database and evaluates any additional information on the investor, and then searches the additional information for predetermined codes indicating potentially fraudulent behavior. For example, predetermined codes may indicate a suspicious address or information, such as a social security number entered by the investor that belongs to a deceased person.
  • Cross-reference check component 308 rejects the application if there are certain suspicious information codes associated with the investor.
  • Rules engine 300 then constructs a bit vector showing the scoring results for each test. Certain bit patterns will cause the application to be rejected. If the application is not rejected, the investor's account is marked as pending and a request to credit the investor's credit card for the application-processing fee is created. The investor may now enter transactions. However, they will not be processed until the account status is changed to "approved”.
  • Fig. 9 illustrates the steps implement in performing physical location check 310.
  • the investor is sent an e-mail message instructing the investor to use his/her home telephone to call a specific number and to enter a pre-assigned personal identification number (PIN) contained in the e-mail.
  • PIN personal identification number
  • Step 9020 when the investor calls the identified number, the number of the phone being used by the investor is automatically retrieved with an automatic number identification component. The retrieved digits are temporarily stored in a buffer. Messages are then played instructing the investor to enter an activation code.
  • Step 9030 the automatic number identification component decodes the keypad presses and performs calculations to construct a database lookup code which retrieves the telephone number originally entered by the investor during the registration process from the investor's data in the database.
  • physical location check component 310 compares the telephone number in the database to the calling phone number in the buffer. If the calling phone number does not match the telephone number in the application, the investor is instructed to re-enter the activation number. If the numbers still do not match, the account is not activated.
  • Step 9050 if the telephone numbers match, rules engine 300 requests that the account is marked approved and the request for the application fee is processed. It should be noted that additional tests may also be used to further validate an individual's identity.

Abstract

An on-line commerce system and method for using a multi-layered identification scheme to identify users. The system accurately links anonymous Internet users to a real world address by using a multi-layered authentication component. The authentication component includes a normalization component, a reflexive check component, an internal check component, a cross-reference check component and a physical location check component.

Description

A System and Method For Verifying On-line Information Presented by
Internet Users
This application claims the benefit of U. S. Provisional Application No. 60/160,914, filed on October 22, 1999.
FIELD OF THE INVENTION
The present invention relates to a system and method for verifying on-line information, and more particularly, to a system and method for using a multi -layered identification scheme to identify Internet users.
BACKGROUND OF THE INVENTION
Advances in computer processing power and network communications have made information from a wide variety of sources available to users on computer networks. Computer networking allows network computer users to share information, software applications and hardware devices and internetworking enables a set of physical networks to be connected into a single network such as the Internet. Today, computers connected to the Internet have almost instant access to information stored in relatively distant regions. Moreover, computers connected to networks other than the Internet also have access to information stored on those networks. The World Wide Web (Wτeb), a hypermedia system used on the Internet, enables hypertext linking, whereby documents automatically reference or link other documents located on connected computer networks around the world. Thus, users connected to the Internet have almost instant access to information stored in relatively distant regions.
A page of information on the Web may include references to other Web pages and may include a broad range of multimedia data including textual, graphical, audio, and animation information. Currently, Internet users retrieve information from the Internet, through the Web, by 'visiting' a web site on a computer that is connected to the Internet.
The web site is, in general terms, a server application that displays information stored on a network server computer. The web site accepts connections from client programs, such as Internet browser applications. Browser applications, such as Microsoft Internet Explorer ™ or Netscape Navigator ™, allow Internet users to access information displayed on the web site. Most browser applications display information on computer screens and permit a user to navigate through the Web using a mouse. Like other network applications, Web browsing uses the client-server paradigm. When given the Uniform Resource Locator (URL) of a document, the browser application becomes a client and it contacts a server application specified in the URL to request the document. After receiving the document from the server application, the browser application displays the document for the user. When the browser application interacts with the server application, the two applications follow the HyperText Transport Protocol (HTTP). HTTP allows the browser application to request a specific article, which the server application then returns. To ensure that browser applications and server applications inter-operate unambiguously, HTTP defines the exact format for requests sent from the browser application to the server application as well as the format of replies that the server application returns.
As the number of physical networks connected to the Internet continues to grow, so too will the number of web sites that are accessible to Internet users and so too will commercial activity on the Internet. Providers of a wide range of products and/or services are continuously exploring new methods for promoting and selling them. With changes in federal regulations it is also easier for publicly held companies to sell shares of their stock to potential investors directly rather than selling through a broker. For example, public companies may use a Customer Stock Plan (CSP) to offer stock in the company directly to the public. Investors purchasing shares through the CSP become registered shareholders in the company rather than allowing the broker to hold their shares in a "street" name.
Research has shown that CSP investors are more loyal customers to the companies in which they hold equity than customers who are not investors. However, until now, CSP investors were required to enroll in these plans and perform transactions by mail. This has been a time-consuming and intimidating process that limited the number of people willing to invest in CSP plans. Consequently, as use of the Internet has increased, many companies have become interested in offering investors the opportunity to enroll in their CSP plans over the Internet. Because Internet-based transactions are lacking the physical documentation linking an investor to the information required for plan enrollment, a system is needed that is capable of accurately verifying the identity of otherwise anonymous
Internet users. Currently, there are many identity verification systems, such as VeriSign™, which are used for selling goods on-line. Most of these systems only check the credit card information provided by the Internet users against credit card companies' databases for fraud identification. These systems thus do not bind the anonymous Internet user to a physical entity. Other than checking the zip code of the credit card billing address (called AVS verification), the customer's actual address is not verified. Even if the user's information is verified against a database, or an e-mail message is sent to the user to confirm the user's e-mail address, there is still no way of binding an on-line user to a physical entity. Thus a first on-line user with access to a second on-line user's personal information is easily able to impersonate the second on-line user. Since selling securities on-line may involve substantial amounts of money, a secure e-commerce system that has a reliable and effective identity verification scheme yet minimizes third party database costs is needed.
SUMMARY OF THE INVENTION It is therefore an object of the present invention to provide an on-line commerce system and method for using a multi-layered identification scheme to authenticate users. The system accurately links anonymous Internet users to a real world address by using a multi-layered authentication process. The authentication process includes a normalization component, a reflexive check component, an internal check component, a cross-reference check component, and a physical location check component. The normalization component checks that all required fields have been filled out in the proper format. The reflexive check component checks that values and formats of predetermined data elements are correct by using predefined rules. The internal check component validates the information entered by the user against information previously entered by other users. The cross-reference check component uses third party and external data sources to determine whether multiple data elements are valid when considered together. The physical location check component binds the information given by the user to a physical address, thereby accurately confirming a user's identity. Since there is cost associated with processing each component, the inventive system performs the checks in a predefined order to accurately and efficiently authenticate information presented by the user while minimizing cost.
It is another object of the present invention to enable an Internet user to enroll in a company's CSP plan or another on-line purchase/reward plan by visiting a corporate web site where the CSP is offered. Upon selecting to participate in the CSP or another on-line purchase/reward plan, the user is directed to a web site utilizing the inventive system. Alternatively, the user may be directed to a third party's web site. The inventive system web site or the third party's web site is used to collect personal information from the user and to provide access to other investment information. The authentication process requires the user to enter personal and financial information. The authentication process then normalizes the information collected from the user into a standardized format for manipulation by the system. The authentication process then verifies the user's address and other personal information using information obtained from third parties.
If all of the above mentioned third-party information is consistent with the information entered by the user, the user is e-mailed a personal identification number and other information required to activate an account. Finally, to complete the identity verification process, the system requires the user to call from a previously specified phone number to activate the assigned account. Upon calling to activate the assigned account, the authentication component verifies the calling phone number used by the Internet user against the calling telephone's phone number as supplied by Automatic Number Identification (ANI), thus binding the user to a specific place and time. The inventive system therefore greatly reduces the likelihood of identity fraud in on-line purchases.
Additional features and advantages of the invention will be set forth in the description that follows, and in part will be apparent from the description, or may be learned by practice of the invention. The objectives and advantages of the invention will be realized and attained by the system particularly pointed out in the written description and claims hereof as well as the appended drawings.
To achieve these and other advantages and in accordance with the purpose of the invention, as embodied and broadly described, the present invention provides a system for using a multi-layer identity verification scheme by linking the on-line user to a physical address when the on-line user fills out an application on the system, the system comprising: a normalization component for ensuring that the user fills out all required fields in the application and for checking that all required fields have been filled out in proper formats; a reflexive check component for using predefined rules to validate that structures and values of predetermined data elements in the application are correct; an internal check component for comparing the information entered by the on-line user against information entered by previous on-line users; a cross-reference check component for determining whether multiple data elements are valid when considered against an external data source; and a physical location component for binding and verifying certain information given by the user to a physical address.
The present invention also provides a system for using a multi-layer identity verification scheme by linking the on-line user to a physical address when the on-line user fills out an application on the system, the system comprising: a plurality of components for ensuring that the user fills out all required fields in the application, for checking that all required fields have been filled out in proper formats, for using predefined rules to validate that structures and values of predetermined data elements in the application are correct, for comparing the information entered by the on-line user against information entered by previous on-line users, for determining whether multiple data elements are valid when considered against an external data source; and for binding and verifying certain information given by the user to the physical address; and means for executing the each of the plurality of components in a predefined order to accurately and efficiently authenticate information presented by the user while minimizing cost The present invention also provides a method for using a multi-layer identification scheme to identify an on-line user by linking the on-line user to a physical address when the on-line user fills out an application on a system, the method comprising the steps of: registering, by the on-line user, with the system and entering information into a user interface on the system's web site; ensuring, in a normalization component, that the on-line user fills out all required fields in the application and checking that all required fields have been filled out in a proper format; using predefined rules, in a reflexive check component, to validate that structures and values of predetermined data elements in the application are correct; comparing, in an internal check component, the information entered by the on-line user against information entered by previous on-line users; determining, in a cross-reference check component, whether multiple data elements are valid when considered against an external data source; and binding and verifying in a physical location component certain information given by the user to the physical address.
The present invention also provides a system for using a multi-layer identification scheme to identify an on-line user by linking the on-line user to a physical address when the on-line user fills out an application on the system, the system comprising: a web page for enabling the on-line user to enter information in the application and means for submitting the entered information to a rules engine; means for checking that predefined information entered by the on-line user was not previously submitted by another user and for obtaining a certificate for the user; means, in a normalization component, for ensuring that the user fills out all required fields in the application in a proper format and normalizing information in the required fields; means, in a reflexive check component, for using a credit card verification algorithm to verify credit card information, for performing a cyclic redundancy check to determine a valid format for a bank routing number, and for validating the telephone number to determine whether the telephone number is associated with a standard residential telephone line; means, in an internal check component, for comparing the information entered by the on-line user against information entered by previous on-line users and comparing the on-line user's information against information in active accounts in a system database; means, in a cross-reference check component, for determining whether multiple data elements are valid when considered against an external data source, verifying zip code information entered by the on-line user against a telephone company database, and converting the zip code information to a telephone company coordinate system, ensuring that there is sufficient funds on a credit card presented by the on-line user, comparing the on-line user's name and address against a third party database to determine if predetermined fraudulent activity codes are associated with the on-line user; means in a physical location component for binding and verifying the information given by the user to the physical address, automatically retrieving the on-line user's telephone number with an automatic number identification component, emailing to the on-line user a system generated pin number which is subsequently entered by the on-line user to retrieve the telephone number in the on-line user's account, comparing a retrieved telephone number to the telephone number associated with the telephone used by the on-line user, thereby binding the on-line user to the physical address; and means in each component for rejecting the application if predefined checks performed by the component fails.
BRIEF DESCRIPTION OF THE DRAWINGS The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention that together with the description serve to explain the principles of the invention. In the drawings: Fig. 1 illustrates a computer network in which the inventive system may be incorporated;
Fig. 2 illustrates the TCP/IP Layering Model Protocol used during communications between components on the computer network;
Fig. 3 illustrates a rules engine for performing checks on information supplied by a subscriber of the system;
Fig. 4 illustrates the information that an investor is required to enter to purchase stock on-line;
Fig. 5 illustrates how the normalization component normalizes all information entered by the investor; Fig. 6 illustrates the steps implemented by reflexive check component; Fig. 7 illustrates the steps implemented by internal check component;
Fig. 8 illustrates the steps implemented by cross-reference check component; and
Fig. 9 illustrates the steps implemented by the ANI check.
DESCRIPTION OF THE PREFERRED EMBODIMENTS
Reference will now be made in detail to the preferred embodiments of the present invention, examples of which are illustrated in the accompanying drawings. The present invention described below extends the functionality of the inventive system and method for efficiently and accurately identifying and verifying on-line users. Fig. 1 is an example of a local area network (LAN) 100 that is configured to utilize a non-repudiation protocol. LAN 100 comprises a server 102, four computer systems 104- 110, and peripherals, such as printers and other devices 112, that may be shared by components on LAN 100. Computer systems 104-110 may serve as clients for server 102 and/or as clients and/or servers for each other and/or for other components connected to LAN 100. Components on LAN 100 are preferably connected together by cable media, for example copper or fiber-optic cable and the network topology may be a token ring topology 114. It should be apparent to those of ordinary skill in the art that other media, for example, wireless media, such as optical and radio frequency, may also connect LAN 100 components. It should also be apparent that other network topologies, such as Ethernet, may be used. Data may be transferred between components on LAN 100 in packets, i.e., blocks of data that are individually transmitted over LAN 100. Routers 120, 122 create an expanded network by connecting LAN 100 to other computer networks, such as the Internet, other LANs or Wide Area Networks (WAN). Routers are hardware devices that may include a conventional processor, memory, and separate I/O interface for each network to which it connects. Hence, components on the expanded network may share information and services with each other. In order for communications to occur between components of physically connected networks, all components on the expanded network and the routers that connect them must adhere to a standard protocol. Computer networks connected to the Internet and to other networks typically use TCP/IP Layering Model Protocol. It should be noted that other internetworking protocols may be used.
As illustrated in Fig. 2, TCP/IP Layering Model comprises an application layer (Layer 5) 202, a transport layer (Layer 4) 204, an Internet layer (Layer 3) 206, a network interface layer (Layer 2) 208, and a physical layer (Layer 1) 210. Application layer protocols 202 specify how each software application connected to the network uses the network. Transport layer protocols 204 specify how to ensure reliable transfer among complex protocols. Internet layer protocols 206 specify the format of packets sent across the network as well as mechanisms used to forward packets from a computer through one or more routers to a final destination. Network interface layer protocols 208 specify how to organize data into frames and how a computer transmits frames over the network. Physical layer protocols 210 correspond to the basic network hardware. By using TCP/IP Layering model protocols, any component connected to the network can communicate with any other component connected directly or indirectly to one of the attached networks.
Fig. 3 illustrates a rules engine 300 for performing checks on information supplied by a subscriber of the system. Rules engine 300 includes a normalization component 302, a reflexive check component 304, an internal check component 306, a cross-reference check component 308, and a physical location check component 310. Normalization component 302 is used to ensure that the subscriber has filled out required information fields and that the information in the required information fields is in the proper format. Reflexive check component 304 uses predefined rules to validate structures of particular data elements in order to determine whether those data elements have been entered in the correct sequence. Internal check component 306 uses information that was previously entered by other subscribers to determine whether an attempt is being made to impersonate another subscriber. Cross-reference check component 308 uses external data sources to determine whether multiple data elements are valid when considered together. Physical location check component 310 binds and verifies information given by the subscriber to a physical location. Since there is cost associated with performing each check in rules engine 300, the system performs the checks in a predefined order to accurately and efficiently verify information while minimizing cost. Thus, the checks that cost the least and are the most powerful in identifying valid and inaccurate information are utilized first. Specifically, in a preferred embodiment of the invention, when a subscriber registers with the system, the subscriber enters information into a user interface on a system web site and submits the information for on-line processing. For example, a subscriber/investor applying to purchase equity on-line directly from a public company is required to enter personal information on-line. It should be noted that while the examples in this embodiment are directed to purchasing equity on-line, the present invention may be used to verify on-line information related to any activity where the identity of an on-line person needs to be verified.
Fig. 4 illustrates the information that an investor may be required to enter to purchase equity on-line. The investor is required to enter a name, address, telephone number, e-mail address, credit card information, bank information and social security number. As would be obvious to those skilled in the art, the user may be required to enter other information to purchase equity on-line. The system verifies that the social security number and bank account were not previously submitted by another investor and requests a certificate for the new investor. Upon receiving the certificate, the information is stored and rules engine 300 is called. Rules engine 300 queries a database for fields used by components 302-310 to perform a series of checks and either accepts or rejects the registration application. If the investor's information is correct, the investor is informed of a successful registration and the investor's account is placed in a pending status. If the registration application is rejected, the investor is instructed how to proceed via a system- generated e-mail message. As illustrated in Fig. 5, normalization component 302 normalizes all information entered by the investor so that the resulting data can be properly utilized by algorithms in rules engine 300. Normalization component 302 formats the information by checking that all fields have data. If a field is blank, normalization check component 302 rejects the registration application. Normalization component 302 then changes the street number, zip code, phone number, credit card number, checking account number, check routing number and social security number fields to integers, and removes non-integer characters. Other normalization schemes will be known to those of ordinary skill in the art, and are within the scope of the present invention.
Upon normalizing, the information reflexive check component 304 processes the information. Fig. 6 illustrates the steps implemented by reflexive check component 304. In Step 6010, reflexive check component 304 ensures that the requested information in the registration form has been filled out. If the requested information has not been provided, and the fields in the registration application are blank, the registration application is rejected. In Step 6020, reflexive check component 304 uses a credit card verification algorithm to check that the credit card number is in a valid format and to determine the type of credit card, such as Visa™ or MasterCard™. If the credit card information fails this test, reflexive check component 304 rejects the registration application. In Step 6030, reflexive check component 304 also performs a cyclic redundancy check on the bank routing number from the user's check to determine if it is in a valid format. If the check routing number format is invalid, reflexive check component 304 rejects the registration application. Thereafter, in Step 6040, reflexive check component 304 compares the area code and prefix in the telephone number against a telephone company database. This enables reflexive check component 304 to determine whether the prefix is valid and whether it is contained within the area code entered, and to determine whether the telephone line associated with the telephone number is a standard residential phone line, as opposed to a PBX, cell phone, pager, etc. If the telephone line is not a standard residential line, component 304 rejects the registration application. In Step 6050, reflexive check component 304 forwards the information to internal check component 306.
Fig. 7 illustrates the steps implemented by internal check component 306. In Step 7010, internal check component 306 compares the investor's social security number, credit card number, checking account and routing number against the social security numbers, credit card numbers, checking accounts and routing numbers associated with active accounts in a system database. Each active account contains information supplied by other investors. In Step 7020, internal check component 306 rejects the registration application if the social security number, credit card number, or checking account and routing number combination is currently in the system database of active accounts. Internal check component 306 does not check the checking account against pending accounts in the database so that investors applying jointly at the same time can use the same account information. However, once an account becomes active, a new investor cannot use the same account information. In Step 7030, upon processing the information, internal check component 306 transmits the information to cross-reference check component 308. Fig. 8 illustrates the steps implemented by cross-reference check component 308. In
Step 8010, cross-reference check component 308 uses a census bureau zip code file and a conversion routine to convert the latitude/longitude of the centroid of the zip code to a telephone company coordinate system. In Step 8020, cross-reference check component 308 uses a telephone company database to look up the coordinates of a telephone switch indicated by the telephone area code and prefix. In Step 8030, cross-reference check component 308 then calculates the distance between the zip code and the telephone switch coordinates. The application is rejected if the distance is greater than a predefined threshold. In Step 8040, cross-reference check component 308 then checks the available credit on the credit card and the application is rejected if there is insufficient funds on the credit card to pay for the processing fee. In Step 8050, cross-reference check component 308 uses the investor's social security number and an external database to verify and cross check the investor's name and address. The application is rejected if the name and address verification fails. In Step 8060, cross-reference check component 308 then searches the investor's data in the database and evaluates any additional information on the investor, and then searches the additional information for predetermined codes indicating potentially fraudulent behavior. For example, predetermined codes may indicate a suspicious address or information, such as a social security number entered by the investor that belongs to a deceased person. Cross-reference check component 308 rejects the application if there are certain suspicious information codes associated with the investor.
Rules engine 300 then constructs a bit vector showing the scoring results for each test. Certain bit patterns will cause the application to be rejected. If the application is not rejected, the investor's account is marked as pending and a request to credit the investor's credit card for the application-processing fee is created. The investor may now enter transactions. However, they will not be processed until the account status is changed to "approved".
Fig. 9 illustrates the steps implement in performing physical location check 310. In Step 9010, the investor is sent an e-mail message instructing the investor to use his/her home telephone to call a specific number and to enter a pre-assigned personal identification number (PIN) contained in the e-mail. In Step 9020, when the investor calls the identified number, the number of the phone being used by the investor is automatically retrieved with an automatic number identification component. The retrieved digits are temporarily stored in a buffer. Messages are then played instructing the investor to enter an activation code. In Step 9030, the automatic number identification component decodes the keypad presses and performs calculations to construct a database lookup code which retrieves the telephone number originally entered by the investor during the registration process from the investor's data in the database. In Step 9040, physical location check component 310 compares the telephone number in the database to the calling phone number in the buffer. If the calling phone number does not match the telephone number in the application, the investor is instructed to re-enter the activation number. If the numbers still do not match, the account is not activated. In Step 9050, if the telephone numbers match, rules engine 300 requests that the account is marked approved and the request for the application fee is processed. It should be noted that additional tests may also be used to further validate an individual's identity. The foregoing description has been directed to specific embodiments of this invention. It will be apparent, however, that other variations and modifications may be made to the described embodiments, with the attainment of some or all of their advantages.

Claims

What is Claimed: 1. A system for using a multi-layer identity verification scheme by linking the on-line user to a physical address when the on-line user fills out an application on the system, the system comprising: a normalization component for ensuring that the user fills out all required fields in the application and for checking that all required fields have been filled out in proper formats; a reflexive check component for using predefined rules to validate that structures and values of predetermined data elements in the application are correct; an internal check component for comparing the information entered by the on-line user against information entered by previous on-line users; a cross-reference check component for determining whether multiple data elements are valid when considered against an external data source; and a physical location component for binding and verifying certain information given by the user to a physical address.
2. A system for using a multi-layer identity verification scheme by linking the on-line user to a physical address when the on-line user fills out an application on the system, the system comprising: a plurality of components for ensuring that the user fills out all required fields in the application, for checking that all required fields have been filled out in proper formats, for using predefined rules to validate that structures and values of predetermined data elements in the application are correct, for comparing the information entered by the on-line user against information entered by previous on-line users, for determining whether multiple data elements are valid when considered against an external data source; and for binding and verifying certain information given by the user to the physical address; and means for executing the each of the plurality of components in a predefined order to accurately and efficiently authenticate information presented by the user while minimizing cost.
3. The system of claim 2, wherein the means for executing further comprises means for executing first identity checks that cost the least and are the most powerful in identifying valid and accurate information.
4. The system of claim 1, wherein the system further comprises a web site that is used to collect personal information from the on-line user and to provide access by the system to other investment information.
5. The system of claim 4, wherein the user is required to enter personal information in the web site.
6. The system of claim 5, wherein the user is required to enter a name, address, phone number, e-mail address, credit card information, bank information, and social security number in the web site.
7. The system of claim 5, wherein the internal check component validates that information entered by the on-line user were not previously submitted by another on-line user, and issues a certificate for the on-line user.
8. The system of claim 7, further comprising a database to store the on-line user's personal information and a rules engine to approve the on-line application.
9. The system of claim 1, wherein the normalization component changes information in the required fields to integers and rejects the application if at least one required field is blank.
10. The system of claim 1, wherein the reflexive check component comprises: verification means for ensuring that requested information in a registration form is filled out; a credit card verification algorithm to check that a credit card number entered by the on-line user is in a valid format and to determine the credit card type; a cyclic redundancy check to determine if a bank routing number is in a valid format; a telephone number identification means to compare an entered area code and a prefix in the telephone number against an external database to determine whether the prefix is valid, whether it is contained within the area code entered, and whether it is associated with a standard residential phone line; and rejection means to reject the on-line user application if the verification means, the algorithm, the cyclic redundancy check or the telephone number identification means fails.
11. The system of claim 1 , wherein the internal check component: compares the on-line user's social security number, credit card number, checking account number and routing number against information in active accounts in a system database; rejects the application if the checking account or routing number is currently in at least one active account in the system database; and rejects the application if the social security number, or credit card number is currently in at least one account in the system database.
12. The system of claim 1, wherein the cross-reference check component: uses a zip code file and a conversion routine to convert the latitude and the longitude of a centroid of the zip code entered by the on-line user to a telephone company coordinate system; uses a first external database to look up the coordinates of a telephone switch indicated by a telephone area code and prefix entered by the on-line user, calculates the distance between the zip code and the telephone switch coordinates, and rejects the application if the distance is greater than a predefined threshold; uses the on-line user's social security number and a second external database to verify and cross check the on-line user's name and address and rejects the application of the verification fails; and searches the on-line user's data in a third database, evaluates any additional information associated with the on-line user, searches the additional information for predetermined codes, and rejects the application if certain codes are present in the user's information.
13. The system of claim 12, wherein the cross-reference check component checks available credit on a credit card presented by the on-line user and rejects the application if there is insufficient funds on the credit card for a processing fee.
14. The system of claim 1, wherein the on-line user's account is marked as pending if the application is not rejected and a request to the on-line user's credit card for a processing fee is created, thereby enabling the on-line user to enter transactions into the system, and whereby transactions in a pending account are not processed until the account status is changed to approved.
15. The system of claim 1, wherein a bit vector is constructed for showing a scoring result for each check, whereby certain bit patterns causes the system to reject the application.
16. The system of claim 1, wherein an e-mail message is sent to the on-line user instructing the on-line user to call a specific number and to enter a pre-assigned personal identification number contained in the e-mail message.
17. The system of claim 1, wherein the physical location check component: automatically retrieves the on-line user's telephone number with an automatic number identification component; and uses a pin number entered by the on-line user to compare the telephone number in the on-line user's account to the telephone number associated with the telephone used by the on-line user, thereby binding the on-line user to the physical address.
18. The system of claim 17, wherein the automatic number identification component instructs the on-line user to enter an activation code, decodes keypad presses by the on-line user to perform calculations to construct a database lookup code which is used in retrieving the telephone number originally entered by the investor during the registration process from the investor's data in the database.
19. A method for using a multi-layer identification scheme to identify an on-line user by linking the on-line user to a physical address when the on-line user fills out an application on a system, the method comprising the steps of: registering, by the on-line user, with the system and entering information into a user interface on the system's web site; ensuring, in a normalization component, that the on-line user fills out all required fields in the application and checking that all required fields have been filled out in a proper format; using predefined rules, in a reflexive check component, to validate that structures and values of predetermined data elements in the application are correct; comparing, in an internal check component, the information entered by the on-line user against information entered by previous on-line users; determining, in a cross-reference check component, whether multiple data elements are valid when considered against an external data source; and binding and verifying in a physical location component certain information given by the user to the physical address.
20. The method of claim 19 further comprising the step of performing identity checks in a predefined order to accurately and efficiently authenticate information presented by the on-line user while minimizing cost.
21. The method of claim 20 further comprising the step of implementing first identity checks that cost the least and are the most powerful in identifying valid and accurate information.
22. The method of claim 19 further comprising the step of enrolling in a customer stock plan through the user interface.
23. The method of claim 19 further comprising the step of entering a name, address, phone number, e-mail address, credit card information, bank information, and social security number in the system's web site.
24. The method of claim 23 further comprising the steps of: checking that the social security number and bank information were not pre\ lousK submitted by another on-line user, and obtaining a certificate for the on-line user
25 The method of claim 24 further comprising the step of approving the application upon obtaining the certificate for the on-line user
26 The method of claim 19 further comprising the step of instructing the on-line user of a rejected application and instructing how to proceed via a system-generated e-mail message
27 The method of claim 19 further comprising the step of changing, m the normalization component, information in the required fields to integers and rejecting the application if at least one required field is blank
28 The method of claim 19, wherein the step of using predefined rules m a reflexive check component further comprises the steps of ensuπng that requested information m a registration form is filled out, using a credit card verification algoπthm to check that a credit card number entered by the on-line user is in a valid format and to determine the credit card type, performing a cyclic redundancy check on a bank routing number to determine if it is m a valid format, comparing an area code and a prefix in a telephone number against an external database to determine whether the prefix is valid, whether it is contained within the area code entered, and whether it is associated with a standard residential phone line; and rejecting the application if any step fails.
29. The method of claim 19, wherein the step of validating in an internal check component, further comprises the steps of: comparing the on-line user's social security number, credit card number, checking account number and bank routing number against information in active accounts in a system database; rejecting the application if the checking account or bank routing number is currently in at least one active account in the system database; and rejecting the application if the social security number, or credit card number is currently in at least one account in the system database.
30. The method of claim 19, wherein the step of determining, in a cross-reference check component, further comprises the steps of: using a zip code file and a conversion routine to convert the latitude and the longitude of a centroid of the zip code entered by the on-line user to a telephone company coordinate system; using a first external database to look up the coordinates of a telephone switch indicated by a telephone area code and prefix entered by the on-line user, calculating the distance between the zip code and the telephone switch coordinates and rejecting the application if the distance is greater than a predefined threshold; using the on-line user's social security number and a second external database to verify and cross check the on-line user's name and address and rejecting the application if the verification fails; and searching the on-line user's data in a third database, evaluating any additional information associated with the on-line user, searching the additional information for predetermined codes and rejecting the application if certain codes are presented in the user's database.
31. The method of claim 19 further comprising the step of constructing a bit vector for showing a scoring result for each check, whereby certain bit patterns causes the system to reject the application.
32. The method of claim 19 further comprising the steps of: checking available credit on a credit card presented by the on-line user and rejecting the application if there is insufficient funds on the credit card for a processing fee; marking the on-line user's account as pending if the application is not rejected; and creating a request to the on-line user's credit card for a processing fee, thereby enabling the on-line user to enter transactions into the system.
33. The method of claim 19 wherein the step of binding and verifying further comprises the step of sending an e-mail message to the on-line user instructing the on-line user to call a specific number and to enter a pre-assigned personal identification number contained in the e-mail message.
34. The method of claim 19, wherein the step of binding and verifying in the physical location check component, further comprises the steps of: automatically retrieving the on-line user's telephone number with an automatic number identification component; and using a pin number entered by the on-line user to compare the telephone number in the on-line user's account to the telephone number associated with the telephone used by the on-line user, thereby binding the on-line user to the physical address.
35. A system for using a multi-layer identification scheme to identify an on-line user by linking the on-line user to a physical address when the on-line user fills out an application on the system, the system comprising: a web page for enabling the on-line user to enter information in the application and means for submitting the entered information to a rules engine; means for checking that predefined information entered by the on-line user was not previously submitted by another user and for obtaining a certificate for the user; means, in a normalization component, for ensuring that the user fills out all required fields in the application in a proper format and normalizing information in the required fields; means, in a reflexive check component, for using a credit card verification algorithm to verify credit card information, for performing a cyclic redundancy check to determine a valid format for a bank routing number, and for validating the telephone number to
determine whether the telephone number is associated with a standard residential telephone
line;
means, in an internal check component, for comparing the information entered by
the on-line user against information entered by previous on-line users and comparing the
on-line user's information against information in active accounts in a system database;
means, in a cross-reference check component, for determining whether multiple data
elements are valid when considered against an external data source, verifying zip code information entered by the on-line user against a telephone company database, and
converting the zip code information to a telephone company coordinate system, ensuring
that there is sufficient funds on a credit card presented by the on-line user, comparing the
on-line user's name and address against a third party database to determine if predetermined
fraudulent activity codes are associated with the on-line user;
means in a physical location component for binding and verifying the information
given by the user to the physical address, automatically retrieving the on-line user's
telephone number with an automatic number identification component, emailing to the on-
line user a system generated pin number which is subsequently entered by the on-line user
to retrieve the telephone number in the on-line user's account, comparing a retrieved
telephone number to the telephone number associated with the telephone used by the on-
line user, thereby binding the on-line user to the physical address; and
means in each component for rejecting the application if predefined checks
performed by the component fails.
36. The system of claim 34 further comprising means for instructing the user how to proceed via a system-generated e-mail message when the on-line application is rejected.
37. The system of claim 34 further comprising means for constructing a bit vector for showing a scoring result for each check, whereby certain bit patterns causes the system to reject the application.
PCT/US2000/029199 1999-10-22 2000-10-23 A system and method for verifying on-line information presented by internet users WO2001031483A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU12254/01A AU1225401A (en) 1999-10-22 2000-10-23 A system and method for verifying on-line information presented by internet users

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US16091499P 1999-10-22 1999-10-22
US60/160,914 1999-10-22

Publications (2)

Publication Number Publication Date
WO2001031483A2 true WO2001031483A2 (en) 2001-05-03
WO2001031483A3 WO2001031483A3 (en) 2002-10-10

Family

ID=22579006

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/US2000/029199 WO2001031483A2 (en) 1999-10-22 2000-10-23 A system and method for verifying on-line information presented by internet users
PCT/US2000/029200 WO2001031536A2 (en) 1999-10-22 2000-10-23 A direct stock purchase system and method for implementing the same

Family Applications After (1)

Application Number Title Priority Date Filing Date
PCT/US2000/029200 WO2001031536A2 (en) 1999-10-22 2000-10-23 A direct stock purchase system and method for implementing the same

Country Status (2)

Country Link
AU (2) AU1225501A (en)
WO (2) WO2001031483A2 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001086549A1 (en) * 2000-05-08 2001-11-15 Mci Worldcom, Inc. A system and method for the verification of customer information entered via an internet based order entry system
EP1938226A2 (en) * 2005-09-28 2008-07-02 Google, Inc. Online data verification of listing data
US8468129B2 (en) 2011-09-23 2013-06-18 Loyal3 Holdings, Inc. Asynchronous replication of databases of peer networks
US8533804B2 (en) 2011-09-23 2013-09-10 Loyal3 Holdings, Inc. User login with redirect to home network
US10440627B2 (en) 2014-04-17 2019-10-08 Twilio Inc. System and method for enabling multi-modal communication
US10469670B2 (en) 2012-07-24 2019-11-05 Twilio Inc. Method and system for preventing illicit use of a telephony platform
US10560495B2 (en) 2008-04-02 2020-02-11 Twilio Inc. System and method for processing telephony sessions
US10694042B2 (en) 2008-04-02 2020-06-23 Twilio Inc. System and method for processing media requests during telephony sessions
US11386435B2 (en) 2017-04-03 2022-07-12 The Dun And Bradstreet Corporation System and method for global third party intermediary identification system with anti-bribery and anti-corruption risk assessment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5684951A (en) * 1996-03-20 1997-11-04 Synopsys, Inc. Method and system for user authorization over a multi-user computer system
US5790785A (en) * 1995-12-11 1998-08-04 Customer Communications Group, Inc. World Wide Web registration information processing system
WO1999060483A1 (en) * 1998-05-21 1999-11-25 Equifax Inc. System and method for authentication of network users

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5790785A (en) * 1995-12-11 1998-08-04 Customer Communications Group, Inc. World Wide Web registration information processing system
US5684951A (en) * 1996-03-20 1997-11-04 Synopsys, Inc. Method and system for user authorization over a multi-user computer system
WO1999060483A1 (en) * 1998-05-21 1999-11-25 Equifax Inc. System and method for authentication of network users

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
GABBER E ET AL: "On location-restricted services" IEEE NETWORK, NOV.-DEC. 1999, IEEE, USA, vol. 13, no. 6, pages 44-52, XP000875731 ISSN: 0890-8044 *

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001086549A1 (en) * 2000-05-08 2001-11-15 Mci Worldcom, Inc. A system and method for the verification of customer information entered via an internet based order entry system
US7089197B1 (en) 2000-05-08 2006-08-08 Mci, Llc System and method for verification of customer information entered via an Internet based order entry system
EP1938226A2 (en) * 2005-09-28 2008-07-02 Google, Inc. Online data verification of listing data
EP1938226A4 (en) * 2005-09-28 2011-04-06 Google Inc Online data verification of listing data
US11611663B2 (en) 2008-04-02 2023-03-21 Twilio Inc. System and method for processing telephony sessions
US11575795B2 (en) 2008-04-02 2023-02-07 Twilio Inc. System and method for processing telephony sessions
US11765275B2 (en) 2008-04-02 2023-09-19 Twilio Inc. System and method for processing telephony sessions
US11722602B2 (en) 2008-04-02 2023-08-08 Twilio Inc. System and method for processing media requests during telephony sessions
US10560495B2 (en) 2008-04-02 2020-02-11 Twilio Inc. System and method for processing telephony sessions
US10694042B2 (en) 2008-04-02 2020-06-23 Twilio Inc. System and method for processing media requests during telephony sessions
US11706349B2 (en) 2008-04-02 2023-07-18 Twilio Inc. System and method for processing telephony sessions
US10893079B2 (en) 2008-04-02 2021-01-12 Twilio Inc. System and method for processing telephony sessions
US10986142B2 (en) 2008-04-02 2021-04-20 Twilio Inc. System and method for processing telephony sessions
US11843722B2 (en) 2008-04-02 2023-12-12 Twilio Inc. System and method for processing telephony sessions
US11283843B2 (en) 2008-04-02 2022-03-22 Twilio Inc. System and method for processing telephony sessions
US11856150B2 (en) 2008-04-02 2023-12-26 Twilio Inc. System and method for processing telephony sessions
US11444985B2 (en) 2008-04-02 2022-09-13 Twilio Inc. System and method for processing telephony sessions
US11831810B2 (en) 2008-04-02 2023-11-28 Twilio Inc. System and method for processing telephony sessions
US8468129B2 (en) 2011-09-23 2013-06-18 Loyal3 Holdings, Inc. Asynchronous replication of databases of peer networks
US8533804B2 (en) 2011-09-23 2013-09-10 Loyal3 Holdings, Inc. User login with redirect to home network
US11063972B2 (en) 2012-07-24 2021-07-13 Twilio Inc. Method and system for preventing illicit use of a telephony platform
US10469670B2 (en) 2012-07-24 2019-11-05 Twilio Inc. Method and system for preventing illicit use of a telephony platform
US11882139B2 (en) 2012-07-24 2024-01-23 Twilio Inc. Method and system for preventing illicit use of a telephony platform
US10873892B2 (en) 2014-04-17 2020-12-22 Twilio Inc. System and method for enabling multi-modal communication
US11653282B2 (en) 2014-04-17 2023-05-16 Twilio Inc. System and method for enabling multi-modal communication
US10440627B2 (en) 2014-04-17 2019-10-08 Twilio Inc. System and method for enabling multi-modal communication
US11386435B2 (en) 2017-04-03 2022-07-12 The Dun And Bradstreet Corporation System and method for global third party intermediary identification system with anti-bribery and anti-corruption risk assessment

Also Published As

Publication number Publication date
WO2001031536A8 (en) 2002-08-29
AU1225501A (en) 2001-05-08
WO2001031536A2 (en) 2001-05-03
WO2001031483A3 (en) 2002-10-10
AU1225401A (en) 2001-05-08

Similar Documents

Publication Publication Date Title
US7664701B2 (en) Masking private billing data by assigning other billing data to use in commerce with businesses
US7610216B1 (en) Method and system for detecting fraud
US8571975B1 (en) System and method for sending money via E-mail over the internet
US8650118B2 (en) Universal merchant platform for payment authentication
US8355959B2 (en) Payment service capable of being integrated with merchant sites
US7707120B2 (en) Mobile account authentication service
USRE43440E1 (en) Method for performing a transaction over a network
US7225156B2 (en) Persistent dynamic payment service
CA2950637C (en) Universal merchant platform for payment authentication
US8606719B2 (en) System for management of alternatively priced transactions on network
US20020133412A1 (en) System for management of transactions on networks
CN1437741A (en) Authenticated payment
KR20070007044A (en) Multiple party benefit from an online authentication service
EA005835B1 (en) A secure on-line payment system
US20040068465A1 (en) Electric commerce credit processing method and electric commerce system
WO2001031483A2 (en) A system and method for verifying on-line information presented by internet users
US20030105723A1 (en) Method and system for disclosing information during online transactions
US20020133429A1 (en) Multi-website shopping cart system and the method for the same
US20020032575A1 (en) System and method for responding to an inquiry in exchange for a resource over a communication network
US10275780B1 (en) Method and apparatus for sending a rebate via electronic mail over the internet
WO2001059648A1 (en) System for management of transactions on networks

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

AK Designated states

Kind code of ref document: A3

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: COMMUNICATION PURSUANT TO RULE 85A(1) EPC (EPO FORM 1217N) DATED 16.01.03 COMMUNICATION PURSUANT TORULES 85A AND 85B EPC (EPO FORM 1218N) DAT

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 69(1) EPC EPO FORM 1205 DATED 27.08.03

NENP Non-entry into the national phase in:

Ref country code: JP

122 Ep: pct application non-entry in european phase