US20230245246A1 - Security and identity verification system and architecture - Google Patents
Security and identity verification system and architecture Download PDFInfo
- Publication number
- US20230245246A1 US20230245246A1 US17/934,038 US202217934038A US2023245246A1 US 20230245246 A1 US20230245246 A1 US 20230245246A1 US 202217934038 A US202217934038 A US 202217934038A US 2023245246 A1 US2023245246 A1 US 2023245246A1
- Authority
- US
- United States
- Prior art keywords
- tax
- user
- electronic
- application
- tsp
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/12—Accounting
- G06Q40/123—Tax preparation or submission
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
- H04L67/306—User profiles
Definitions
- the present disclosure generally relates to information security for tax filings in a computer environment.
- intrusions may come in a variety of forms, such as malicious third party systems attempting to emulate or impersonate the systems of a standard user. Such intrusions can be very disruptive and may, for example, immobilize operations, allow for the unauthorized access to sensitive data, or allow for the embezzlement of a user's account and corresponding funds.
- Various systems and methods are disclosed which include features relating to security and identity verification systems and architectures to analyze and detect unauthorized third party intrusions and/or access.
- a fraud detection and alert system may comprise: one or more data stores configured to store computer-executable instructions; a network interface configured to communicate with a plurality of network service devices; and one or more physical computer processors in communication with the one or more data stores, wherein the computer-executable instructions, when executed, configure the one or more processors to: receive, via the network interface, an electronic request for a filing of an application, wherein the electronic request is associated with a first user and includes user data associated with the first user; match, based on the electronic request, the user data associated with the first user to verification data stored in one or more searchable databases, wherein the verification data is associated with the first user; transmit notification to first user device associated with the first user regarding the successful application filing of the first user's application; receive an indication from the first user device indicating a possible fraudulent electronic request; determine, based on the indication, that the electronic request is fraudulent; and generate electronic instructions to stop the filing of the application as requested by the electronic requests.
- a computerized method for detecting fraudulent tax filings may comprise: receiving, via a network interface, an electronic request for a filing of an application, wherein the electronic request is associated with a first user and includes user data associated with the first user; matching, based on the electronic request and using one or more computer processors, the user data associated with the first user to verification data stored in one or more searchable databases, wherein the verification data is associated with the first user; transmitting, via one or more computer processors, notification to first user device associated with the first user regarding the successful application filing of the first user's application; receiving, via a network interface, an indication from the first user device indicating a possible fraudulent electronic request; determining, via one or more computer processors, based on the indication, that the electronic request is fraudulent; and generating, via one or more computer processors, electronic instructions to stop the filing of the application as requested by the electronic request.
- a non-transitory storage medium for storing instructions adapted to be executed by a processor to perform a method for automatically detecting fraudulent tax filings.
- the instructions may comprise: receiving an electronic request for a filing of an application, wherein the electronic request is associated with a first user and includes user data associated with the first user; matching, based on the electronic request, the user data associated with the first user to verification data stored in one or more searchable databases, wherein the verification data is associated with the first user; transmitting notification to first user device associated with the first user regarding the successful application filing of the first user's application; receiving an indication from the first user device indicating a possible fraudulent electronic request; determining based on the indication, that the electronic request is fraudulent; and generating electronic instructions to stop the filing of the application as requested by the electronic request.
- FIG. 1 A illustrates example embodiments of a security and identity verification system.
- FIG. 1 B illustrates example embodiments of a tax fraud alert system.
- FIGS. 1 C- 1 , 1 C- 2 , 1 D, and 1 E illustrate example processes that can be implemented by embodiments of one or more components of the tax fraud alert system.
- FIG. 2 A illustrates example embodiments of an identity verification engine.
- FIG. 2 B illustrates example embodiments of a contact engine.
- FIG. 2 C illustrates example embodiments of an alert notification engine.
- FIGS. 2 D- 1 and 2 D- 2 illustrate flow diagrams for embodiments of call center support processes.
- FIG. 2 E illustrates a flow diagram for embodiments of a web portal support process.
- FIG. 2 F illustrates a flow diagram for embodiments of a dispute process.
- FIG. 3 illustrates an embodiment of a computing system which may implement example embodiments of one or more components of the tax fraud alert system.
- Tax authorities such as a state or federal government continuously combat fraudulent activities such as noncompliance, evasion, identity theft and refund fraud.
- fraudsters are finding new and creative ways to defraud the government and legitimate taxpayers. For example, some individuals and groups acquire personally identifiable information (PII) from the deceased, dumpster dive, hack financial systems, buy information from someone not filing a return or otherwise steal it from legitimate sources such as a doctor's office. This PII can then be used to fill out tax returns, add fraudulent income information, and request false deductions.
- PII personally identifiable information
- IDTTRF Identity Theft Tax Refund Fraud
- Tax collection agencies such as tax authorities at the local, state, and federal level, combined continue to lose billions of dollars in tax refund fraud.
- Tax service providers such as the tax collection agencies or a private tax preparation organization such as Intuit, H&R Block, or other tax preparation business, are well-aware of the magnitude of the tax fraud problem.
- budgetary constraints and legal mandates have created a system that is often unable to follow up on the red flags until after a refund check has been sent.
- the consumer or customers' identities and ability to receive a timely return may be put at risk in the process.
- Some TSPs continue to expand filters used to detect identity theft tax refund fraud. Tax returns identified by these filters can be held during processing until the TSPs can verify the taxpayers' identities.
- TSP may strive to achieve a situation where services are both secure and easy to use and access.
- a TSP may benefit from a system that provides more intelligent and customizable fraud detection checks to inform the TSP, before a refund check is processed and mailed out or sent to a direct deposit account, that a tax transaction is at risk of being fraudulent, and/or provides multiple channels to notify their tax payers or customers proactively of both legitimate and fraudulent returns.
- consumers may also benefit from a system which can: preemptively notify them that tax forms have been filed with their tax identifier (ID) or their business' tax ID regardless of whether they have been flagged as a potential fraudulent tax filing; provide a channel via online or through call centers to contact the IRS or its proxy to remediate the issue if they believe the tax filing is fraudulent; and/or provide a system to track the progress of their cases.
- ID tax identifier
- a system which can: preemptively notify them that tax forms have been filed with their tax identifier (ID) or their business' tax ID regardless of whether they have been flagged as a potential fraudulent tax filing; provide a channel via online or through call centers to contact the IRS or
- a security and identity verification system or tax fraud alert system described herein promotes a more proactive and interactive relationship between the taxpayer and government employees to improve taxpayer service, enforcement and operations.
- this solution aims to send positive notifications to tax payers when their tax return is filed and/or when any tax form is filed using the tax payers' individual tax ID or business tax ID(s).
- the solution can leverage data from one or more credit bureaus and other data sources and algorithms to find good or even the best contact information for a tax payer and send the tax alerts.
- the solution can also leverage other software suites and call centers to handle callbacks from users that received a tax alert and suspect fraud or have questions.
- a portion of the tax fraud alert system can be run at data centers of a tax authority if the tax authority's integration model does not allow non-public personal information (NPPI) data from tax forms to leave their premises, or where the some or all portions of the NPPI data can leave the premise, the system can offer a set of Application Programming Interfaces (APIs)/batch processes to send a subset of NPPI data from tax forms to another entity for the system to determine the correct identity(ies) tied to the individual tax ID or business tax ID in the tax form, selecting contact information to send the tax alert, and/or for handling customer support for those that receive a tax alert. While processing the NPPI submitted, in some embodiments, the system may also perform various types of fraud checks.
- APIs Application Programming Interfaces
- Some example fraud checks can include: SSN check, multiple submissions to the same address (velocity of the same address being used), multiple submissions to the same bank account, verify against deceased records, communication checks (email, phone numbers, residential address), checking NPPI data in the tax filing against the credit bureau data to look for discrepancies and to verify communication channels, and/or a combination of positive activity tax alerts to all consumers or customers filing taxes and customizable fraud checks.
- embodiments of the tax fraud alert system can use Personally Identifiable Information (PII) to verify a taxpayer's identity.
- PII Personally Identifiable Information
- the PII used on the tax filing can be verified as belonging to the legitimate taxpayer through an independent verification process.
- the most recent contact information including landline or mobile phone number, mailing address, and/or email associated with the legitimate taxpayer can be sent an alert notifying the taxpayer that a tax return has been filed with the taxpayer's credentials.
- the taxpayer can be provided with an option to contact the tax authority's customer service center or visit a web portal to get more information, and if necessary initiate a dispute and potentially stop payment of any tax refunds tied to the tax filing.
- the tax fraud alert system can offer a branded call center and/or a branded web portal to handle customers' or tax payers' inquiries about the tax alerts.
- the function of the tax fraud alert system can be twofold—(1) the successful delivery of the tax alert can serve to confirm the legitimate tax payer has filed the return and/or (2) the verification process ensures delivery of alerts to the legitimate taxpayer which results in additional information that can be useful in the overall review of the tax filing.
- TSP can be provided with a result from the taxpayer verification process, such as, for example, no taxpayer verified through information provided, taxpayer found to be deceased, or taxpayer/location found to be prison. One or more of these results may allow a tax authority to take next steps in the return evaluation process independent of taxpayer response to alerts or content of alerts generated.
- the alert does not add any additional time for processing, but may even shorten the time for processing because if a legitimate taxpayer receives the alert and notifies a tax authority that the taxpayer did not submit the tax filing in question, the tax filing can be sent immediately to fraud prevention for further evaluation.
- this tax fraud alert system does not require any taxpayer interaction to be in effect. The legitimate taxpayer does not have to opt-in in order to receive a notification that a tax form has been filed using tax ID or business tax ID that belongs to him or her.
- alerts may only be sent if both the taxpayer and contact information can be verified. If taxpayer receiving the tax alert has submitted a tax form in his or her name or on behalf of a business, then he or she does not have to take any action. The majority of alerts may serve as a notification with no action required. If the taxpayer has not filed any tax form, the taxpayer can be provided with a call center number to contact for remediation efforts. The alerting process, while largely frictionless to the taxpayer, becomes an indispensable, proactive tool in combatting identity theft tax return fraud at the onset.
- FIG. 1 A illustrates an example embodiment of a security and identity verification system 100 which can be used to provide tax alerts.
- the exemplary security and identity verification system 100 includes a set of third party systems 110 which communicate with a tax fraud alert system 120 and with tax payer/tax filer systems 130 via a communications network 140 . It is recognized that in some fraudulent situations, the tax payer and the tax filer are not the same entity, but the use of the term “tax filer” herein is meant to apply to the tax payer and not a fraudulent tax filer.
- the security and identity verification system 100 may include multiple third party system 110 which communicate with the tax fraud alert system 120 , such as to submit data, provide information on filed tax returns, and receive alerts for possible tax filing fraud.
- the third party systems 110 may include TSP systems (for example, systems of the US Federal Government, systems of state governments), third party vendor systems, third party data provider systems, and/or other third party systems.
- the third party systems 110 may be implemented using a variety of devices including, for example, personal computers, servers, tablets, smart phones, smart watches, car consoles, or the like, alone or in combination.
- the exemplary third party systems 110 include computer hardware and/or software that allows the devices to communicate with the tax alert fraud system 120 as well as one or more of the tax payer/tax filer systems 130 via the communications network 140 .
- the tax fraud alert systems 120 may include a portal or other software or code that allows the TSP systems 110 to provide configurations for how the respective TSP system 110 would like to configure its alerts.
- the tax alert fraud systems 120 may be partitioned such that one TSP system 110 and its private configurations are not accessible to or viewable by another TSP system 110 .
- the security and identity verification system 100 may include multiple tax payer/tax filer systems 130 which are utilized by tax filers to, among other things, provide tax submissions, receive tax alerts, and/or review refund status.
- the tax payer/tax filer systems 130 may be implemented using a variety of devices including, for example, personal computers, servers, tablets, smart phones, smart watches, car consoles, or the like, alone or in combination.
- the exemplary tax payer/tax filer systems 130 include computer hardware and/or software that allows the devices to communicate with the tax alert fraud system 120 as well as one or more of the third party systems 110 , such as a tax service provider via the communications networks 140 .
- FIG. 1 is described herein and illustrates only one tax payer/tax filer systems 130 .
- the communications network 140 comprises one or more of local area network (LAN), wide area network (WAN), and/or the Internet, for example, via a wired, wireless, or combination of wired and wireless communication links.
- the communications network 140 may communicate with various computing devices and/or other electronic devices via wired or wireless communication links.
- the communications network 140 may be used to share resources and may be used for the analog and/or digital transfer of data and information.
- the communications network 140 can be used to enable multiple devices access to a single system, enable file sharing across the communications network 140 , share software programs on remote systems, or make information easier to access and maintain among network users.
- remote devices may include data, objects, devices, components, and/or modules not stored locally, that are not accessible via the local bus.
- remote devices may include a device which is physically stored in the same room and connected to the user's device via a network.
- a remote device may be located in a separate geographic area, such as, for example, in a different location, country, and so forth.
- FIG. 1 B illustrates an example embodiment of a tax fraud alert system 120 .
- the tax fraud alert system 120 comprises a system that provides alerts to tax filers upon a successful filing of a tax form with a TSP.
- the tax fraud alert system 120 can also provide remediation services in coordination with TSPs in the event a fraudulent form is filed; and/or validate tax identity information and the corresponding good or best tax filer contact information in order to notify the tax filer in a timely manner.
- This can be a multi-tenant system in which multiple TSPs are supported by the data submission process each with their own defined configuration of the type of Tax ID information (SSN, name, address, and so on) that is submitted to the tax fraud alert system 120 .
- Each TSP may utilize one or more of the batch connectors or API connectors available in the tax fraud alert system 120 to submit data to the tax fraud alert system 120 .
- the tax fraud alert system 120 can include three sub-systems in FIG. 1 B : (1) Identity Verification Engine (IVE) 122 , (2) Best Contact Engine (BCE) 124 , and (3) Alert Notification Engine (ANE) 126 , with each engine having its own configuration database to support per tenant business rules.
- the IVE 122 and BCE 124 may be optional per tenant, and the data submitted is allowed to bypass these engines and go straight to the ANE 126 to notify tax filers.
- the IVE 122 can include a configurable rules engine to review incoming data submission to validate and select the best or close matches to the true identity using the combination of data attributes (for example, social security number, name, and address) with known proprietary and public datasets.
- the BCE 124 can also include a configurable rules engine that reviews incoming data attributes along with data attributes from proprietary and public records to determine at least one valid communication channel (for example, as many valid communication channels as possible, one communication channel, X communication channels) that can be linked to the legitimate tax filer.
- a configurable rules engine that reviews incoming data attributes along with data attributes from proprietary and public records to determine at least one valid communication channel (for example, as many valid communication channels as possible, one communication channel, X communication channels) that can be linked to the legitimate tax filer.
- the output of the tax fraud alert system 120 can include one or more of the following options.
- the first option may include a tax alert to each tax filer based on the results of the IVE 122 and/or the BCE 124 .
- the second option may include a tax alert to identity submitted in the original tax form if the optional IVE 122 and BCE 124 processes were not chosen or if the IVE 122 and/or the BCE 124 were unable to verify a different identity or different contact information than what was submitted in the tax form. This option can still be useful to stop cases where the thief uses the correct information of the tax filer and only changes the account information to be used for tax refunds.
- the TSP may also use this option to test the notification process and the remediation process for users that receive the notifications.
- the third option may include a tax fraud alert to the associated TSP with all records that have been flagged by the IVE 122 and the BCE 124 . This option can be used by the TSP to initiate fraud investigations on flagged records.
- the tax filer may be given detailed instructions on whom to contact to remediate the issue in the event the tax filers believe a tax form was fraudulently filed in the tax filer's name or the name of the tax filer's business.
- the tax filer may be automatically redirected to a remediation server which can provide automated remediation processes to assist the tax filer.
- a tax fraud alert can be sent to the associated TSP to halt any tax refund in process and to initiate a fraud review of the tax form, such as via a warm transfer or other transfer or data.
- the tax alert comprises one or more encrypted data packets which stores information about the tax alert and is configured to be sent over an electronic communications network, such as the Internet.
- FIGS. 1 C- 1 , 1 C- 2 , 1 D, and 1 E illustrate example processes that can be implemented by embodiments of one or more components of the tax fraud alert system 120 .
- a TSP system 110 can submit user's PII to a security platform or backend system (which may implement the tax fraud alert system 120 shown in FIG. 1 B ).
- the backend system can process the PII to identify a correct tax payer and send an alert to the tax payer.
- the backend system can also include a remediation center such as, for example, a call center or a web portal which can receive reports from tax filers regarding possible fraud or receive confirmations of tax filings from the tax filers who received an alert from that tax fraud alert system 120 as shown in FIG. 1 C- 1 .
- the security platform or backend system can send the taxpayer other notices throughout the tax processing life cycle if a TSP selects this notification option.
- the notices may be available for when tax is filed, and then later, when the tax processing is completed.
- the notices can also include the results from various stages of the tax processing life cycle. For example, results could be success or additional info needed, or an audit notice, or expect a refund in N days, or a tax refund was sent, and so forth.
- FIG. 1 C- 1 illustrates embodiments of a tax alert process.
- the tax payer whether a user or business representative
- tax preparer files a tax form with a TSP system 110 which may include tax ID (such as, for example, social security number (SSN), individual tax payer identification number (ITIN), US government issued identifier (EIN), or other identifier), name or business name, address, phone number, and so forth.
- the TSP system 110 may then being processing the tax form.
- the TSP system 110 may make a call to the tax fraud alert system 120 , such as, for example via an application programming interface (API) or by adding the tax payer's record to a batch file for processing.
- the communication may be made via a secure communication protocol, such as, for example, hypertext transfer protocol secure (HTTPS), secure file transfer protocol (SFTP), or another secure protocol.
- HTTPS hypertext transfer protocol secure
- SFTP secure file transfer protocol
- the indication may be based on the tax payer requesting a notification and/or the TSP or other system indicating that the tax payer should receive a notification.
- the tax fraud alert system 120 may receive the tax filing data via the API or the batch process. If the TSP has requested notification of such errors, the tax fraud alert system 120 may send a notice to the TSP system indicating that there are and/or are not any input errors. This notice may include the information on one or more tax payer files. If there are no errors, the tax fraud alert system 120 may perform a verification process, such as, for example, the identity verification process described in FIG. 2 A . The tax fraud alert system 120 may also perform a contact process, such as, for example, the best contact process described in FIG. 2 B . If the tax payer is not matched, the tax fraud alert system 120 may determine whether to send a fail request receipt.
- a verification process such as, for example, the identity verification process described in FIG. 2 A .
- the tax fraud alert system 120 may also perform a contact process, such as, for example, the best contact process described in FIG. 2 B . If the tax payer is not matched, the tax fraud alert system 120 may determine whether to send a fail request receipt.
- the tax fraud alert system 120 may generate and send a notification or alert to the tax payer using one or more of the contact channels determined by the contact process, for example using the alert notification process described in FIG. 2 C .
- the tax payer may inquire about the notice and/or confirm whether the tax filing was correct or indicate possible fraud.
- the tax fraud alert system 120 may include a call center system or web portal to handle the tax payer inquiries and/or provide the tax payer access to a remote call center system or web portal which handles such inquiries.
- the tax fraud alert system 120 and/or the remote call center system or portal may generate and send an electronic notification indicating whether there is possible fraud associated with the tax payer's corresponding filing. If so, then the tax fraud alert system 120 may generate and send a notification to the TSP system 110 that the tax payer has confirmed the filing. If not, then the tax fraud alert system 120 may generate and send a notification to the TSP system 110 a possible fraud notice. In some embodiments, such notice may include instructions or an indication that is used by the TSP to stop or cancel a refund request. Such notifications may be sent to the TSP system 110 via a secure protocol, such as, for example, HTTPS, SFTP, or another secure protocol.
- a secure protocol such as, for example, HTTPS, SFTP, or another secure protocol.
- the TSP system 110 receives the notification and determine whether there is possible fraud using the notification. If so, the TSP system 110 may generate instruction to stop or cancel any refund processing and/or to initiate an investigation of the potential fraud. If not, then the TSP system 110 may resume with its normal tax processing. The TSP system may determine whether there is possible fraud based solely on the notification, based in part on the notification, and/or based on its own independent analysis of the tax payer filing. If the investigation determines that there is no fraud, then the TSP system 110 may resume with its normal tax processing.
- FIG. 1 C- 2 illustrates embodiments of a tax alert process.
- the tax payer whether a user or business representative
- tax preparer files a tax form with a TSP system 110 which may include tax ID (such as, for example, social security number (SSN), individual tax payer identification number (ITIN), US government issued identifier (EIN), or other identifier), name or business name, address, phone number, and so forth.
- the TSP system 110 may then being processing the tax form.
- the TSP system 110 may make a call to the tax fraud alert system 120 , such as, for example via an application programming interface (API) or by adding the tax payer's record to a batch file for processing.
- the communication may be made via a secure communication protocol, such as, for example, hypertext transfer protocol secure (HTTPS), secure file transfer protocol (SFTP), or another secure protocol.
- HTTPS hypertext transfer protocol secure
- SFTP secure file transfer protocol
- the indication may be based on the tax payer requesting a notification and/or the TSP or other system indicating that the tax payer should receive a notification.
- the tax fraud alert system 120 may receive the tax filing data via the API or the batch process. If the TSP has requested notification of such errors, the tax fraud alert system 120 may send a notice to the TSP system indicating that there are and/or are not any input errors. This notice may include the information on one or more tax payer files. If there are no errors, the tax fraud alert system 120 may perform a verification process, such as, for example, the identity verification process described in FIG. 2 A . The tax fraud alert system 120 may also perform a contact process, such as, for example, the best contact process described in FIG. 2 B . If the tax payer is not matched, the tax fraud alert system 120 may determine whether to send a fail request receipt.
- a verification process such as, for example, the identity verification process described in FIG. 2 A .
- the tax fraud alert system 120 may also perform a contact process, such as, for example, the best contact process described in FIG. 2 B . If the tax payer is not matched, the tax fraud alert system 120 may determine whether to send a fail request receipt.
- the tax fraud alert system 120 may generate and send a notification or alert to the tax payer using one or more of the contact channels determined by the contact process, for example using the alert notification process described in FIG. 2 C .
- the tax payer may inquire about the notice and/or confirm whether the tax filing was correct or indicate possible fraud.
- the tax fraud alert system 120 may include a call center system or web portal to handle the tax payer inquiries and/or provide the tax payer access to a remote call center system or web portal which handles such inquiries.
- the TSP system 110 processes the tax form. If there is an indication that the TSP system 110 should send a notice or alert about the tax filing, then the TSP system 110 may make a call to the tax fraud alert system 120 , such as, for example via an API or by adding the tax payer's record to a batch file for processing.
- the communication may be made via a secure communication protocol, such as, for example, HTTPS, SFTP, or another secure protocol.
- the indication may be based on the tax payer requesting a notification and/or the TSP or other system indicating that the tax payer should receive a notification.
- the tax fraud alert system 120 may receive the taxes processed data via the API or the batch process. If the TSP has requested notification of such errors, the tax fraud alert system 120 may send a notice to the TSP system indicating that there are and/or are not any input errors. This notice may include the information on one or more tax payer files. If there are no errors, the tax fraud alert system 120 may generate and send a notification or alert to the tax payer that the taxes have been processed, such as, for example, using one or more of the contact channels determined by the contact process, for example using the alert notification process described in FIG. 2 C . The tax payer may inquire about the notice and/or confirm whether the tax filing was correct or indicate possible fraud. The tax fraud alert system 120 may include a call center system or web portal to handle the tax payer inquiries and/or provide the tax payer access to a remote call center system or web portal which handles such inquiries.
- the TSP processes the refund. If there is a pending refund, then in (3), the TSP processes the refund. If there is an indication that the TSP system 110 should send a notice or alert about the refund, then the TSP system 110 may make a call to the tax fraud alert system 120 , such as, for example via an API or by adding the tax payer's record to a batch file for processing.
- the communication may be made via a secure communication protocol, such as, for example, HTTPS, SFTP, or another secure protocol.
- the indication may be based on the tax payer requesting a notification and/or the TSP or other system indicating that the tax payer should receive a notification.
- the tax fraud alert system 120 may receive the refund data via the API or the batch process. If the TSP has requested notification of such errors, the tax fraud alert system 120 may send a notice to the TSP system indicating that there are and/or are not any input errors. This notice may include the information on one or more tax payer files. If there are no errors, the tax fraud alert system 120 may generate and send a notification or alert to the tax payer that the refund has been sent, such as, for example, using one or more of the contact channels determined by the contact process, for example using the alert notification process described in FIG. 2 C . The tax payer may inquire about the notice and/or confirm whether the tax filing was correct or indicate possible fraud. The tax fraud alert system 120 may include a call center system or web portal to handle the tax payer inquiries and/or provide the tax payer access to a remote call center system or web portal which handles such inquiries.
- a user can submit a tax form with PII (for example, name, address, phone number, bank account information, and/or social security number) to one or more TSP systems 110 (Block 1 ).
- the TSP system 110 can run a tax fraud alert system 120 appliance/API (provided by the tax fraud alert system 120 ) to depersonalize the data (Block 2 ) and then securely send the data to the tax fraud alert system 120 (Block 3 ), such as, for example, by encrypting fields of tax records to depersonalize the data and then write it to a batch file that is sent to the tax fraud alert system 120 on a periodic basis (for example, real time, hourly, daily, and so forth).
- a periodic basis for example, real time, hourly, daily, and so forth.
- TSP ID “A12BCD6748HU23J”.
- the tax fraud alert system 120 may then use the same appliance/API to add the TSP ID to the relevant backend data sets and also send the TSP batch file to the component in the system to perform the various analytics and checks (Block 4 ) (for example, to the back-end system components, the identity verification engine 122 and best contact engine 124 ).
- the system components conduct the analytics and checks and return a response file back to the consumer-facing components of the tax fraud alert system 120 with notification information and the results of the fraud checks such as, for example, whether checks on name, address, email, phone number, SSN, and/or bank account passed or failed (Block 5 ).
- the consumer-facing components of the tax fraud alert system 120 then notify the tax payer or customer of the tax submission and provide a portal to track flagged fraud cases and a portal to remediate the issue, such as via an online portal or a call center (Block 6 ).
- the user may be notified via one or more channels, such as, for example, email, SMS messaging, and/or direct mail.
- the consumer-facing components of the tax fraud alert system 120 may also notify the TSP of the potential fraud risk so that the TSP can place a hold on or cancel the tax return and/or refund (Block 7 a ).
- the user may contact the remediation center to obtain help with the remediation process prior to TSP processing the tax return and sending out a refund (Block 7 b ).
- a tax filer can submit a tax form with PII to one or more TSP systems 110 (Block 1 ).
- the TSP system 110 can use an API or batch interface to communicate with a fraud alert system (such as for example, the tax fraud alert system 120 shown in FIG. 1 B ) to securely transport tax filer's records (Block 2 ) such as by encrypting the PII and sending the encrypted data to the tax fraud alert system 120 (for example the front-end system accessible via an interface).
- the tax fraud alert system 120 can then send the data to determine the fraud risk (Block 3 ), for example, by sending the PII to the back-end system of the identity verification engine 122 and best contact engine 124 ).
- An alert may then be provided (Block 4 ), for example to the alert notification system with notification information and results of the fraud checks, such as, for example, whether checks on name, address, email, phone number, SSN, and/or bank account passed or failed.
- a person associated with the PII (who may or may not be the same one as the tax filer) may be notified regarding the tax filing such as via email, SMS messaging, and/or direct mail (Block 5 a ).
- the TSP may also be notified of the potential fraud risk so that the TSP can decide whether to place a hold on or cancel the tax return (Block 5 b ).
- the tax filer can then contact an entity to assist with the remediation process (Block 6 ), such as, for example, before the TSP processes the tax return or sends out a tax refund.
- the fraud alert system upon receiving tax filer's records, can analyze the data in the tax filer's records and send results to an alert notification engine.
- the alert notification engine can notify the tax filer (or another entity if the tax filer is using the other entity's identity) of the tax submission and/or notify the TSP system 110 of the potential fraud risk.
- the notification to the tax filer can indicate that a tax form has been filed using the entity's tax ID.
- FIGS. 1 C- 1 , 1 C- 2 , 1 D, and 1 E represent embodiments of example systems and processes and that other systems or processes may be used.
- the processes are performed by the tax fraud alert system 120 and/or by one of its components, such as a processor or a controls system.
- other components of the tax fraud alert system 120 or other components may perform one or more of the processes.
- the following describes the services as performed by the tax fraud alert system 120 or one or more of its components.
- the example scenarios are intended to illustrate, but not to limit, various aspects of the tax fraud alert system 120 .
- the processes can vary from the exemplary flowcharts, with some blocks omitted and others added. It is also recognized that one or more blocks in the flowcharts may be optional.
- the tax fraud alert system 120 may be configured to perform only a subset of the blocks in the flowcharts.
- the illustrated embodiments of FIG. 1 B includes a tax fraud alert system 120 which includes an identity verification engine 122 , a best contact engine, 124 , and an alert notification engine 126 .
- the exemplary tax fraud alert system 120 includes a set of backend servers 128 , including an FTP/Batch server 128 a configured to process File Transfer Protocol or other batch requests, an API server 128 b configured to provide an API portal for other systems to access the tax fraud alert system 120 and/or to make calls to third party APIs, as well as a notification server 128 c configured to send and receive electronic notifications.
- FIG. 2 A illustrates example embodiments of an identity verification engine (IVE) 122 .
- the IVE or service 122 may use proprietary data from one or more credit bureaus 123 and other relevant data sources to find the best or a close match to the filer identity elements provided in accordance with the preferences agreed to with the TSP. If the tax filing or tax ID is for a business, the IVE rules and supporting data sources may support identifying the business representatives that should be notified of the tax filing.
- the IVE 122 receive inputs including rules, TSP preferences and taxpayer's tax ID and PII from the TSP.
- the IVE 122 may then access data to select which data to use for the identity verification based on the received inputs.
- the data may include data from third party data aggregators such as public record databases, fraud data, credit bureaus, and/or directories, data from proprietary databases such as credit data, non-credit data, business data, consumer data, fraud data, subprime lending data, and/or compiled data.
- the data is then used to verify the identity(ies) and provide notification of whether such identity(ies) were verified.
- some example features of the IVE 122 can include one or more of the following:
- Different or additional sources may also be used for this service depending on the inputs provided by the TSP and the TSP preferences for how to handle identify verification.
- the IVE 122 can include configurable rules. Some example scenarios and configurations are described in the table below.
- FIG. 2 B illustrates example embodiments of a contact engine or best contact engine (BCE) 124 .
- the BCE or service 124 can use proprietary data from one or more credit bureaus and other relevant data sources to find contact information 125 (for example, a matched contact information or the best contact information) for the tax alerts and notify the tax filers in accordance with the preferences agreed to with the TSP.
- contact information 125 for example, a matched contact information or the best contact information
- the BCE 124 receives input such as rules, TSP preferences, and identity(ies) from the IVE 122 .
- the BCE 124 may then review data to provide contact details.
- the data may include data from third party data aggregators such as phone or mobile data aggregators, directories, and/or skip trace databases, as well as data from proprietary database such as consumer data, business data, change of address data, and/or marketing data.
- the BDE 124 then generates an electronic indication of contact details.
- the types of information and software services that can be executed together with the BCE 124 for locating the contact information can include one or more of the following:
- Different or additional sources may also be used for this service depending on the inputs provided by the TSP and the TSP preferences for how to handle matching ambiguities.
- FIG. 2 C illustrates example embodiments of an alert notification engine (ANE) 126 .
- ANE alert notification engine
- the ANE or service 126 can follow the rules agreed to with the TSP 127 regarding who to contact and how to handle identity matching ambiguities or discrepancies.
- the notification processes for this service can manage distribution channel and distribution schedule.
- the ANE 126 receives the contact data from the BCE 124 and then generates alert packages to be sent to recipients based on the TSP configured distribution channels.
- the alert data may be sent to a web service API or to a batch file to allow the tax filer or product/service subscriber to access the alert information.
- the tax filer may have to provide certain information to access the alert, such as a logon, a filing data, a filer ID, a refund amount, and so forth.
- the alert data may also, or instead, be provided to a configured template which will be loaded and sent to a desired channel such as email, direct mail, SMS messaging, and/or a phone call.
- distribution channels provide TSP several options for sending the alert to the tax filer.
- Some example distribution channels include:
- distribution schedule may be appropriate to handle large volumes.
- the alert notification engine can avoid sending a volume of notifications at once that would result in an inquiry volume that could not be supported by the call centers.
- the notification may follow one or more templates which may be approved by TSPs. Selection of appropriate templates depending on TSP preferences, notification channel (for example, the template for text messages would be different than the template for emails), and PII available for a tax filer. Parameter substitution for notification templates including ways for tax payers or tax filers to authenticate that the tax alert notice is legitimate. Some examples of how to show legitimacy of the alert include one or more of:
- each tax alert sent can include a unique identifier that can be used by the user when contacting the branded call center, reaching the branded web portal to handle tax alert inquiries, and/or when calling the TSP directly to inquire about the alert or to dispute the tax filing.
- the tax fraud alert system 120 can offer TSPs multiple options to support the tax filers that receive the tax alert notification.
- the alert itself can include the appropriate calls to action for the filer in accordance with the option(s) the TSP selected for offering alert notification support.
- Some examples of alert notification support can include one or more of:
- the TSP can also choose which functions may be offered by the call center or the web portal as applicable if TSP chooses to have another entity to host the call center or the web portal.
- Some example functions can include one or more of:
- TSP may choose to have the host (of the call center and/or web portal) to either escalate handling of disputes and/or stop payments on refunds, or the TSP may offer a web service that allows the host to initiate a dispute programmatically via either the web portal and/or an administrative tool available to the call center staff.
- FIGS. 2 D- 1 and 2 D 2 illustrate flow diagrams for embodiments of call center support processes.
- the host of the call center support service can provide call center agents trained to handle inquiries from users that received a tax alert.
- the agents can be given training and scripts approved by the TSP with detailed instructions on how to address all possible inquiries from the end user and how to escalate issues.
- the scope of what the call center can handle may depend on the configurable options chosen by the TSP.
- a tax filer calls a support line and an agent searches a database with information provided to the tax filer in the alert notification to locate the tax filer.
- the alert may have been electronically attached to the tax filer's profile in a backend database.
- PII may be used to identify a tax filer, including, for example, alert ID (for example, a unique identifier generated for an alert), a filer ID (for example, the social security number of entity number of the filer provided by the TSP), and/or a return ID (for example, a unique identifier generated for the tax return submission provided by the TSP).
- the tax filer may be authenticated, for example, using data from the tax filer's tax return submission.
- the agent may initiate authentication by accessing an authentication process of a proprietary authentication service. For example, authentication questions may be asked which can be retrieved based on the located user's social security number, address, and so forth. If the tax filer passes the authentication, the agent may be directed by the system to answer the tax filer's questions and/or initiate a dispute process. If the tax filer does not pass the authentication, the agent may be presented with instructions to inform the tax payer or customer of the inability to verify the tax filer's information.
- the system determines whether the TSP is using a contracted call center or the TSP's call center. If a contracted call center, then a call is received by the contracted call center, the agent searches a backend database by tax return ID to find the tax return submission, the backend authenticates the user using data from the tax return submission and backend database (for example, simple authentication using submission data, or non-credit knowledge based authentication), if the user passes the authentication the agent files a ticket in the call center system and includes call disposition data (for example general questions and answer, fraud event information), the reporting collects the call center tickets on a regular basis (for example, in real time, hourly, daily, and so forth) and send them to the TSP for investigation (for example, via FTP, SFPT, restful reporting service, and so forth).
- call disposition data for example general questions and answer, fraud event information
- the TSP receives the call.
- the TSP agent searches the TSP database by tax return ID to find the tax return submission, the TSP authenticates the user using data from the tax return submission, if the user passes the authentication, the submission is held by TSP pending TSP's fraud investigation.
- next the TSP may investigate the submission and cancel the fraudulent return or puts the return on hold.
- the TSP contacts the user and provides them a code to file their real tax return when ready. In some embodiments, this could be a notification from the backend (for example, the tax fraud alert system 120 ) which may pass the status of the investigation to the backend with a tax submission code. It is recognized that some TSPs may have a process for generating unique IDs for victims of identity theft. This ID may be entered to file a tax return and may be already integrated into the TSP. This could be used when the user is ready to submit their real return.
- FIG. 2 D- 2 are meant to illustrate example embodiments and not limit the disclosure.
- the host's databases may be used to implement one or more of the following functions related to call center support:
- FIG. 2 E illustrates a flow diagram for embodiments of a web portal support process. If the TSP chooses the web portal support option, a host of the web portal can provide a web service portal to service users with the look, feel, and content approved by the TSP. The portal can be designed to handle inquiries from users that received a tax alert.
- the backend system receives an indication that a tax filer has logged onto the web portal and retrieves alert information associated with the user.
- the identity verification process is initiated. For example, in some embodiments, prior to any information being shared, the system may prompt knowledge based authentication questions and/or use proprietary authentication services. The knowledge based authentication questions may be based off of the located user's social security number, entity number, address and so forth. If the user's passes authentication, the alert information and dispute information may be display on a user interface. If the user does not pass authentication, the portal may inform the user of its inability to verify the user.
- the portal can have automated ways or static content that address one or more of the following functions:
- white labeling services may be provided allowing one or more tax filer facing systems to be branded with one entity and one or more backend processes or services to be run by an entity other than the entity associated with the branding.
- the white labeling services may be hosted by the backend processes and/or a system of the entity associated with the branding.
- FIG. 2 F illustrates a flow diagram for embodiments of a dispute process.
- a tax filer calls or logs onto a portal and is provided alert details.
- An agent may initiate a dispute and may then transfer the call to the appropriate TSP, submit the dispute via a web service tool which may be integrated with the appropriate TSP, and/or submit the dispute via a batch service tool which may be integrated with the appropriate TSP.
- the TSP then receives the dispute and may suspend the refund and initiate an investigation.
- the web service tool and/or batch service tool may be provided by a customer service representative (CSR) system.
- CSR customer service representative
- the TSP can establish manual or automated processes that allow the tax fraud alert system 120 to perform one or more of the following:
- the tax fraud alert system 120 also includes one or more components and processes to provide automated configuration services for the other systems, such as the TSP systems, third party vendors, or third party data suppliers.
- the configuration may be provided via a remotely accessible portal that allows a user of a third party system to access the portal, review the options for configuration, provide electronic indications of the selected options, and instruct the portal to store the options.
- the TSP can configure one or more of the following options:
- the TSP may be offered configurable options for what information to share and how to share it. Some features in this solution can only be available if certain optional inputs are provided. For example, the ability to present to the end user dollar amounts specific to their tax filing as a way for the user to gain confidence that the notification is legitimate would only be possible if the TSP is willing to provide such dollar amounts for use in this solution. Omission of optional PII might reduce the efficacy of the service or render some features unavailable.
- the PII submitted can be expected to be what the tax filer provided in the tax form filing and does not necessarily have to be verified by the TSP before submitting the PII to the service.
- Examples of submitted PII may include one or more of the following:
- FIG. 3 illustrates a general architecture of a computing system for processing implementing various aspects of the present disclosure. Many or all of the components of the computing system shown in FIG. 3 may be included in the various computing devices and systems discussed herein, including the TSP systems, the tax fraud alert system 120 , the tax filer system 130 , the third party vendor systems, the third party data systems, and so forth.
- the computing system may include, for example, a personal computer (such as, for example, IBM, Macintosh, Microsoft Windows compatible, OS X compatible, Linux/Unix compatible, or other types of computing systems, alone or in combination), a server, a workstation, a laptop computer, a smart phone, a smart watch, a personal digital assistant, a kiosk, a car console, a tablet, or a media player.
- the computing system's processing system 600 includes one or more central processing units (CPU) 612 , which may each include a conventional or proprietary microprocessor specially configured to perform, in whole or in part, one or more of the features described above.
- CPU central processing units
- the processing system 600 further includes one or more memory 618 , such as random access memory (RAM) for temporary storage of information, one or more read only memory (ROM) for permanent storage of information, and one or more mass storage device 603 , such as a hard drive, diskette, solid state drive, or optical media storage device.
- RAM random access memory
- ROM read only memory
- mass storage device 603 such as a hard drive, diskette, solid state drive, or optical media storage device.
- a data store 621 may also be included.
- the data store 621 may be designed to handle large quantities of data and provide fast retrieval of the records.
- the data store 621 may be indexed using one or more of compressed data, identifiers, or other data, such as that described above.
- the components of the processing system 600 are connected using a standards-based bus system 624 .
- the standards-based bus system 624 could be implemented in Peripheral Component Interconnect (PCI), Microchannel, Small Computer System Interface (SCSI), Industrial Standard Architecture (ISA) and Extended ISA (EISA) architectures, for example.
- PCI Peripheral Component Interconnect
- SCSI Small Computer System Interface
- ISA Industrial Standard Architecture
- EISA Extended ISA
- the functionality provided for in the components and modules of processing system 600 may be combined into fewer components and modules or further separated into additional components and modules.
- the processing system 600 is generally controlled and coordinated by operating system software, such as Windows XP, Windows Vista, Windows 7, Windows 8, Windows 10, Windows Server, Unix, Linux, SunOS, Solaris, iOS, MAC OS X, Blackberry OS, Android, or other operating systems.
- operating system software such as Windows XP, Windows Vista, Windows 7, Windows 8, Windows 10, Windows Server, Unix, Linux, SunOS, Solaris, iOS, MAC OS X, Blackberry OS, Android, or other operating systems.
- the processing system 600 may be controlled by a proprietary operating system.
- the operating system is configured to control and schedule computer processes for execution, perform memory management, provide file system, networking, I/O services, and provide a user interface, such as a graphical user interface (GUI), among other things.
- GUI graphical user interface
- the GUI may include an application interface and/or a web-based interface including data fields for receiving input signals or providing electronic information and/or for providing information to the user in response to any received input signals.
- a GUI may be implemented in whole or in part using technologies such as HTML, Flash, Java, .net, web services, and RSS.
- a GUI may be included in a stand-alone client (for example, thick client, fat client) configured to communicate (for example, send or receive data) in accordance with one or more of the aspects described.
- the processing system 600 may include one or more commonly available input/output (I/O) devices and interfaces 615 , such as a keyboard, stylus, touch screen, mouse, touchpad, and printer.
- the I/O devices and interfaces 615 include one or more display devices, such as a monitor, that allows the visual presentation of data to a user. More particularly, a display device provides for the presentation of GUIs, application software data, and multimedia presentations, for example.
- the processing system 600 may also include one or more multimedia devices 606 , such as speakers, video cards, graphics accelerators, and microphones, for example.
- the I/O devices and interfaces 615 provide a communication interface to various external devices.
- the processing system 600 may be electronically coupled to one or more networks, which comprise one or more of a LAN, WAN, cellular network, satellite network, and/or the Internet, for example, via a wired, wireless, or combination of wired and wireless communication link.
- the networks communicate with various computing devices and/or other electronic devices via wired or wireless communication links.
- the communication can occur using various protocols such as, for example, the File Transfer Protocol (FTP), Secure File Transfer Protocol (SFTP), Hypertext Transfer Protocol (HTTP), Transmission Control Protocol/Internet Protocol (TCP/IP), and so on.
- FTP File Transfer Protocol
- SFTP Secure File Transfer Protocol
- HTTP Hypertext Transfer Protocol
- TCP/IP Transmission Control Protocol/Internet Protocol
- information may be provided to the processing system 600 over a network from one or more data sources.
- the data sources may include one or more internal and/or external data sources.
- one or more of the databases or data sources may be implemented using a relational database, such as Sybase, Oracle, CodeBase and Microsoft® SQL Server as well as other types of databases such as, for example, a flat file database, a non-relational database, an entity-relationship database, and object-oriented database, and/or a record-based database.
- module refers to logic embodied in hardware or firmware, or to a collection of software instructions, possibly having entry and exit points, written in a programming language, such as, for example, Java, Lua, C, or C++.
- a software module may be compiled and linked into an executable program, installed in a dynamic link library, or may be written in an interpreted programming language such as, for example, BASIC, Perl, or Python. It will be appreciated that software modules may be callable from other modules or from themselves, and/or may be invoked in response to detected events or interrupts.
- Software modules configured for execution on computing devices may be provided on a computer readable medium, such as a compact disc, digital video disc, flash drive, or any other tangible medium.
- Such software code may be stored, partially or fully, on a memory device of the executing computing device, such as the processing system 600 , for execution by the computing device.
- Software instructions may be embedded in firmware, such as an EPROM.
- hardware modules may be comprised of connected logic units, such as gates and flip-flops, and/or may be comprised of programmable units, such as programmable gate arrays or processors.
- the modules described herein are preferably implemented as software modules. They may be represented in hardware or firmware. Generally, the modules described herein refer to logical modules that may be combined with other modules or divided into sub-modules despite their physical organization or storage.
- the modules 609 may be configured for execution by the CPU 612 to perform, in whole or in part, any or all of the process discussed above.
- the processes may also be performed by one or more virtual machines.
- the processes may be hosted by a cloud computing system.
- one or more components of the processing system 600 may be part of the cloud computing system.
- the virtualization may be achieved at the operating system level.
- the one or more processes described herein may be executed using application containerization.
- the one or more processes may also be implemented on a Lambda architecture designed to handle mass quantities of data by taking advantage of the batch processing and the stream processing.
- All of the processes described herein may be embodied in, and fully automated, via software code modules executed by a computing system that includes one or more computers or processors.
- at least some of the processes may be implemented using virtualization techniques such as, for example, cloud computing, application containerization, or Lambda architecture, so on, alone or in combination.
- the code modules may be stored in any type of non-transitory computer-readable medium or other computer storage device. Some or all the methods may be embodied in specialized computer hardware.
- a processor can be a microprocessor, but in the alternative, the processor can be a controller, microcontroller, or state machine, combinations of the same, or the like.
- a processor can include electrical circuitry configured to process computer-executable instructions.
- a processor in another embodiment, includes an FPGA or other programmable device that performs logic operations without processing computer-executable instructions.
- a processor can also be implemented as a combination of computing devices, for example, a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
- a processor may also include primarily analog components. For example, some or all of the signal processing algorithms described herein may be implemented in analog circuitry or mixed analog and digital circuitry.
- a computing environment can include any type of computer system, including, but not limited to, a computer system based on a microprocessor, a mainframe computer, a digital signal processor, a portable computing device, a device controller, or a computational engine within an appliance, to name a few.
- Disjunctive language such as the phrase “at least one of X, Y, or Z,” unless specifically stated otherwise, is understood with the context as used in general to present that an item, term, etc., may be either X, Y, or Z, or any combination thereof (for example, X, Y, and/or Z). Thus, such disjunctive language is not generally intended to, and should not, imply that certain embodiments require at least one of X, at least one of Y, or at least one of Z to each be present.
- a device configured to are intended to include one or more recited devices. Such one or more recited devices can also be collectively configured to carry out the stated recitations.
- a processor configured to carry out recitations A, B and C can include a first processor configured to carry out recitation A working in conjunction with a second processor configured to carry out recitations B and C.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Development Economics (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Economics (AREA)
- General Health & Medical Sciences (AREA)
- Marketing (AREA)
- Health & Medical Sciences (AREA)
- General Business, Economics & Management (AREA)
- Tourism & Hospitality (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Bioethics (AREA)
- Educational Administration (AREA)
- Computing Systems (AREA)
- Databases & Information Systems (AREA)
- Software Systems (AREA)
- Medical Informatics (AREA)
- Primary Health Care (AREA)
- Game Theory and Decision Science (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Technology Law (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Embodiments of a security and identity verification system are disclosed. The security and identity verification system may comprise a system that conducts automated identify verification of tax filers and generates electronic alerts to send to tax filers upon filing of a tax form with a tax service provider. The tax fraud alert system may also provide remediation services in coordination with tax service providers in the event a fraudulent form is filed; and/or validate tax identity information and the corresponding good or best tax filer contact information in order to notify the tax filer in a timely manner.
Description
- This application is a continuation of U.S. patent application Ser. No. 17/116,423, filed Dec. 9, 2020, which is a continuation of U.S. patent application Ser. No. 16/189,990, filed Nov. 13, 2018, which claims the benefit of U.S. Provisional Patent Application Ser. No. 62/586,014, filed Nov. 14, 2017, the entire contents of which are hereby incorporated herein by reference in their entirety and for all purposes.
- A portion of the disclosure of this patent document includes material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyrights whatsoever.
- The present disclosure generally relates to information security for tax filings in a computer environment.
- In recent years, the number of third party, unwanted intrusions into private computing environments has continued to increase. These intrusions may come in a variety of forms, such as malicious third party systems attempting to emulate or impersonate the systems of a standard user. Such intrusions can be very disruptive and may, for example, immobilize operations, allow for the unauthorized access to sensitive data, or allow for the embezzlement of a user's account and corresponding funds.
- Various systems and methods are disclosed which include features relating to security and identity verification systems and architectures to analyze and detect unauthorized third party intrusions and/or access.
- The systems, methods, and devices of the disclosure each have several innovative aspects, no single one of which is solely responsible for the desirable attributes disclosed herein.
- In one embodiment, a fraud detection and alert system is disclosed. The fraud detection and alert system may comprise: one or more data stores configured to store computer-executable instructions; a network interface configured to communicate with a plurality of network service devices; and one or more physical computer processors in communication with the one or more data stores, wherein the computer-executable instructions, when executed, configure the one or more processors to: receive, via the network interface, an electronic request for a filing of an application, wherein the electronic request is associated with a first user and includes user data associated with the first user; match, based on the electronic request, the user data associated with the first user to verification data stored in one or more searchable databases, wherein the verification data is associated with the first user; transmit notification to first user device associated with the first user regarding the successful application filing of the first user's application; receive an indication from the first user device indicating a possible fraudulent electronic request; determine, based on the indication, that the electronic request is fraudulent; and generate electronic instructions to stop the filing of the application as requested by the electronic requests.
- In another embodiment, a computerized method for detecting fraudulent tax filings is disclosed. The computerized method may comprise: receiving, via a network interface, an electronic request for a filing of an application, wherein the electronic request is associated with a first user and includes user data associated with the first user; matching, based on the electronic request and using one or more computer processors, the user data associated with the first user to verification data stored in one or more searchable databases, wherein the verification data is associated with the first user; transmitting, via one or more computer processors, notification to first user device associated with the first user regarding the successful application filing of the first user's application; receiving, via a network interface, an indication from the first user device indicating a possible fraudulent electronic request; determining, via one or more computer processors, based on the indication, that the electronic request is fraudulent; and generating, via one or more computer processors, electronic instructions to stop the filing of the application as requested by the electronic request.
- In a further embodiment, a non-transitory storage medium for storing instructions adapted to be executed by a processor to perform a method for automatically detecting fraudulent tax filings is disclosed. The instructions may comprise: receiving an electronic request for a filing of an application, wherein the electronic request is associated with a first user and includes user data associated with the first user; matching, based on the electronic request, the user data associated with the first user to verification data stored in one or more searchable databases, wherein the verification data is associated with the first user; transmitting notification to first user device associated with the first user regarding the successful application filing of the first user's application; receiving an indication from the first user device indicating a possible fraudulent electronic request; determining based on the indication, that the electronic request is fraudulent; and generating electronic instructions to stop the filing of the application as requested by the electronic request.
- Although certain embodiments and examples are disclosed herein, the subject matter extends beyond the examples in the specifically disclosed embodiments to other alternative embodiments and/or uses, and to modifications and equivalents thereof.
-
FIG. 1A illustrates example embodiments of a security and identity verification system. -
FIG. 1B illustrates example embodiments of a tax fraud alert system. -
FIGS. 1C-1, 1C-2, 1D, and 1E illustrate example processes that can be implemented by embodiments of one or more components of the tax fraud alert system. -
FIG. 2A illustrates example embodiments of an identity verification engine. -
FIG. 2B illustrates example embodiments of a contact engine. -
FIG. 2C illustrates example embodiments of an alert notification engine. -
FIGS. 2D-1 and 2D-2 illustrate flow diagrams for embodiments of call center support processes. -
FIG. 2E illustrates a flow diagram for embodiments of a web portal support process. -
FIG. 2F illustrates a flow diagram for embodiments of a dispute process. -
FIG. 3 illustrates an embodiment of a computing system which may implement example embodiments of one or more components of the tax fraud alert system. - Throughout the drawings, reference numbers are re-used to indicate correspondence between referenced elements. The drawings are provided to illustrate embodiments of the subject matter described herein and not to limit the scope thereof.
- Although certain embodiments and examples are disclosed herein, the subject matter extends beyond the examples in the specifically disclosed embodiments to other alternative embodiments and/or uses, and to modifications and equivalents thereof.
- Tax authorities such as a state or federal government continuously combat fraudulent activities such as noncompliance, evasion, identity theft and refund fraud. Unfortunately, despite widespread government crackdowns, fraudsters are finding new and creative ways to defraud the government and legitimate taxpayers. For example, some individuals and groups acquire personally identifiable information (PII) from the deceased, dumpster dive, hack financial systems, buy information from someone not filing a return or otherwise steal it from legitimate sources such as a doctor's office. This PII can then be used to fill out tax returns, add fraudulent income information, and request false deductions.
- Fake returns and identity theft cause the government to lose billions of dollars. For example, during the first nine months of 2016, the Federal tax authority flagged roughly 787,000 fake returns claiming $4 billion in refunds, and 237,750 taxpayers filed affidavits saying they, too, were victims of tax identity theft. (See https://www.irs.gov/newsroom/irs-security-summit-partners-expand-identity-theft-safeguards-for-2017-filing-season-build-on-2016-successes). According to a May 2014 Governing Institute research study of 129 state and local government officials, 43 percent of respondents cited identity theft as the biggest challenge their agency faces regarding tax return fraud. Nationwide, stealing identities and filing for tax refunds is one of the fastest-growing nonviolent criminal activities. Although federal agencies and some states have been able to start reducing identity theft tax refund fraud for individuals, tax refund fraud involving businesses is on the rise. These activities burden government agencies and rob taxpayers by preventing returns from reaching the right people. Clearly, tax fraud through identity theft is still a major issue facing the tax authorities and taxpayers.
- Most recently in a June 2017 report by the Electronic Tax Administration Advisory Committee (ETAAC) published by the Internal Revenue Service (IRS), Identity Theft Tax Refund Fraud (IDTTRF) was described as a tough problem for tax authorities to solve. The report went further to say that criminals are incentivized by the potential availability of billions of dollars in refunds, particularly driven by refundable tax credits intended to help low and moderate-income Americans. The criminals are smart, nimble, motivated and well-funded.
- Tax collection agencies, such as tax authorities at the local, state, and federal level, combined continue to lose billions of dollars in tax refund fraud. Tax service providers (TSPs), such as the tax collection agencies or a private tax preparation organization such as Intuit, H&R Block, or other tax preparation business, are well-aware of the magnitude of the tax fraud problem. However, budgetary constraints and legal mandates have created a system that is often unable to follow up on the red flags until after a refund check has been sent. In addition, the consumer or customers' identities and ability to receive a timely return may be put at risk in the process. Some TSPs continue to expand filters used to detect identity theft tax refund fraud. Tax returns identified by these filters can be held during processing until the TSPs can verify the taxpayers' identities. This filtering approach, however, is problematic because it focuses only on fraud detection rather than proactively informing a tax payer of a tax filing to enable prevention. Further, as tax-refund fraud has soared and hit a whopping $21 billion in 2016, up from just $6.5 billion two years ago, the problem of tax-refund fraud is growing quickly and is compounded by an outdated fraud-detection system that has trouble identifying many attempts to trick it. Although federal agencies and some states have been able to start reducing identity theft tax refund fraud for individuals, tax refund fraud involving businesses is on the rise.
- Security practices can have a significant impact on the tax experience and taxpayer behavior. Improving the taxpayer experience may require sustained creativity and focus for a TSP to build systems that are both secure and, conversely, easy to access and use from a taxpayer perspective. A system that is secure, but that few can use, may not be successful for a TSP as it expands some of its key online services. Thus, in some embodiments, a TSP may strive to achieve a situation where services are both secure and easy to use and access. For example, a TSP may benefit from a system that provides more intelligent and customizable fraud detection checks to inform the TSP, before a refund check is processed and mailed out or sent to a direct deposit account, that a tax transaction is at risk of being fraudulent, and/or provides multiple channels to notify their tax payers or customers proactively of both legitimate and fraudulent returns. Further, consumers may also benefit from a system which can: preemptively notify them that tax forms have been filed with their tax identifier (ID) or their business' tax ID regardless of whether they have been flagged as a potential fraudulent tax filing; provide a channel via online or through call centers to contact the IRS or its proxy to remediate the issue if they believe the tax filing is fraudulent; and/or provide a system to track the progress of their cases.
- To provide an improved computer system for detecting and alerting tax frauds, embodiments of a security and identity verification system or tax fraud alert system described herein promotes a more proactive and interactive relationship between the taxpayer and government employees to improve taxpayer service, enforcement and operations. Instead of the typical approach of trying to enhance detection of fraudulent tax form submissions, this solution aims to send positive notifications to tax payers when their tax return is filed and/or when any tax form is filed using the tax payers' individual tax ID or business tax ID(s). In some embodiments, the solution can leverage data from one or more credit bureaus and other data sources and algorithms to find good or even the best contact information for a tax payer and send the tax alerts. In some embodiments, the solution can also leverage other software suites and call centers to handle callbacks from users that received a tax alert and suspect fraud or have questions.
- As an example, in some embodiments, a portion of the tax fraud alert system can be run at data centers of a tax authority if the tax authority's integration model does not allow non-public personal information (NPPI) data from tax forms to leave their premises, or where the some or all portions of the NPPI data can leave the premise, the system can offer a set of Application Programming Interfaces (APIs)/batch processes to send a subset of NPPI data from tax forms to another entity for the system to determine the correct identity(ies) tied to the individual tax ID or business tax ID in the tax form, selecting contact information to send the tax alert, and/or for handling customer support for those that receive a tax alert. While processing the NPPI submitted, in some embodiments, the system may also perform various types of fraud checks. Some example fraud checks can include: SSN check, multiple submissions to the same address (velocity of the same address being used), multiple submissions to the same bank account, verify against deceased records, communication checks (email, phone numbers, residential address), checking NPPI data in the tax filing against the credit bureau data to look for discrepancies and to verify communication channels, and/or a combination of positive activity tax alerts to all consumers or customers filing taxes and customizable fraud checks.
- By notifying the taxpayer that their identity, tax ID, or business tax ID has been used to file a tax form, the consumer can respond to tax authorities and stop the process if they have not submitted a tax form. This proactive communication can prevent loss of tax refunds associated with identity fraud, significantly reduce fraudulent or unauthorized individual or business tax filings whether a refund is involved or not, and alert taxpayers to possible identity theft. In addition, in the June 2017 Electronic Tax Administration Advisory Committee (ETAAC) report published by IRS, the committee cited among its principal recommendations in addressing identity based tax fraud the need to improve authentication practices, including using innovative pilots and finding a replacement solution for the outmoded 2016 AGI/PIN e-file signature verification.
- As further described herein, embodiments of the tax fraud alert system can use Personally Identifiable Information (PII) to verify a taxpayer's identity. For example, the PII used on the tax filing can be verified as belonging to the legitimate taxpayer through an independent verification process. Once the legitimate taxpayer is located, the most recent contact information including landline or mobile phone number, mailing address, and/or email associated with the legitimate taxpayer can be sent an alert notifying the taxpayer that a tax return has been filed with the taxpayer's credentials. If the legitimate taxpayer has not submitted a filing, the taxpayer can be provided with an option to contact the tax authority's customer service center or visit a web portal to get more information, and if necessary initiate a dispute and potentially stop payment of any tax refunds tied to the tax filing. The tax fraud alert system can offer a branded call center and/or a branded web portal to handle customers' or tax payers' inquiries about the tax alerts.
- In some embodiments, the function of the tax fraud alert system can be twofold—(1) the successful delivery of the tax alert can serve to confirm the legitimate tax payer has filed the return and/or (2) the verification process ensures delivery of alerts to the legitimate taxpayer which results in additional information that can be useful in the overall review of the tax filing. TSP can be provided with a result from the taxpayer verification process, such as, for example, no taxpayer verified through information provided, taxpayer found to be deceased, or taxpayer/location found to be prison. One or more of these results may allow a tax authority to take next steps in the return evaluation process independent of taxpayer response to alerts or content of alerts generated.
- Advantageously, in some embodiments, the alert does not add any additional time for processing, but may even shorten the time for processing because if a legitimate taxpayer receives the alert and notifies a tax authority that the taxpayer did not submit the tax filing in question, the tax filing can be sent immediately to fraud prevention for further evaluation. Unlike some existing tax fraud prevention efforts requiring the taxpayer to first obtain a PIN from the TSP to submit it in a tax form, in some embodiments, this tax fraud alert system does not require any taxpayer interaction to be in effect. The legitimate taxpayer does not have to opt-in in order to receive a notification that a tax form has been filed using tax ID or business tax ID that belongs to him or her.
- In some embodiments, before sending a taxpayer filing alert, another entity (such as, for example, a credit bureau) can independently verify identity of the taxpayer, and independently locate and verify a mobile phone and/or other contact information associated with the legitimate taxpayer and/or find the best mobile phone number and other contact information. In some embodiments, alerts may only be sent if both the taxpayer and contact information can be verified. If taxpayer receiving the tax alert has submitted a tax form in his or her name or on behalf of a business, then he or she does not have to take any action. The majority of alerts may serve as a notification with no action required. If the taxpayer has not filed any tax form, the taxpayer can be provided with a call center number to contact for remediation efforts. The alerting process, while largely frictionless to the taxpayer, becomes an indispensable, proactive tool in combatting identity theft tax return fraud at the onset.
-
FIG. 1A illustrates an example embodiment of a security andidentity verification system 100 which can be used to provide tax alerts. The exemplary security andidentity verification system 100 includes a set ofthird party systems 110 which communicate with a taxfraud alert system 120 and with tax payer/tax filer systems 130 via acommunications network 140. It is recognized that in some fraudulent situations, the tax payer and the tax filer are not the same entity, but the use of the term “tax filer” herein is meant to apply to the tax payer and not a fraudulent tax filer. - The security and
identity verification system 100 may include multiplethird party system 110 which communicate with the taxfraud alert system 120, such as to submit data, provide information on filed tax returns, and receive alerts for possible tax filing fraud. In some embodiments thethird party systems 110 may include TSP systems (for example, systems of the US Federal Government, systems of state governments), third party vendor systems, third party data provider systems, and/or other third party systems. Thethird party systems 110 may be implemented using a variety of devices including, for example, personal computers, servers, tablets, smart phones, smart watches, car consoles, or the like, alone or in combination. The exemplarythird party systems 110 include computer hardware and/or software that allows the devices to communicate with the taxalert fraud system 120 as well as one or more of the tax payer/tax filer systems 130 via thecommunications network 140. The taxfraud alert systems 120 may include a portal or other software or code that allows theTSP systems 110 to provide configurations for how therespective TSP system 110 would like to configure its alerts. The taxalert fraud systems 120 may be partitioned such that oneTSP system 110 and its private configurations are not accessible to or viewable by anotherTSP system 110. - The security and
identity verification system 100 may include multiple tax payer/tax filer systems 130 which are utilized by tax filers to, among other things, provide tax submissions, receive tax alerts, and/or review refund status. The tax payer/tax filer systems 130 may be implemented using a variety of devices including, for example, personal computers, servers, tablets, smart phones, smart watches, car consoles, or the like, alone or in combination. The exemplary tax payer/tax filer systems 130 include computer hardware and/or software that allows the devices to communicate with the taxalert fraud system 120 as well as one or more of thethird party systems 110, such as a tax service provider via the communications networks 140. To simplify discussion, but without limiting the present disclosure,FIG. 1 is described herein and illustrates only one tax payer/tax filer systems 130. - In some embodiments, the
communications network 140 comprises one or more of local area network (LAN), wide area network (WAN), and/or the Internet, for example, via a wired, wireless, or combination of wired and wireless communication links. Thecommunications network 140 may communicate with various computing devices and/or other electronic devices via wired or wireless communication links. Thecommunications network 140 may be used to share resources and may be used for the analog and/or digital transfer of data and information. In some embodiments, thecommunications network 140 can be used to enable multiple devices access to a single system, enable file sharing across thecommunications network 140, share software programs on remote systems, or make information easier to access and maintain among network users. - It is recognized that the term “remote” may include data, objects, devices, components, and/or modules not stored locally, that are not accessible via the local bus. Thus, remote devices may include a device which is physically stored in the same room and connected to the user's device via a network. In other situations, a remote device may be located in a separate geographic area, such as, for example, in a different location, country, and so forth.
-
FIG. 1B illustrates an example embodiment of a taxfraud alert system 120. The taxfraud alert system 120 comprises a system that provides alerts to tax filers upon a successful filing of a tax form with a TSP. The taxfraud alert system 120 can also provide remediation services in coordination with TSPs in the event a fraudulent form is filed; and/or validate tax identity information and the corresponding good or best tax filer contact information in order to notify the tax filer in a timely manner. This can be a multi-tenant system in which multiple TSPs are supported by the data submission process each with their own defined configuration of the type of Tax ID information (SSN, name, address, and so on) that is submitted to the taxfraud alert system 120. Each TSP may utilize one or more of the batch connectors or API connectors available in the taxfraud alert system 120 to submit data to the taxfraud alert system 120. - In some embodiments, the tax
fraud alert system 120 can include three sub-systems inFIG. 1B : (1) Identity Verification Engine (IVE) 122, (2) Best Contact Engine (BCE) 124, and (3) Alert Notification Engine (ANE) 126, with each engine having its own configuration database to support per tenant business rules. In some embodiments, theIVE 122 andBCE 124 may be optional per tenant, and the data submitted is allowed to bypass these engines and go straight to theANE 126 to notify tax filers. TheIVE 122 can include a configurable rules engine to review incoming data submission to validate and select the best or close matches to the true identity using the combination of data attributes (for example, social security number, name, and address) with known proprietary and public datasets. TheBCE 124 can also include a configurable rules engine that reviews incoming data attributes along with data attributes from proprietary and public records to determine at least one valid communication channel (for example, as many valid communication channels as possible, one communication channel, X communication channels) that can be linked to the legitimate tax filer. - In some embodiments, the output of the tax
fraud alert system 120 can include one or more of the following options. The first option may include a tax alert to each tax filer based on the results of theIVE 122 and/or theBCE 124. The second option may include a tax alert to identity submitted in the original tax form if theoptional IVE 122 andBCE 124 processes were not chosen or if theIVE 122 and/or theBCE 124 were unable to verify a different identity or different contact information than what was submitted in the tax form. This option can still be useful to stop cases where the thief uses the correct information of the tax filer and only changes the account information to be used for tax refunds. The TSP may also use this option to test the notification process and the remediation process for users that receive the notifications. The third option may include a tax fraud alert to the associated TSP with all records that have been flagged by theIVE 122 and theBCE 124. This option can be used by the TSP to initiate fraud investigations on flagged records. - Upon receipt of the tax alert via SMS, email, and/or direct mail, in some embodiments the tax filer may be given detailed instructions on whom to contact to remediate the issue in the event the tax filers believe a tax form was fraudulently filed in the tax filer's name or the name of the tax filer's business. In some embodiments, the tax filer may be automatically redirected to a remediation server which can provide automated remediation processes to assist the tax filer. During this remediation process, in some embodiments, a tax fraud alert can be sent to the associated TSP to halt any tax refund in process and to initiate a fraud review of the tax form, such as via a warm transfer or other transfer or data.
- In some embodiments, the tax alert comprises one or more encrypted data packets which stores information about the tax alert and is configured to be sent over an electronic communications network, such as the Internet.
-
FIGS. 1C-1, 1C-2, 1D, and 1E illustrate example processes that can be implemented by embodiments of one or more components of the taxfraud alert system 120. - For example, in
FIGS. 1C-1 and 1C-2 , a TSP system 110 (for example, a government entity server) can submit user's PII to a security platform or backend system (which may implement the taxfraud alert system 120 shown inFIG. 1B ). The backend system can process the PII to identify a correct tax payer and send an alert to the tax payer. The backend system can also include a remediation center such as, for example, a call center or a web portal which can receive reports from tax filers regarding possible fraud or receive confirmations of tax filings from the tax filers who received an alert from that taxfraud alert system 120 as shown inFIG. 1C-1 . - In some embodiments, the security platform or backend system (for example a tax notification system) can send the taxpayer other notices throughout the tax processing life cycle if a TSP selects this notification option. For example, as illustrated in
FIG. 1C-2 , the notices may be available for when tax is filed, and then later, when the tax processing is completed. The notices can also include the results from various stages of the tax processing life cycle. For example, results could be success or additional info needed, or an audit notice, or expect a refund in N days, or a tax refund was sent, and so forth. - 1. Tax Alert Processes—First Example
-
FIG. 1C-1 illustrates embodiments of a tax alert process. In the illustrated embodiments, starting at (1) the tax payer (whether a user or business representative) or tax preparer files a tax form with aTSP system 110 which may include tax ID (such as, for example, social security number (SSN), individual tax payer identification number (ITIN), US government issued identifier (EIN), or other identifier), name or business name, address, phone number, and so forth. TheTSP system 110 may then being processing the tax form. If there is an indication that theTSP system 110 should send a notice or alert about the tax filing to indicate that a tax filing has been submitted, then theTSP system 110 may make a call to the taxfraud alert system 120, such as, for example via an application programming interface (API) or by adding the tax payer's record to a batch file for processing. The communication may be made via a secure communication protocol, such as, for example, hypertext transfer protocol secure (HTTPS), secure file transfer protocol (SFTP), or another secure protocol. The indication may be based on the tax payer requesting a notification and/or the TSP or other system indicating that the tax payer should receive a notification. - The tax
fraud alert system 120 may receive the tax filing data via the API or the batch process. If the TSP has requested notification of such errors, the taxfraud alert system 120 may send a notice to the TSP system indicating that there are and/or are not any input errors. This notice may include the information on one or more tax payer files. If there are no errors, the taxfraud alert system 120 may perform a verification process, such as, for example, the identity verification process described inFIG. 2A . The taxfraud alert system 120 may also perform a contact process, such as, for example, the best contact process described inFIG. 2B . If the tax payer is not matched, the taxfraud alert system 120 may determine whether to send a fail request receipt. If the tax payer is matches, then the taxfraud alert system 120 may generate and send a notification or alert to the tax payer using one or more of the contact channels determined by the contact process, for example using the alert notification process described inFIG. 2C . The tax payer may inquire about the notice and/or confirm whether the tax filing was correct or indicate possible fraud. The taxfraud alert system 120 may include a call center system or web portal to handle the tax payer inquiries and/or provide the tax payer access to a remote call center system or web portal which handles such inquiries. - The tax
fraud alert system 120 and/or the remote call center system or portal, may generate and send an electronic notification indicating whether there is possible fraud associated with the tax payer's corresponding filing. If so, then the taxfraud alert system 120 may generate and send a notification to theTSP system 110 that the tax payer has confirmed the filing. If not, then the taxfraud alert system 120 may generate and send a notification to the TSP system 110 a possible fraud notice. In some embodiments, such notice may include instructions or an indication that is used by the TSP to stop or cancel a refund request. Such notifications may be sent to theTSP system 110 via a secure protocol, such as, for example, HTTPS, SFTP, or another secure protocol. - The
TSP system 110 receives the notification and determine whether there is possible fraud using the notification. If so, theTSP system 110 may generate instruction to stop or cancel any refund processing and/or to initiate an investigation of the potential fraud. If not, then theTSP system 110 may resume with its normal tax processing. The TSP system may determine whether there is possible fraud based solely on the notification, based in part on the notification, and/or based on its own independent analysis of the tax payer filing. If the investigation determines that there is no fraud, then theTSP system 110 may resume with its normal tax processing. - 2. Tax Alert Processes—Second Example
-
FIG. 1C-2 illustrates embodiments of a tax alert process. In the illustrated embodiments, starting at (1) the tax payer (whether a user or business representative) or tax preparer files a tax form with aTSP system 110 which may include tax ID (such as, for example, social security number (SSN), individual tax payer identification number (ITIN), US government issued identifier (EIN), or other identifier), name or business name, address, phone number, and so forth. TheTSP system 110 may then being processing the tax form. If there is an indication that theTSP system 110 should send a notice or alert about the tax filing to indicate that a tax filing has been submitted, then theTSP system 110 may make a call to the taxfraud alert system 120, such as, for example via an application programming interface (API) or by adding the tax payer's record to a batch file for processing. The communication may be made via a secure communication protocol, such as, for example, hypertext transfer protocol secure (HTTPS), secure file transfer protocol (SFTP), or another secure protocol. The indication may be based on the tax payer requesting a notification and/or the TSP or other system indicating that the tax payer should receive a notification. - The tax
fraud alert system 120 may receive the tax filing data via the API or the batch process. If the TSP has requested notification of such errors, the taxfraud alert system 120 may send a notice to the TSP system indicating that there are and/or are not any input errors. This notice may include the information on one or more tax payer files. If there are no errors, the taxfraud alert system 120 may perform a verification process, such as, for example, the identity verification process described inFIG. 2A . The taxfraud alert system 120 may also perform a contact process, such as, for example, the best contact process described inFIG. 2B . If the tax payer is not matched, the taxfraud alert system 120 may determine whether to send a fail request receipt. If the tax payer is matches, then the taxfraud alert system 120 may generate and send a notification or alert to the tax payer using one or more of the contact channels determined by the contact process, for example using the alert notification process described inFIG. 2C . The tax payer may inquire about the notice and/or confirm whether the tax filing was correct or indicate possible fraud. The taxfraud alert system 120 may include a call center system or web portal to handle the tax payer inquiries and/or provide the tax payer access to a remote call center system or web portal which handles such inquiries. - In (2), the
TSP system 110 processes the tax form. If there is an indication that theTSP system 110 should send a notice or alert about the tax filing, then theTSP system 110 may make a call to the taxfraud alert system 120, such as, for example via an API or by adding the tax payer's record to a batch file for processing. The communication may be made via a secure communication protocol, such as, for example, HTTPS, SFTP, or another secure protocol. The indication may be based on the tax payer requesting a notification and/or the TSP or other system indicating that the tax payer should receive a notification. - The tax
fraud alert system 120 may receive the taxes processed data via the API or the batch process. If the TSP has requested notification of such errors, the taxfraud alert system 120 may send a notice to the TSP system indicating that there are and/or are not any input errors. This notice may include the information on one or more tax payer files. If there are no errors, the taxfraud alert system 120 may generate and send a notification or alert to the tax payer that the taxes have been processed, such as, for example, using one or more of the contact channels determined by the contact process, for example using the alert notification process described inFIG. 2C . The tax payer may inquire about the notice and/or confirm whether the tax filing was correct or indicate possible fraud. The taxfraud alert system 120 may include a call center system or web portal to handle the tax payer inquiries and/or provide the tax payer access to a remote call center system or web portal which handles such inquiries. - If there is a pending refund, then in (3), the TSP processes the refund. If there is an indication that the
TSP system 110 should send a notice or alert about the refund, then theTSP system 110 may make a call to the taxfraud alert system 120, such as, for example via an API or by adding the tax payer's record to a batch file for processing. The communication may be made via a secure communication protocol, such as, for example, HTTPS, SFTP, or another secure protocol. The indication may be based on the tax payer requesting a notification and/or the TSP or other system indicating that the tax payer should receive a notification. - The tax
fraud alert system 120 may receive the refund data via the API or the batch process. If the TSP has requested notification of such errors, the taxfraud alert system 120 may send a notice to the TSP system indicating that there are and/or are not any input errors. This notice may include the information on one or more tax payer files. If there are no errors, the taxfraud alert system 120 may generate and send a notification or alert to the tax payer that the refund has been sent, such as, for example, using one or more of the contact channels determined by the contact process, for example using the alert notification process described inFIG. 2C . The tax payer may inquire about the notice and/or confirm whether the tax filing was correct or indicate possible fraud. The taxfraud alert system 120 may include a call center system or web portal to handle the tax payer inquiries and/or provide the tax payer access to a remote call center system or web portal which handles such inquiries. - 3. Tax Alert Processes—Third Example
- As another example, in
FIG. 1D , a user can submit a tax form with PII (for example, name, address, phone number, bank account information, and/or social security number) to one or more TSP systems 110 (Block 1). TheTSP system 110 can run a taxfraud alert system 120 appliance/API (provided by the tax fraud alert system 120) to depersonalize the data (Block 2) and then securely send the data to the tax fraud alert system 120 (Block 3), such as, for example, by encrypting fields of tax records to depersonalize the data and then write it to a batch file that is sent to the taxfraud alert system 120 on a periodic basis (for example, real time, hourly, daily, and so forth). As one example, “Michael Jones, 123 main st., 123-45-6789” may transform to TSP ID “A12BCD6748HU23J”. The taxfraud alert system 120 may then use the same appliance/API to add the TSP ID to the relevant backend data sets and also send the TSP batch file to the component in the system to perform the various analytics and checks (Block 4) (for example, to the back-end system components, theidentity verification engine 122 and best contact engine 124). The system components conduct the analytics and checks and return a response file back to the consumer-facing components of the taxfraud alert system 120 with notification information and the results of the fraud checks such as, for example, whether checks on name, address, email, phone number, SSN, and/or bank account passed or failed (Block 5). The consumer-facing components of the taxfraud alert system 120 then notify the tax payer or customer of the tax submission and provide a portal to track flagged fraud cases and a portal to remediate the issue, such as via an online portal or a call center (Block 6). The user may be notified via one or more channels, such as, for example, email, SMS messaging, and/or direct mail. The consumer-facing components of the taxfraud alert system 120 may also notify the TSP of the potential fraud risk so that the TSP can place a hold on or cancel the tax return and/or refund (Block 7 a). The user may contact the remediation center to obtain help with the remediation process prior to TSP processing the tax return and sending out a refund (Block 7 b). - 4. Tax Alert Processes—Fourth Example
- As another example, in
FIG. 1E , a tax filer can submit a tax form with PII to one or more TSP systems 110 (Block 1). TheTSP system 110 can use an API or batch interface to communicate with a fraud alert system (such as for example, the taxfraud alert system 120 shown inFIG. 1B ) to securely transport tax filer's records (Block 2) such as by encrypting the PII and sending the encrypted data to the tax fraud alert system 120 (for example the front-end system accessible via an interface). The taxfraud alert system 120 can then send the data to determine the fraud risk (Block 3), for example, by sending the PII to the back-end system of theidentity verification engine 122 and best contact engine 124). An alert may then be provided (Block 4), for example to the alert notification system with notification information and results of the fraud checks, such as, for example, whether checks on name, address, email, phone number, SSN, and/or bank account passed or failed. A person associated with the PII (who may or may not be the same one as the tax filer) may be notified regarding the tax filing such as via email, SMS messaging, and/or direct mail (Block 5 a). In addition, the TSP may also be notified of the potential fraud risk so that the TSP can decide whether to place a hold on or cancel the tax return (Block 5 b). The tax filer can then contact an entity to assist with the remediation process (Block 6), such as, for example, before the TSP processes the tax return or sends out a tax refund. - The fraud alert system, upon receiving tax filer's records, can analyze the data in the tax filer's records and send results to an alert notification engine. The alert notification engine can notify the tax filer (or another entity if the tax filer is using the other entity's identity) of the tax submission and/or notify the
TSP system 110 of the potential fraud risk. The notification to the tax filer can indicate that a tax form has been filed using the entity's tax ID. - It is recognized that
FIGS. 1C-1, 1C-2, 1D, and 1E represent embodiments of example systems and processes and that other systems or processes may be used. In some embodiments, the processes are performed by the taxfraud alert system 120 and/or by one of its components, such as a processor or a controls system. However, it is recognized that other components of the taxfraud alert system 120 or other components (not shown) may perform one or more of the processes. For ease of explanation, the following describes the services as performed by the taxfraud alert system 120 or one or more of its components. The example scenarios are intended to illustrate, but not to limit, various aspects of the taxfraud alert system 120. In some embodiments, the processes can vary from the exemplary flowcharts, with some blocks omitted and others added. It is also recognized that one or more blocks in the flowcharts may be optional. The taxfraud alert system 120 may be configured to perform only a subset of the blocks in the flowcharts. - The illustrated embodiments of
FIG. 1B includes a taxfraud alert system 120 which includes anidentity verification engine 122, a best contact engine, 124, and analert notification engine 126. The exemplary taxfraud alert system 120 includes a set ofbackend servers 128, including an FTP/Batch server 128 a configured to process File Transfer Protocol or other batch requests, anAPI server 128 b configured to provide an API portal for other systems to access the taxfraud alert system 120 and/or to make calls to third party APIs, as well as anotification server 128 c configured to send and receive electronic notifications. - 1. Identity Verification Engine (IVE)
-
FIG. 2A illustrates example embodiments of an identity verification engine (IVE) 122. The IVE orservice 122 may use proprietary data from one ormore credit bureaus 123 and other relevant data sources to find the best or a close match to the filer identity elements provided in accordance with the preferences agreed to with the TSP. If the tax filing or tax ID is for a business, the IVE rules and supporting data sources may support identifying the business representatives that should be notified of the tax filing. - In the illustrated embodiments of
FIG. 2A , theIVE 122 receive inputs including rules, TSP preferences and taxpayer's tax ID and PII from the TSP. TheIVE 122 may then access data to select which data to use for the identity verification based on the received inputs. The data may include data from third party data aggregators such as public record databases, fraud data, credit bureaus, and/or directories, data from proprietary databases such as credit data, non-credit data, business data, consumer data, fraud data, subprime lending data, and/or compiled data. The data is then used to verify the identity(ies) and provide notification of whether such identity(ies) were verified. - In some embodiments, some example features of the
IVE 122 can include one or more of the following: -
- The
IVE 122 can allow theTSP systems 110 to exchange information with this service via batch files or web service APIs. - The tax filer information can be processed through various software services which include information from credit report tradelines known to one or more credit bureaus as well as data on users that do not have a traditional credit history or an extensive credit history, for example subprime credit data. Some example software services for processing filer information can include a consumer data request fulfillment system (such as for example, the one described on U.S. Pat. No. 9,697,263, the disclosure of which is hereby incorporated by reference herein in its entirety for all purposes) and identity authentication services which can include a risk-based fraud detection and prevention platform which can incorporate analytics, knowledge-based authentication and flexible decision-making strategies for more accurate authentications of identities.
- The matching rules in the
IVE 122 can be configurable based on the preferences agreed to with the TSP. An example of the configurable matching rules is provided in the section below. - The best identity matches can be selected by the
IVE 122 and provided to the Best Contact Engine (BCE) 124. - The
BCE 124 verifies or identifies the contact information for the selected one or more identities and passes the one or more identities and aggregated contact information to the Alerts Notification Engine (ANE) 126. - The
IVE 122 may also support fraud checks while verify the identity information received from the TSP system. Some example fraud checks can include: SSN check, multiple submissions to the same address (velocity of the same address being used, which may include physical address or IP address), multiple submissions to the same bank account, verify against deceased records, communication checks (email, phone numbers, residential address), or checking NPPI data in the tax filing against the credit bureau data to look for discrepancies and to verify communication channels. Taxpayers that have raised flags for any of the supported fraud checks can be flagged and reported back to the TSP.
- The
- Different or additional sources may also be used for this service depending on the inputs provided by the TSP and the TSP preferences for how to handle identify verification.
- Special Handling Matching Rules for Identity Verification Engine
- In some embodiments, the
IVE 122 can include configurable rules. Some example scenarios and configurations are described in the table below. -
Scenario Description Options No Match No Contact Found with PII given. Send tax alert notice to input (Unverified address provided by TSP Input) system, if any Do not send notice If using batch communication with TSP system, add record to failure list If using web service communication with TSP system, return error code for this scenario Contact Info Contact info in filing differs from Send tax alert notice to both the Mismatch contact information (such as for filing contact and the contact (Partially example the best contact found by service Unverified Input) information) found by service Send tax alert notice only to the best contact found by service Do not send notice If using batch communication with TSP system, add record to failure list If using web service communication with TSP system, return error code for this scenario Name Mismatch TSP submitted name on filing and Send notice and address the tax (Partially it differs from name this service alert notice to Unverified Input) found for the Tax ID given a. the last name submitted on filing, or b. last name found by the service, or c. both of the above, or d. none of the above Use a generic term such as tax filer Do not send notice If using batch communication with TSP system, add record to failure list If using web service communication with TSP system, return error code for this scenario No Filing Name TSP chooses to submit the Tax Send notice and Given (Partially ID and omit the name a. Address the tax alert to the Unverified Input) name found by the service, if any, or b. Do not address the alert to anyone, c. Use a generic term chosen by TSP, such as “tax filer” Multiple Filings Tax ID has been seen before by Notice can be sent for a contact the service. Same person may (or the best contact) found for have multiple filings for personal the tax ID submitted each time a and business(es) record of filing is sent by the TSP. Prison contact A contact or the best contact Send alert as with any other found is a prison or halfway address house Do not send alert Tax ID flagged as The tax ID given is flagged as Send alert anyway following Deceased deceased in the relevant Death usual rules Master Files Do not send notice If using batch communication with TSP system, add record to failure list If using web service communication with TSP system, return error code for this scenario Tax ID flagged as The tax ID is not listed as issued Send alert anyway following Not Yet Issued by the appropriate authority usual rules Do not send notice If using batch communication with TSP system, add record to failure list If using web service communication with TSP system, return error code for this scenario Tax ID Issue Date The tax ID was issued on a date Send alert anyway following Discrepancy prior to the date of birth of the tax usual rules filer, if given or the tax ID was Do not send notice issued too recently. How recent If using batch communication is configured by the TSP. with TSP system, add record to failure list If using web service communication with TSP system, return error code for this scenario - 2. Best Contact Engine (BCE)
-
FIG. 2B illustrates example embodiments of a contact engine or best contact engine (BCE) 124. The BCE orservice 124 can use proprietary data from one or more credit bureaus and other relevant data sources to find contact information 125 (for example, a matched contact information or the best contact information) for the tax alerts and notify the tax filers in accordance with the preferences agreed to with the TSP. - In the illustrated embodiments of
FIG. 2B , theBCE 124 receives input such as rules, TSP preferences, and identity(ies) from theIVE 122. TheBCE 124 may then review data to provide contact details. The data may include data from third party data aggregators such as phone or mobile data aggregators, directories, and/or skip trace databases, as well as data from proprietary database such as consumer data, business data, change of address data, and/or marketing data. TheBDE 124 then generates an electronic indication of contact details. - The types of information and software services that can be executed together with the
BCE 124 for locating the contact information can include one or more of the following: -
- Credit tradelines data, such as credit header data or tax filers' contact information.
- Sub-prime loan data which adds coverage for parts of the population that use less traditional lending outlets.
- Marketing tracking data, such as data which link fragmented and incomplete data including email, social and personally identifiable information (PII), across channels and devices. Examples of such marketing tracking data are also described in U.S. Pat. No. 9,767,309, the disclosure of which is hereby incorporated by reference herein in its entirety for all purposes.
- Identity authentication services which can include a risk-based fraud detection and prevention platform which can incorporates analytics, knowledge-based authentication and flexible decision-making strategies for more accurate authentications of identities.
- National change of address services, such as for example monitoring services for change of address.
- Phone directory services including Mobile Network Operators (MNOs).
- Different or additional sources may also be used for this service depending on the inputs provided by the TSP and the TSP preferences for how to handle matching ambiguities.
- 3. Alert Notification Engine (ANE)
-
FIG. 2C illustrates example embodiments of an alert notification engine (ANE) 126. After locating the contact information for each verified tax filer, in some embodiments, the ANE orservice 126 can follow the rules agreed to with the TSP 127 regarding who to contact and how to handle identity matching ambiguities or discrepancies. The notification processes for this service can manage distribution channel and distribution schedule. - In the illustrated embodiments of
FIG. 2C , theANE 126 receives the contact data from theBCE 124 and then generates alert packages to be sent to recipients based on the TSP configured distribution channels. The alert data may be sent to a web service API or to a batch file to allow the tax filer or product/service subscriber to access the alert information. The tax filer may have to provide certain information to access the alert, such as a logon, a filing data, a filer ID, a refund amount, and so forth. The alert data may also, or instead, be provided to a configured template which will be loaded and sent to a desired channel such as email, direct mail, SMS messaging, and/or a phone call. - In some embodiments, distribution channels provide TSP several options for sending the alert to the tax filer. Some example distribution channels include:
-
- The TSP can choose to use the alert notification engine to deliver the alerts. If this channel is chosen, the TSP can configure the notifications (templates), with the styling and copy they choose. The TSP can also select how the notifications are sent. Notification types include: direct mail, email, SMS text, social media messages, and/or phone voice messages. The TSP may choose one or more of these communication channels or decide to waterfall notifications to these channels: for example, starting with SMS text, and only using email and/or direct mail if the SMS text to the identified phone number fails or a mobile phone is not located for the identity.
- The TSPs can choose to send the alerts from their system. If this channel is chosen, the tax
fraud alert system 120 can pass the identity, contacts, and alert information to the TSP via a web service API or a batch file process. The TSP would then be responsible for sending the notice via notification channels (phone, mail, email, and so forth). - The TSP can also choose to allow the alerts to be sent to subscribers of market facing identity monitoring products. If chosen, the tax
fraud alert system 120 can pass the alert information to the a 3rd party entity via web service APIs to provide as a tax filing alert within the subscriber's product.
- In some embodiments, distribution schedule may be appropriate to handle large volumes. For example, the alert notification engine can avoid sending a volume of notifications at once that would result in an inquiry volume that could not be supported by the call centers.
- In some embodiments, the notification may follow one or more templates which may be approved by TSPs. Selection of appropriate templates depending on TSP preferences, notification channel (for example, the template for text messages would be different than the template for emails), and PII available for a tax filer. Parameter substitution for notification templates including ways for tax payers or tax filers to authenticate that the tax alert notice is legitimate. Some examples of how to show legitimacy of the alert include one or more of:
-
- Official Tax Service Provider letterhead for direct mail.
- Official TSP logos in email.
- Official TSP phone greetings or voice talent.
- Partial Tax ID, if approved by TSP. This could be made available only by call center agents or web service portal if TSP deems too sensitive to send in tax alert.
- Tax Filing Date.
- Name on filing if it matches name service found. Including name on filing is problematic if there is a conflict between filing and what service found.
- Partial email address given at time of filing. This might be problematic in cases of fraud.
- Tax filing details such as dollar amounts if Tax Service Provider is willing to submit those with each record.
- Notices can include safeguards to make it difficult for fraudsters to replicate the alerts to launch phishing attacks. For example, if the TSP chooses, any emails sent could exclude direct links.
- Marketing campaigns can educate the tax payers or tax filers on ways to confirm the tax alert is legitimate, for example promoting that official emails from the TSP may not include direct links.
- In some embodiments, each tax alert sent can include a unique identifier that can be used by the user when contacting the branded call center, reaching the branded web portal to handle tax alert inquiries, and/or when calling the TSP directly to inquire about the alert or to dispute the tax filing.
- 4. Alert Notification Support and Remediation Via Portal and Call Center
- As part of this solution, in some embodiments, the tax
fraud alert system 120 can offer TSPs multiple options to support the tax filers that receive the tax alert notification. The alert itself can include the appropriate calls to action for the filer in accordance with the option(s) the TSP selected for offering alert notification support. Some examples of alert notification support can include one or more of: -
- Refer filers to a call center hosted by the TSP. This option is supported by providing the TSP with information about the tax alert notifications sent including the ways the filer was contacted, when, and, if necessary, the actual contact details used for the notification(s).
- Refer filers to a web portal hosted by the TSP. This option is supported by providing the TSP information about the tax alert notifications sent including the ways the filer was contacted, when, and, if necessary, the actual contact details used for the notification(s).
- A hosted call center. The call center can be hosted by an entity running the tax
fraud alert system 120. The call center can include training to assist filers that receive a tax alert notification or have general questions about it. The scope of what call center staff can handle or escalate to the TSP depends on TSP configuration options. - A hosted web portal. The web portal can be hosted by an entity running the tax
fraud alert system 120 and be tailored to assist filers that receive a tax alert notification or have general questions about it. The functionality available in the portal depends on TSP configuration options. - In certain embodiments, the TSP may choose to host the web portal or the call center, alone or in combination.
- In some embodiments, the TSP can also choose which functions may be offered by the call center or the web portal as applicable if TSP chooses to have another entity to host the call center or the web portal. Some example functions can include one or more of:
-
- General information and questions and answers about the tax
fraud alert system 120. Content and any call center scripts can be configurable and approved by the TSP. - Authentication of tax filer. TSP can be given options for authenticating the caller including 2 factor authentication, knowledge based authentication, or other proprietary authentication options.
- Reviewing previously sent tax alerts.
- Initiating a dispute of a tax filing.
- Stop payment of a refund
- General information and questions and answers about the tax
- For some options, such as, for example, the last two options (initiating a dispute of a tax filing and stopping payment of a refund), TSP may choose to have the host (of the call center and/or web portal) to either escalate handling of disputes and/or stop payments on refunds, or the TSP may offer a web service that allows the host to initiate a dispute programmatically via either the web portal and/or an administrative tool available to the call center staff.
- 5. Call Center Support
-
FIGS. 2D-1 and 2D2 illustrate flow diagrams for embodiments of call center support processes. If the TSP chooses the call center support option, the host of the call center support service can provide call center agents trained to handle inquiries from users that received a tax alert. The agents can be given training and scripts approved by the TSP with detailed instructions on how to address all possible inquiries from the end user and how to escalate issues. The scope of what the call center can handle may depend on the configurable options chosen by the TSP. - In the illustrated embodiments of
FIG. 2D-1 , a tax filer calls a support line and an agent searches a database with information provided to the tax filer in the alert notification to locate the tax filer. When the alert was sent, the alert may have been electronically attached to the tax filer's profile in a backend database. It is recognized that a variety of PII may be used to identify a tax filer, including, for example, alert ID (for example, a unique identifier generated for an alert), a filer ID (for example, the social security number of entity number of the filer provided by the TSP), and/or a return ID (for example, a unique identifier generated for the tax return submission provided by the TSP). The tax filer may be authenticated, for example, using data from the tax filer's tax return submission. The agent may initiate authentication by accessing an authentication process of a proprietary authentication service. For example, authentication questions may be asked which can be retrieved based on the located user's social security number, address, and so forth. If the tax filer passes the authentication, the agent may be directed by the system to answer the tax filer's questions and/or initiate a dispute process. If the tax filer does not pass the authentication, the agent may be presented with instructions to inform the tax payer or customer of the inability to verify the tax filer's information. - In the illustrated embodiments of
FIG. 2D-2 , the system determines whether the TSP is using a contracted call center or the TSP's call center. If a contracted call center, then a call is received by the contracted call center, the agent searches a backend database by tax return ID to find the tax return submission, the backend authenticates the user using data from the tax return submission and backend database (for example, simple authentication using submission data, or non-credit knowledge based authentication), if the user passes the authentication the agent files a ticket in the call center system and includes call disposition data (for example general questions and answer, fraud event information), the reporting collects the call center tickets on a regular basis (for example, in real time, hourly, daily, and so forth) and send them to the TSP for investigation (for example, via FTP, SFPT, restful reporting service, and so forth). If a TSP call center, the TSP receives the call. The TSP agent searches the TSP database by tax return ID to find the tax return submission, the TSP authenticates the user using data from the tax return submission, if the user passes the authentication, the submission is held by TSP pending TSP's fraud investigation. - In both scenarios, next the TSP may investigate the submission and cancel the fraudulent return or puts the return on hold. The TSP contacts the user and provides them a code to file their real tax return when ready. In some embodiments, this could be a notification from the backend (for example, the tax fraud alert system 120) which may pass the status of the investigation to the backend with a tax submission code. It is recognized that some TSPs may have a process for generating unique IDs for victims of identity theft. This ID may be entered to file a tax return and may be already integrated into the TSP. This could be used when the user is ready to submit their real return.
- It is recognized that one or more of the TSPs may use a different process and so the embodiments of
FIG. 2D-2 are meant to illustrate example embodiments and not limit the disclosure. - In some embodiments, the host's databases (or other databases) may be used to implement one or more of the following functions related to call center support:
-
- When alert is sent, it can be attached to a tax payer or customer profile in the host database. Forms of PII that can be used to identify the tax payer or customer can be:
- Alert ID: Unique #Generated for the alert;
- Filer ID: SSN or EIN of the filer provided by the TSP; and/or
- Tax Form ID: Unique ID generated for the tax form submission provided by the TSP.
- Authenticate the identity of the user using the PII and any tax filing details provided by the TSP system, plus proprietary methods of authentication.
- Review the tax alerts sent.
- Clearly guide the user through next steps if the tax filing is not recognized by the user Ability to view and relay status of previous inquiries started by the end user. This may require that the
TSP system 110 provide a way to look up status or a way for theTSP system 110 to push inquiry or dispute status to the service.
- When alert is sent, it can be attached to a tax payer or customer profile in the host database. Forms of PII that can be used to identify the tax payer or customer can be:
- 6. Web Portal Support
-
FIG. 2E illustrates a flow diagram for embodiments of a web portal support process. If the TSP chooses the web portal support option, a host of the web portal can provide a web service portal to service users with the look, feel, and content approved by the TSP. The portal can be designed to handle inquiries from users that received a tax alert. - In the illustrated embodiments of
FIG. 2E , the backend system receives an indication that a tax filer has logged onto the web portal and retrieves alert information associated with the user. The identity verification process is initiated. For example, in some embodiments, prior to any information being shared, the system may prompt knowledge based authentication questions and/or use proprietary authentication services. The knowledge based authentication questions may be based off of the located user's social security number, entity number, address and so forth. If the user's passes authentication, the alert information and dispute information may be display on a user interface. If the user does not pass authentication, the portal may inform the user of its inability to verify the user. - The portal can have automated ways or static content that address one or more of the following functions:
-
- Authenticate the identity of the user using the PII and any tax filing details provided by the TSP, plus proprietary methods of authentication.
- Present the tax alert(s) details.
- Clearly guide the user through next steps if the tax filing is not recognized by the user
- Inform the TSP via an automated or offline process that the user disputes having filed taxes. This process could either suspend delivery of the refund or initiate additional investigation by the TSP.
- Ability to display status of previous inquiries started by the end user. This requires that the TSP provide a way to look up status or a way for the TSP to push inquiry or dispute status to the service.
- It is recognized that white labeling services may be provided allowing one or more tax filer facing systems to be branded with one entity and one or more backend processes or services to be run by an entity other than the entity associated with the branding. In such case, the white labeling services may be hosted by the backend processes and/or a system of the entity associated with the branding.
- 7. Dispute Process
-
FIG. 2F illustrates a flow diagram for embodiments of a dispute process. In the illustrated embodiments ofFIG. 2F , a tax filer calls or logs onto a portal and is provided alert details. An agent may initiate a dispute and may then transfer the call to the appropriate TSP, submit the dispute via a web service tool which may be integrated with the appropriate TSP, and/or submit the dispute via a batch service tool which may be integrated with the appropriate TSP. The TSP then receives the dispute and may suspend the refund and initiate an investigation. The web service tool and/or batch service tool may be provided by a customer service representative (CSR) system. - The TSP can establish manual or automated processes that allow the tax
fraud alert system 120 to perform one or more of the following: -
- Notify the TSP that a user disputes a tax filing and either suspend a refund or initiate additional investigation of the tax filing,
- For example, this can be achieved by:
- Warm call transfer to the TSP, or
- Automated process via web services or batch file.
- For example, this can be achieved by:
- Provide status of an inquiry or dispute previously submitted, including resolution.
- For example, this can be achieved by:
- Batch file, or
- Web services.
- For example, this can be achieved by:
- Notify the TSP that a user disputes a tax filing and either suspend a refund or initiate additional investigation of the tax filing,
- In some embodiments, the tax
fraud alert system 120 also includes one or more components and processes to provide automated configuration services for the other systems, such as the TSP systems, third party vendors, or third party data suppliers. The configuration may be provided via a remotely accessible portal that allows a user of a third party system to access the portal, review the options for configuration, provide electronic indications of the selected options, and instruct the portal to store the options. Prior to launching the taxfraud alert system 120, the TSP can configure one or more of the following options: -
- PII to use: What minimum and optional PII to submit to the service.
- Handling matching scenarios
- How to handle ambiguities or discrepancies of identity based on the PII provided. The TSP can have the service configured to only send notices to tax filers that have been verified, for example, the contact information found by the service matches the contact information in the tax filing; and/or to also send tax alerts to the contact information in the tax filing, even if that information is unverified by the service. For example, if TSP only provides a tax ID and the service locates several names tied to that tax ID, the service can be configured to perform one or more of the following actions:
- Notify one or more or all of the names found or to not send notices; and/or
- Callback (automatically in batch, web service, or via a call center) to the
TSP system 110 to suspend delivery of a refund or initiate further investigation before sending the refund.
- Or for example, if a
TSP system 110 provides the tax ID, name, and address used in the tax form filed and the taxfraud alert system 120 finds a different name and/or address tied to the tax ID, the service can be configured to perform one or more of the following actions:- Send notices using the PII used in the tax filing and/or to the PII found by the service; and/or
- Callback to the
TSP system 110 to suspend delivery of a refund or initiate further investigation before sending the refund.
- Whether to flag cases of tax ID typos—whether to have the service indicate when a tax ID does not match the PII provided, but a transposed digit in the tax ID would resolve the discrepancy. This may be difficult to automate but it is possible to do using credit bureau data or other third party data.
- Whether to receive error responses for inputs submitted, including bad input data, ambiguous or contradictory results, no matching results.
- How to handle ambiguities or discrepancies of identity based on the PII provided. The TSP can have the service configured to only send notices to tax filers that have been verified, for example, the contact information found by the service matches the contact information in the tax filing; and/or to also send tax alerts to the contact information in the tax filing, even if that information is unverified by the service. For example, if TSP only provides a tax ID and the service locates several names tied to that tax ID, the service can be configured to perform one or more of the following actions:
- A table enumerating known conditions and options for how to handle each can be presented to the TSP system.
- Media used for notices: Whether to notify tax filers via direct mail, and/or email, phone, or text message.
- Who to notify
- Whether to notify both parties in a joint filing.
- Whether to make exceptions on whom to send notices to, for instance, do not send notices to prisons or those where the tax ID is listed as deceased or unverified tax filers.
- When to notify: Whether to notify for one or more of the following events:
- Main tax form is filed (for example, 1040 or 1040-EZ) or other selected forms.
- Tax form filed has completed processing or requires more details.
- Suspended refund or suspended processing (for example, due to suspected fraud).
- Resolution of a suspended refund or suspended processing.
- Who to address notices to: Whether to address notices to the name used in the tax filing and/or to the name(s) found by the service.
- Handling user inquiries
- Whether to have this solution host a call center and/or a web portal to answer inquiries from users that receive a tax alert.
- If this service is to host a web portal on behalf of the TSP, whether that portal can offer identity theft services to the user.
- Whether to receive real-time callbacks when users respond to the call center and/or the web portal provided by the service.
- Whether to provide an automated web service callback mechanism or other scalable process to suspend delivery of a tax refund or initiate further investigation.
- Method of data transfer: Whether to exchange information with this service via batch files, web service calls, call centers, and/or offline.
- In some embodiments, the TSP may be offered configurable options for what information to share and how to share it. Some features in this solution can only be available if certain optional inputs are provided. For example, the ability to present to the end user dollar amounts specific to their tax filing as a way for the user to gain confidence that the notification is legitimate would only be possible if the TSP is willing to provide such dollar amounts for use in this solution. Omission of optional PII might reduce the efficacy of the service or render some features unavailable.
- In some embodiments, the PII submitted can be expected to be what the tax filer provided in the tax form filing and does not necessarily have to be verified by the TSP before submitting the PII to the service. Examples of submitted PII may include one or more of the following:
-
- Tax ID*: Tax ID, ITIN, EIN or any tax identifier supported by the local, state, or federal government agency collecting the taxes. It can be used to confirm a match and find the contact information for sending notices. The tax ID may be for an individual or a business entity.
- Full Name*: First Name, Middle Name, Last Name, Suffix. If given, it can be used to help confirm a match and potentially to address the notices sent depending on TSP preferences.
- Address*: street1, street2, city, state, postal code or other applicable fields if the address is outside the USA.
- Date of Birth: If given, it can be used to help confirm a match.
- Phone: If given, it can be used to help confirm a match and possibly for notification.
- Email: If given, it can be used to help confirm a match and possibly for notification.
- Filing status: Any status supported by the local, state, or federal government agency collecting the taxes. For example, married filing jointly. If given, it can be used in the tax alert to give the user more confidence that the notice is legitimate.
- Joint Filer Tax ID: Tax ID, ITIN, EIN or any tax identifier supported by the local, state, or federal government agency collecting the taxes. It can be used to confirm a match and find the contact information (such as for example, the best contact information) for sending notices. Joint filer information should only be provided if the TSP wants to notify both parties in a joint filing.
- Joint Filer Full Name: First Name, Middle Name, Last Name, Suffix. If given, it can be used to help confirm a match and potentially to address the notices sent depending on TSP preferences. Joint filer information should only be provided if the TSP wants to notify both parties in a joint filing.
- Joint Filer Date of Birth: If given, it can be used to help confirm a match. Joint filer information should only be provided if the TSP wants to notify both parties in a joint filing.
- Joint Filer Phone: If given, it can be used to help confirm a match and possibly for notification
- Joint Filer Email: If given, it can be used to help confirm a match and possibly for notification. Joint filer information may only be provided if the TSP wants to notify both parties in a joint filing.
- Tax Filing Date: If given, it can be used in the tax alert to give the user more confidence that the notice is legitimate.
- Tax Preparer: Name of tax preparer software, company, or person. If given, it can be used in the tax alert to give the user more confidence that the notice is legitimate.
- Tax Filing Detail1 Label: If given, it can be used in the tax alert to give the user more confidence that the notice is legitimate. For example, “Adjusted Gross Income” submitted in tax filing. It could also be used to authenticate the user if s/he calls or visits the web portal to inquire about the notice.
- Tax Filing Detail1: If given, it can be used in the tax alert to give the user more confidence that the notice is legitimate. For example, Adjusted Gross Income amount submitted in tax filing. It could also be used to authenticate the user if s/he calls or visits the web portal to inquire about the notice.
- Tax Filing Detail2 Label: If given, it can be used in the tax alert to give the user more confidence that the notice is legitimate. For example, “Previous Year Refund or Payment”. It could also be used to authenticate the user if the user calls or visits the web portal to inquire about the notice.
- Tax Filing Detail2: I given, it can be used in the tax alert to give the user more confidence that the notice is legitimate. For example, Previous Year Refund or Payment amount. It could also be used to authenticate the user if he or she calls or visits the web portal to inquire about the notice.
Where “*” represents either tax ID or Full Name and Address may be required for this service in some embodiments. In some embodiments, there is no requirement for TSP to perform input validation such as ensuring Tax ID is not in death master file or has been issued long enough ago to justify a tax filing.
-
FIG. 3 illustrates a general architecture of a computing system for processing implementing various aspects of the present disclosure. Many or all of the components of the computing system shown inFIG. 3 may be included in the various computing devices and systems discussed herein, including the TSP systems, the taxfraud alert system 120, thetax filer system 130, the third party vendor systems, the third party data systems, and so forth. The computing system may include, for example, a personal computer (such as, for example, IBM, Macintosh, Microsoft Windows compatible, OS X compatible, Linux/Unix compatible, or other types of computing systems, alone or in combination), a server, a workstation, a laptop computer, a smart phone, a smart watch, a personal digital assistant, a kiosk, a car console, a tablet, or a media player. In one embodiment, the computing system'sprocessing system 600 includes one or more central processing units (CPU) 612, which may each include a conventional or proprietary microprocessor specially configured to perform, in whole or in part, one or more of the features described above. Theprocessing system 600 further includes one ormore memory 618, such as random access memory (RAM) for temporary storage of information, one or more read only memory (ROM) for permanent storage of information, and one or moremass storage device 603, such as a hard drive, diskette, solid state drive, or optical media storage device. Adata store 621 may also be included. In some implementations, thedata store 621 may be designed to handle large quantities of data and provide fast retrieval of the records. To facilitate efficient storage and retrieval, thedata store 621 may be indexed using one or more of compressed data, identifiers, or other data, such as that described above. - Typically, the components of the
processing system 600 are connected using a standards-basedbus system 624. In different embodiments, the standards-basedbus system 624 could be implemented in Peripheral Component Interconnect (PCI), Microchannel, Small Computer System Interface (SCSI), Industrial Standard Architecture (ISA) and Extended ISA (EISA) architectures, for example. In addition, the functionality provided for in the components and modules ofprocessing system 600 may be combined into fewer components and modules or further separated into additional components and modules. - The
processing system 600 is generally controlled and coordinated by operating system software, such as Windows XP, Windows Vista, Windows 7, Windows 8, Windows 10, Windows Server, Unix, Linux, SunOS, Solaris, iOS, MAC OS X, Blackberry OS, Android, or other operating systems. In other embodiments, theprocessing system 600 may be controlled by a proprietary operating system. The operating system is configured to control and schedule computer processes for execution, perform memory management, provide file system, networking, I/O services, and provide a user interface, such as a graphical user interface (GUI), among other things. The GUI may include an application interface and/or a web-based interface including data fields for receiving input signals or providing electronic information and/or for providing information to the user in response to any received input signals. A GUI may be implemented in whole or in part using technologies such as HTML, Flash, Java, .net, web services, and RSS. In some implementations, a GUI may be included in a stand-alone client (for example, thick client, fat client) configured to communicate (for example, send or receive data) in accordance with one or more of the aspects described. - The
processing system 600 may include one or more commonly available input/output (I/O) devices and interfaces 615, such as a keyboard, stylus, touch screen, mouse, touchpad, and printer. In one embodiment, the I/O devices and interfaces 615 include one or more display devices, such as a monitor, that allows the visual presentation of data to a user. More particularly, a display device provides for the presentation of GUIs, application software data, and multimedia presentations, for example. Theprocessing system 600 may also include one ormore multimedia devices 606, such as speakers, video cards, graphics accelerators, and microphones, for example. - In the embodiment of
FIG. 3 , the I/O devices and interfaces 615 provide a communication interface to various external devices. Theprocessing system 600 may be electronically coupled to one or more networks, which comprise one or more of a LAN, WAN, cellular network, satellite network, and/or the Internet, for example, via a wired, wireless, or combination of wired and wireless communication link. The networks communicate with various computing devices and/or other electronic devices via wired or wireless communication links. The communication can occur using various protocols such as, for example, the File Transfer Protocol (FTP), Secure File Transfer Protocol (SFTP), Hypertext Transfer Protocol (HTTP), Transmission Control Protocol/Internet Protocol (TCP/IP), and so on. - In some embodiments, information may be provided to the
processing system 600 over a network from one or more data sources. The data sources may include one or more internal and/or external data sources. In some embodiments, one or more of the databases or data sources may be implemented using a relational database, such as Sybase, Oracle, CodeBase and Microsoft® SQL Server as well as other types of databases such as, for example, a flat file database, a non-relational database, an entity-relationship database, and object-oriented database, and/or a record-based database. - In general, the word “module,” as used herein, refers to logic embodied in hardware or firmware, or to a collection of software instructions, possibly having entry and exit points, written in a programming language, such as, for example, Java, Lua, C, or C++. A software module may be compiled and linked into an executable program, installed in a dynamic link library, or may be written in an interpreted programming language such as, for example, BASIC, Perl, or Python. It will be appreciated that software modules may be callable from other modules or from themselves, and/or may be invoked in response to detected events or interrupts. Software modules configured for execution on computing devices may be provided on a computer readable medium, such as a compact disc, digital video disc, flash drive, or any other tangible medium. Such software code may be stored, partially or fully, on a memory device of the executing computing device, such as the
processing system 600, for execution by the computing device. Software instructions may be embedded in firmware, such as an EPROM. It will be further appreciated that hardware modules may be comprised of connected logic units, such as gates and flip-flops, and/or may be comprised of programmable units, such as programmable gate arrays or processors. The modules described herein are preferably implemented as software modules. They may be represented in hardware or firmware. Generally, the modules described herein refer to logical modules that may be combined with other modules or divided into sub-modules despite their physical organization or storage. - In the example of
FIG. 3 , themodules 609 may be configured for execution by theCPU 612 to perform, in whole or in part, any or all of the process discussed above. The processes may also be performed by one or more virtual machines. For example, the processes may be hosted by a cloud computing system. In some embodiments, one or more components of theprocessing system 600 may be part of the cloud computing system. Additionally or alternatively, the virtualization may be achieved at the operating system level. For example, the one or more processes described herein may be executed using application containerization. The one or more processes may also be implemented on a Lambda architecture designed to handle mass quantities of data by taking advantage of the batch processing and the stream processing. - It is to be understood that not necessarily all objects or advantages may be achieved in accordance with any particular embodiment described herein. Thus, for example, those skilled in the art will recognize that certain embodiments may be configured to operate in a manner that achieves or optimizes one advantage or group of advantages as taught herein without necessarily achieving other objects or advantages as may be taught or suggested herein.
- All of the processes described herein may be embodied in, and fully automated, via software code modules executed by a computing system that includes one or more computers or processors. In some embodiments, at least some of the processes may be implemented using virtualization techniques such as, for example, cloud computing, application containerization, or Lambda architecture, so on, alone or in combination. The code modules may be stored in any type of non-transitory computer-readable medium or other computer storage device. Some or all the methods may be embodied in specialized computer hardware.
- Many other variations than those described herein will be apparent from this disclosure. For example, depending on the embodiment, certain acts, events, or functions of any of the algorithms described herein can be performed in a different sequence or can be added, merged, or left out altogether (for example, not all described acts or events are necessary for the practice of the algorithms). Moreover, in certain embodiments, acts or events can be performed concurrently, for example, through multi-threaded processing, interrupt processing, or multiple processors or processor cores or on other parallel architectures, rather than sequentially. In addition, different tasks or processes can be performed by different machines and/or computing systems that can function together.
- The various illustrative logical blocks and modules described in connection with the embodiments disclosed herein can be implemented or performed by a machine, such as a virtual machine, a processing unit or processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A processor can be a microprocessor, but in the alternative, the processor can be a controller, microcontroller, or state machine, combinations of the same, or the like. A processor can include electrical circuitry configured to process computer-executable instructions. In another embodiment, a processor includes an FPGA or other programmable device that performs logic operations without processing computer-executable instructions. A processor can also be implemented as a combination of computing devices, for example, a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration. Although described herein primarily with respect to digital technology, a processor may also include primarily analog components. For example, some or all of the signal processing algorithms described herein may be implemented in analog circuitry or mixed analog and digital circuitry. A computing environment can include any type of computer system, including, but not limited to, a computer system based on a microprocessor, a mainframe computer, a digital signal processor, a portable computing device, a device controller, or a computational engine within an appliance, to name a few.
- Conditional language such as, among others, “can,” “could,” “might” or “may,” unless specifically stated otherwise, are understood within the context as used in general to convey that certain embodiments include, while other embodiments do not include, certain features, elements and/or steps. Thus, such conditional language is not generally intended to imply that features, elements and/or steps are in any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without user input or prompting, whether these features, elements and/or steps are included or are to be performed in any particular embodiment.
- Disjunctive language such as the phrase “at least one of X, Y, or Z,” unless specifically stated otherwise, is understood with the context as used in general to present that an item, term, etc., may be either X, Y, or Z, or any combination thereof (for example, X, Y, and/or Z). Thus, such disjunctive language is not generally intended to, and should not, imply that certain embodiments require at least one of X, at least one of Y, or at least one of Z to each be present.
- Any process descriptions, elements or blocks in the flow diagrams described herein and/or depicted in the attached figures should be understood as potentially representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or elements in the process. Alternate implementations are included within the scope of the embodiments described herein in which elements or functions may be deleted, executed out of order from that shown, or discussed, including substantially concurrently or in reverse order, depending on the functionality involved as would be understood by those skilled in the art.
- Unless otherwise explicitly stated, articles such as “a” or “an” should generally be interpreted to include one or more described items. Accordingly, phrases such as “a device configured to” are intended to include one or more recited devices. Such one or more recited devices can also be collectively configured to carry out the stated recitations. For example, “a processor configured to carry out recitations A, B and C” can include a first processor configured to carry out recitation A working in conjunction with a second processor configured to carry out recitations B and C.
- It should be emphasized that many variations and modifications may be made to the above-described embodiments, the elements of which are to be understood as being among other acceptable examples. All such modifications and variations are intended to be included herein within the scope of this disclosure.
Claims (21)
1.-20. (canceled)
21. A system comprising:
one or more data stores configured to store computer-executable instructions; and
a network interface configured to communicate with a plurality of network service devices; and
one or more physical computer processors in communication with the one or more data stores, wherein the computer-executable instructions, when executed, configure the one or more physical computer processors to:
receive and store, from a tax authority via an application program interface or a batch process over the network interface, an electronic batch file that includes a plurality of electronic requests, wherein each electronic request of the plurality of electronic requests is for a filing of an application, wherein a first electronic request of the plurality of electronic requests is associated with a first user, a first application, and includes first user data comprising an alphanumeric identifier that is generated based at least in part on encrypted personally identifying information (PII) associated with the first user;
based at least in part on the first electronic request and a configurable rules engine, determine a match corresponding to an identity of the first user by comparing at least a portion of the first user data to first verification data, wherein at least a first portion of the first verification data is different from the first user data received from the tax authority;
prior to a determination of fraud, based at least in part on the determination of the match, transmit, to a user device via the network interface, a notification associated with the match regarding the first application;
receive, from the user device via the network interface, an electronic communication indicating that the first application or the first electronic request is possibly fraudulent;
determine, based at least in part on the electronic communication, that the first application or the first electronic request is fraudulent; and
generate and transmit, to the tax authority via the network interface, electronic instructions configured to stop processing the first application as requested by the first electronic request.
22. The system of claim 21 , wherein the first user data further includes personally identifying information (PII) associated with the first user.
23. The system of claim 21 , wherein the notification to the user device regarding a successful application filing of the first application is transmitted to a type of contact included in the first portion of the first verification data.
24. The system of claim 21 , wherein the one or more physical computer processors are further configured to:
transmit, to an external third party entity via the network interface, the electronic instructions configured to stop the processing of the first application.
25. The system of claim 21 , wherein the alphanumeric identifier comprises all letters, all numbers, or a mix of letters and numbers.
26. The system of claim 21 , wherein the one or more physical computer processors are further configured to:
associate the alphanumeric identifier to the first verification data.
27. The system of claim 21 , wherein the first verification data associated with the first user is based at least in part on proprietary and public datasets.
28. A computerized method comprising:
receiving and storing, from a tax authority via an application program interface or a batch process over a network interface, an electronic batch file that includes a plurality of electronic requests, wherein each electronic request of the plurality of electronic requests is for a filing of an application, wherein a first electronic request of the plurality of electronic requests is associated with a first user, a first application, and includes first user data comprising an alphanumeric identifier that is generated based at least in part on encrypted personally identifying information (PII) associated with the first user;
based at least in part on the first electronic request and a configurable rules engine, determining a match corresponding to an identity of the first user by comparing at least a portion of the first user data to first verification data, wherein at least a first portion of the first verification data is different from the first user data received from the tax authority;
prior to a determination of fraud, based at least in part on the determination of the match, transmitting, to a user device via the network interface, a notification associated with the match regarding the first application;
receiving, from the user device via the network interface, an electronic communication indicating that the first application or the first electronic request is possibly fraudulent;
determining, based at least in part on the electronic communication, that the first application or the first electronic request is fraudulent; and
generating and transmitting, to the tax authority via the network interface, electronic instructions configured to stop processing the first application as requested by the first electronic request.
29. The computerized method of claim 28 , wherein the first user data further includes personally identifying information (PII) associated with the first user.
30. The computerized method of claim 28 , wherein the alphanumeric identifier comprises all letters, all numbers, or a mix of letters and numbers.
31. The computerized method of claim 28 , further comprising:
associating the alphanumeric identifier to the first verification data.
32. The computerized method of claim 28 , wherein the first verification data associated with the first user is based at least in part on proprietary and public datasets.
33. The computerized method of claim 28 , wherein the notification to the user device regarding a successful application filing of the first application is transmitted to a type of contact included in the first portion of the first verification data.
34. A non-transitory storage medium for storing instructions adapted to be executed by a processor to perform a method for automatically detecting fraudulent tax filings, the instructions comprising:
receiving and storing, from a tax authority via an application program interface or a batch process over a network interface, an electronic batch file that includes a plurality of electronic requests, wherein each electronic request of the plurality of electronic requests is for a filing of an application, wherein a first electronic request of the plurality of electronic requests is associated with a first user, a first application, and includes first user data comprising an alphanumeric identifier that is generated based at least in part on encrypted personally identifying information (PII) associated with the first user;
based at least in part on the first electronic request and a configurable rules engine, determining a match corresponding to an identity of the first user by comparing at least a portion of the first user data to first verification data, wherein at least a first portion of the first verification data is different from the first user data received from the tax authority;
prior to a determination of fraud, based at least in part on the determination of the match, transmitting, to a user device via the network interface, a notification associated with the match regarding the first application;
receiving, from the user device via the network interface, an electronic communication indicating that the first application or the first electronic request is possibly fraudulent;
determining, based at least in part on the electronic communication, that the first application or the first electronic request is fraudulent; and
generating and transmitting, to the tax authority via the network interface, electronic instructions configured to stop processing the first application as requested by the first electronic request.
35. The non-transitory storage medium of claim 34 , wherein the first user data further includes personally identifying information (PII) associated with the first user.
36. The non-transitory storage medium of claim 34 , wherein the notification to the user device regarding a successful application filing of the first application is transmitted to a type of contact included in the first portion of the first verification data.
37. The non-transitory storage medium of claim 34 , wherein the alphanumeric identifier comprises all letters, all numbers, or a mix of letters and numbers.
38. The non-transitory storage medium of claim 34 , further comprising:
associating the alphanumeric identifier to the first verification data.
39. The non-transitory storage medium of claim 34 , wherein the first verification data associated with the first user is based at least in part on proprietary and public datasets.
40. The non-transitory storage medium of claim 34 , wherein the notification to the user device regarding a successful application filing of the first application is transmitted to a type of contact included in the first portion of the first verification data.
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US17/934,038 US20230245246A1 (en) | 2017-11-14 | 2022-09-21 | Security and identity verification system and architecture |
| US18/612,735 US20240311927A1 (en) | 2017-11-14 | 2024-03-21 | Security and identity verification system and architecture |
Applications Claiming Priority (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201762586014P | 2017-11-14 | 2017-11-14 | |
| US16/189,990 US10896472B1 (en) | 2017-11-14 | 2018-11-13 | Security and identity verification system and architecture |
| US202017116423A | 2020-12-09 | 2020-12-09 | |
| US17/934,038 US20230245246A1 (en) | 2017-11-14 | 2022-09-21 | Security and identity verification system and architecture |
Related Parent Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US202017116423A Continuation | 2017-11-14 | 2020-12-09 |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US18/612,735 Continuation US20240311927A1 (en) | 2017-11-14 | 2024-03-21 | Security and identity verification system and architecture |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| US20230245246A1 true US20230245246A1 (en) | 2023-08-03 |
Family
ID=74180613
Family Applications (3)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US16/189,990 Active US10896472B1 (en) | 2017-11-14 | 2018-11-13 | Security and identity verification system and architecture |
| US17/934,038 Abandoned US20230245246A1 (en) | 2017-11-14 | 2022-09-21 | Security and identity verification system and architecture |
| US18/612,735 Abandoned US20240311927A1 (en) | 2017-11-14 | 2024-03-21 | Security and identity verification system and architecture |
Family Applications Before (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US16/189,990 Active US10896472B1 (en) | 2017-11-14 | 2018-11-13 | Security and identity verification system and architecture |
Family Applications After (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US18/612,735 Abandoned US20240311927A1 (en) | 2017-11-14 | 2024-03-21 | Security and identity verification system and architecture |
Country Status (1)
| Country | Link |
|---|---|
| US (3) | US10896472B1 (en) |
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11941635B1 (en) | 2014-10-31 | 2024-03-26 | Experian Information Solutions, Inc. | System and architecture for electronic fraud detection |
| US12045755B1 (en) | 2011-10-31 | 2024-07-23 | Consumerinfo.Com, Inc. | Pre-data breach monitoring |
| US12099940B1 (en) | 2015-07-02 | 2024-09-24 | Experian Information Solutions, Inc. | Behavior analysis using distributed representations of event data |
| US12430646B2 (en) | 2021-04-12 | 2025-09-30 | Csidentity Corporation | Systems and methods of generating risk scores and predictive fraud modeling |
| US12455978B1 (en) | 2017-09-28 | 2025-10-28 | Csidentity Corporation | Identity security architecture systems and methods |
Families Citing this family (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11019090B1 (en) * | 2018-02-20 | 2021-05-25 | United Services Automobile Association (Usaa) | Systems and methods for detecting fraudulent requests on client accounts |
| US11567914B2 (en) | 2018-09-14 | 2023-01-31 | Verint Americas Inc. | Framework and method for the automated determination of classes and anomaly detection methods for time series |
| US11334832B2 (en) | 2018-10-03 | 2022-05-17 | Verint Americas Inc. | Risk assessment using Poisson Shelves |
| US11610580B2 (en) | 2019-03-07 | 2023-03-21 | Verint Americas Inc. | System and method for determining reasons for anomalies using cross entropy ranking of textual items |
| US11514251B2 (en) * | 2019-06-18 | 2022-11-29 | Verint Americas Inc. | Detecting anomalies in textual items using cross-entropies |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20040205008A1 (en) * | 2004-03-29 | 2004-10-14 | Haynie Robert M. | Systems and methods for computing cash flows |
| US20140214636A1 (en) * | 2013-01-29 | 2014-07-31 | Iguehi Rajsky | Remote tax return system |
| US20160063645A1 (en) * | 2014-08-29 | 2016-03-03 | Hrb Innovations, Inc. | Computer program, method, and system for detecting fraudulently filed tax returns |
| US10339527B1 (en) * | 2014-10-31 | 2019-07-02 | Experian Information Solutions, Inc. | System and architecture for electronic fraud detection |
| US10482542B1 (en) * | 2015-10-23 | 2019-11-19 | Hrb Innovations, Inc. | Tax fraud detection through linked relationships |
| US11087334B1 (en) * | 2017-04-04 | 2021-08-10 | Intuit Inc. | Method and system for identifying potential fraud activity in a tax return preparation system, at least partially based on data entry characteristics of tax return content |
Family Cites Families (858)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US2074513A (en) | 1935-08-07 | 1937-03-23 | Mills Novelty Co | Ball elevator latch for pin game apparatus |
| US3316395A (en) | 1963-05-23 | 1967-04-25 | Credit Corp Comp | Credit risk computer |
| US3752904A (en) | 1971-08-09 | 1973-08-14 | Cynthia Cannon | Credit and other security cards and card utilization system therefor |
| US4163290A (en) | 1974-02-08 | 1979-07-31 | Optical Data System | Holographic verification system with indexed memory |
| US5274547A (en) | 1991-01-03 | 1993-12-28 | Credco Of Washington, Inc. | System for generating and transmitting credit reports |
| DE9108341U1 (en) | 1991-07-04 | 1991-10-17 | Grönda, Jürgen, O-2794 Schwerin | Waste bin |
| US5323315A (en) | 1991-08-02 | 1994-06-21 | Vintek, Inc. | Computer system for monitoring the status of individual items of personal property which serve as collateral for securing financing |
| JPH05346915A (en) | 1992-01-30 | 1993-12-27 | Ricoh Co Ltd | Learning machine, neural network, data analysis device, and data analysis method |
| EP0564669A1 (en) | 1992-04-04 | 1993-10-13 | Alcatel SEL Aktiengesellschaft | Network of voice and/or fax storage systems |
| US5563783A (en) | 1992-05-13 | 1996-10-08 | The Trustees Of Columbia University In The City Of New York | Method and system for securities pool allocation |
| EP1111531A1 (en) | 1992-06-10 | 2001-06-27 | Cantor Fitzgerald | Fixed income portfolio index processor and method for using same |
| US5819226A (en) | 1992-09-08 | 1998-10-06 | Hnc Software Inc. | Fraud detection using predictive modeling |
| WO1994023528A1 (en) | 1993-03-31 | 1994-10-13 | British Telecommunications Public Limited Company | Fraud preventing method for a communication network |
| US5751915A (en) | 1993-07-13 | 1998-05-12 | Werbos; Paul J. | Elastic fuzzy logic system |
| DE69427642T2 (en) | 1993-08-27 | 2002-05-16 | Affinity Technology, Inc. | FINANCIAL TRANSACTION PROCESS AND DEVICE WITH A CLOSED LOOP |
| US5940811A (en) | 1993-08-27 | 1999-08-17 | Affinity Technology Group, Inc. | Closed loop financial transaction method and apparatus |
| US5414833A (en) | 1993-10-27 | 1995-05-09 | International Business Machines Corporation | Network security system and method using a parallel finite state machine adaptive active monitor and responder |
| US5930776A (en) | 1993-11-01 | 1999-07-27 | The Golden 1 Credit Union | Lender direct credit evaluation and loan processing system |
| US6963920B1 (en) | 1993-11-19 | 2005-11-08 | Rose Blush Software Llc | Intellectual asset protocol for defining data exchange rules and formats for universal intellectual asset documents, and systems, methods, and computer program products related to same |
| US5999907A (en) | 1993-12-06 | 1999-12-07 | Donner; Irah H. | Intellectual property audit system |
| US6513018B1 (en) | 1994-05-05 | 2003-01-28 | Fair, Isaac And Company, Inc. | Method and apparatus for scoring the likelihood of a desired performance result |
| US5832068A (en) | 1994-06-01 | 1998-11-03 | Davox Corporation | Data processing system with real time priority updating of data records and dynamic record exclusion |
| EP0777890B1 (en) | 1994-08-25 | 2005-01-19 | Geefield Pty. Ltd. | Method for providing identification |
| US5921373A (en) | 1994-09-15 | 1999-07-13 | Smart Carte, Inc. | Cart management system |
| US5627886A (en) | 1994-09-22 | 1997-05-06 | Electronic Data Systems Corporation | System and method for detecting fraudulent network usage patterns using real-time network monitoring |
| US5696965A (en) | 1994-11-03 | 1997-12-09 | Intel Corporation | Electronic information appraisal agent |
| US6397198B1 (en) | 1994-11-28 | 2002-05-28 | Indivos Corporation | Tokenless biometric electronic transactions using an audio signature to identify the transaction processor |
| US7613659B1 (en) | 1994-11-28 | 2009-11-03 | Yt Acquisition Corporation | System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse |
| US5679938A (en) | 1994-12-02 | 1997-10-21 | Telecheck International, Inc. | Methods and systems for interactive check authorizations |
| US5504675A (en) | 1994-12-22 | 1996-04-02 | International Business Machines Corporation | Method and apparatus for automatic selection and presentation of sales promotion programs |
| US5774868A (en) | 1994-12-23 | 1998-06-30 | International Business And Machines Corporation | Automatic sales promotion selection system and method |
| US5742775A (en) | 1995-01-18 | 1998-04-21 | King; Douglas L. | Method and apparatus of creating financial instrument and administering an adjustable rate loan system |
| US5696907A (en) | 1995-02-27 | 1997-12-09 | General Electric Company | System and method for performing risk and credit analysis of financial service applications |
| US6601048B1 (en) | 1997-09-12 | 2003-07-29 | Mci Communications Corporation | System and method for detecting and managing fraud |
| WO1996041488A1 (en) | 1995-06-07 | 1996-12-19 | The Dice Company | Fraud detection system for electronic networks using geographical location coordinates |
| US5884289A (en) | 1995-06-16 | 1999-03-16 | Card Alert Services, Inc. | Debit card fraud detection and control system |
| DE69503374T2 (en) | 1995-08-28 | 1999-04-15 | Michael Ramat Gan Feldbau | Setup and method for authenticating the sending and content of a document |
| US5878403A (en) | 1995-09-12 | 1999-03-02 | Cmsi | Computer implemented automated credit application analysis and decision routing system |
| US5809478A (en) | 1995-12-08 | 1998-09-15 | Allstate Insurance Company | Method for accessing and evaluating information for processing an application for insurance |
| US6023694A (en) | 1996-01-02 | 2000-02-08 | Timeline, Inc. | Data retrieval method and apparatus with multiple source capability |
| US5819260A (en) | 1996-01-22 | 1998-10-06 | Lexis-Nexis | Phrase recognition method and apparatus |
| US5822741A (en) | 1996-02-05 | 1998-10-13 | Lockheed Martin Corporation | Neural network/conceptual clustering fraud detection architecture |
| US5745654A (en) | 1996-02-13 | 1998-04-28 | Hnc Software, Inc. | Fast explanations of scored observations |
| US5758328A (en) | 1996-02-22 | 1998-05-26 | Giovannoli; Joseph | Computerized quotation system and method |
| US5752242A (en) | 1996-04-18 | 1998-05-12 | Electronic Data Systems Corporation | System and method for automated retrieval of information |
| US5739512A (en) | 1996-05-30 | 1998-04-14 | Sun Microsystems, Inc. | Digital delivery of receipts |
| SE9602186D0 (en) | 1996-05-31 | 1996-05-31 | Christer Johansson | Electronic circuit ID circuit |
| US6094643A (en) | 1996-06-14 | 2000-07-25 | Card Alert Services, Inc. | System for detecting counterfeit financial card fraud |
| US7159116B2 (en) | 1999-12-07 | 2007-01-02 | Blue Spike, Inc. | Systems, methods and devices for trusted transactions |
| IL148925A0 (en) | 1996-07-22 | 2002-09-12 | Cyva Res Corp | Personal information security and exchange tool |
| US5872921A (en) | 1996-07-24 | 1999-02-16 | Datalink Systems Corp. | System and method for a real time data stream analyzer and alert system |
| US20070292006A1 (en) | 1996-08-07 | 2007-12-20 | Johnson Alice A | Fingerprint compiler program of explanation |
| US6918038B1 (en) | 1996-08-13 | 2005-07-12 | Angel Secure Networks, Inc. | System and method for installing an auditable secure network |
| US8225003B2 (en) | 1996-11-29 | 2012-07-17 | Ellis Iii Frampton E | Computers and microchips with a portion protected by an internal hardware firewall |
| US5950179A (en) | 1996-12-03 | 1999-09-07 | Providian Financial Corporation | Method and system for issuing a secured credit card |
| US7890581B2 (en) | 1996-12-16 | 2011-02-15 | Ip Holdings, Inc. | Matching network system for mobile devices |
| US6285987B1 (en) | 1997-01-22 | 2001-09-04 | Engage, Inc. | Internet advertising system |
| US6055570A (en) | 1997-04-03 | 2000-04-25 | Sun Microsystems, Inc. | Subscribed update monitors |
| GB2321751B (en) | 1997-04-22 | 1999-02-10 | Searchspace Limited | A monitoring system and method |
| US5879297A (en) | 1997-05-08 | 1999-03-09 | Lucent Medical Systems, Inc. | System and method to determine the location and orientation of an indwelling medical device |
| US6119103A (en) | 1997-05-27 | 2000-09-12 | Visa International Service Association | Financial risk prediction systems and methods therefor |
| US5999940A (en) | 1997-05-28 | 1999-12-07 | Home Information Services, Inc. | Interactive information discovery tool and methodology |
| US6029194A (en) | 1997-06-10 | 2000-02-22 | Tektronix, Inc. | Audio/video media server for distributed editing over networks |
| DE19728226A1 (en) | 1997-07-02 | 1999-01-07 | Zahnradfabrik Friedrichshafen | Custom vehicle |
| US7096192B1 (en) | 1997-07-28 | 2006-08-22 | Cybersource Corporation | Method and system for detecting fraud in a credit card transaction over a computer network |
| US7403922B1 (en) | 1997-07-28 | 2008-07-22 | Cybersource Corporation | Method and apparatus for evaluating fraud risk in an electronic commerce transaction |
| US6029154A (en) | 1997-07-28 | 2000-02-22 | Internet Commerce Services Corporation | Method and system for detecting fraud in a credit card transaction over the internet |
| US7519558B2 (en) | 1997-08-27 | 2009-04-14 | Ballard Claudio R | Biometrically enabled private secure information repository |
| US5943666A (en) | 1997-09-15 | 1999-08-24 | International Business Machines Corporation | Method and apparatus for optimizing queries across heterogeneous databases |
| US5913196A (en) | 1997-11-17 | 1999-06-15 | Talmor; Rita | System and method for establishing identity of a speaker |
| US20010014868A1 (en) | 1997-12-05 | 2001-08-16 | Frederick Herz | System for the automatic determination of customized prices and promotions |
| AU697341B1 (en) | 1997-12-18 | 1998-10-01 | Anthony Gerard Hudson | Satellite G.P.S. connected and bar-coded registered vehicle licence plate SATPLATE |
| US6029139A (en) | 1998-01-28 | 2000-02-22 | Ncr Corporation | Method and apparatus for optimizing promotional sale of products based upon historical data |
| US6845453B2 (en) | 1998-02-13 | 2005-01-18 | Tecsec, Inc. | Multiple factor-based user identification and authentication |
| US6055513A (en) | 1998-03-11 | 2000-04-25 | Telebuyer, Llc | Methods and apparatus for intelligent selection of goods and services in telephonic and electronic commerce |
| US6157707A (en) | 1998-04-03 | 2000-12-05 | Lucent Technologies Inc. | Automated and selective intervention in transaction-based networks |
| US6208720B1 (en) | 1998-04-23 | 2001-03-27 | Mci Communications Corporation | System, method and computer program product for a dynamic rules-based threshold engine |
| US6044357A (en) | 1998-05-05 | 2000-03-28 | International Business Machines Corporation | Modeling a multifunctional firm operating in a competitive market with multiple brands |
| US6928546B1 (en) | 1998-05-14 | 2005-08-09 | Fusion Arc, Inc. | Identity verification method using a central biometric authority |
| AU4089199A (en) | 1998-05-21 | 1999-12-06 | Equifax, Inc. | System and method for authentication of network users with preprocessing |
| WO1999060482A1 (en) | 1998-05-21 | 1999-11-25 | Equifax Inc. | System and method for authentication of network users and issuing a digital certificate |
| US6263447B1 (en) | 1998-05-21 | 2001-07-17 | Equifax Inc. | System and method for authentication of network users |
| GB9811574D0 (en) | 1998-05-30 | 1998-07-29 | Ibm | Indexed file system and a method and a mechanism for accessing data records from such a system |
| US6311169B2 (en) | 1998-06-11 | 2001-10-30 | Consumer Credit Associates, Inc. | On-line consumer credit data reporting system |
| US7231068B2 (en) | 1998-06-19 | 2007-06-12 | Solidus Networks, Inc. | Electronic transaction verification system |
| US5912839A (en) | 1998-06-23 | 1999-06-15 | Energy Conversion Devices, Inc. | Universal memory element and method of programming same |
| US6144988A (en) | 1998-07-23 | 2000-11-07 | Experian Marketing Solutions, Inc. | Computer system and method for securely formatting and mapping data for internet web sites |
| US6397197B1 (en) | 1998-08-26 | 2002-05-28 | E-Lynxx Corporation | Apparatus and method for obtaining lowest bid from information product vendors |
| US6253203B1 (en) | 1998-10-02 | 2001-06-26 | Ncr Corporation | Privacy-enhanced database |
| US6285983B1 (en) | 1998-10-21 | 2001-09-04 | Lend Lease Corporation Ltd. | Marketing systems and methods that preserve consumer privacy |
| US6249228B1 (en) | 1998-10-23 | 2001-06-19 | Trw Inc. | Vehicle occupant protection device and system having an anti-theft, anti-tamper feature |
| US6405245B1 (en) | 1998-10-28 | 2002-06-11 | Verticalone Corporation | System and method for automated access to personal information |
| US6405181B2 (en) | 1998-11-03 | 2002-06-11 | Nextcard, Inc. | Method and apparatus for real time on line credit approval |
| US20010014878A1 (en) | 1998-11-09 | 2001-08-16 | Nilotpal Mitra | Transaction method and apparatus |
| US6602469B1 (en) | 1998-11-09 | 2003-08-05 | Lifestream Technologies, Inc. | Health monitoring and diagnostic device and network-based health assessment and medical records maintenance system |
| US6898574B1 (en) | 1998-11-09 | 2005-05-24 | John Francis Regan | Lender and insurer transaction processing system and method |
| US6254000B1 (en) | 1998-11-13 | 2001-07-03 | First Data Corporation | System and method for providing a card transaction authorization fraud warning |
| AU768096B2 (en) | 1998-11-18 | 2003-12-04 | Lightbridge, Inc. | Event manager for use in fraud detection |
| US7702550B2 (en) | 1999-03-31 | 2010-04-20 | New Market Solutions, Llc | Multiple computer system supporting a private constant-dollar financial product |
| US6542894B1 (en) | 1998-12-09 | 2003-04-01 | Unica Technologies, Inc. | Execution of multiple models using data segmentation |
| US6532459B1 (en) | 1998-12-15 | 2003-03-11 | Berson Research Corp. | System for finding, identifying, tracking, and correcting personal information in diverse databases |
| US7035855B1 (en) | 2000-07-06 | 2006-04-25 | Experian Marketing Solutions, Inc. | Process and system for integrating information from disparate databases for purposes of predicting consumer behavior |
| US6829711B1 (en) | 1999-01-26 | 2004-12-07 | International Business Machines Corporation | Personal website for electronic commerce on a smart java card with multiple security check points |
| US6740875B1 (en) | 1999-02-11 | 2004-05-25 | The Regents Of The University Of California | Gamma watermarking |
| AU3628100A (en) | 1999-03-15 | 2000-10-04 | Vladimir Fishman | Integral criterion for model training and method of application to targeted marketing optimization |
| AU3884000A (en) | 1999-03-15 | 2000-10-04 | Marketswitch Corp. | Gradient criterion method for neural networks and application to targeted marketing |
| WO2000055778A1 (en) | 1999-03-16 | 2000-09-21 | Rafael Carey A De | Digital-timeshare-exchange |
| US7543325B2 (en) | 1999-03-30 | 2009-06-02 | Tivo Inc. | System for remotely controlling client recording and storage behavior |
| IL129451A (en) | 1999-04-15 | 2004-05-12 | Eli Talmor | System and method for authentication of a speaker |
| US6456984B1 (en) | 1999-05-28 | 2002-09-24 | Qwest Communications International Inc. | Method and system for providing temporary credit authorizations |
| US6748369B2 (en) | 1999-06-21 | 2004-06-08 | General Electric Company | Method and system for automated property valuation |
| US8666757B2 (en) | 1999-07-28 | 2014-03-04 | Fair Isaac Corporation | Detection of upcoding and code gaming fraud and abuse in prospective payment healthcare systems |
| EP1212717A2 (en) | 1999-08-06 | 2002-06-12 | Marketswitch Corporation | Method for optimizing net present value of a cross-selling marketing campaign |
| US7813944B1 (en) | 1999-08-12 | 2010-10-12 | Fair Isaac Corporation | Detection of insurance premium fraud or abuse using a predictive software system |
| US7260724B1 (en) | 1999-09-20 | 2007-08-21 | Security First Corporation | Context sensitive dynamic authentication in a cryptographic system |
| US6269349B1 (en) | 1999-09-21 | 2001-07-31 | A6B2, Inc. | Systems and methods for protecting private information |
| US7418431B1 (en) | 1999-09-30 | 2008-08-26 | Fair Isaac Corporation | Webstation: configurable web-based workstation for reason driven data analysis |
| US7240363B1 (en) | 1999-10-06 | 2007-07-03 | Ellingson Robert E | System and method for thwarting identity theft and other identity misrepresentations |
| US7206746B1 (en) | 1999-11-09 | 2007-04-17 | West Corporation | Third party verification system |
| US20030065563A1 (en) | 1999-12-01 | 2003-04-03 | Efunds Corporation | Method and apparatus for atm-based cross-selling of products and services |
| US6505193B1 (en) | 1999-12-01 | 2003-01-07 | Iridian Technologies, Inc. | System and method of fast biometric database searching using digital certificates |
| WO2001045012A2 (en) | 1999-12-15 | 2001-06-21 | E-Scoring, Inc. | Systems and methods for providing consumers anonymous pre-approved offers from a consumer-selected group of merchants |
| US6934858B2 (en) | 1999-12-15 | 2005-08-23 | Authentify, Inc. | System and method of using the public switched telephone network in providing authentication or authorization for online transactions |
| US6418436B1 (en) | 1999-12-20 | 2002-07-09 | First Data Corporation | Scoring methodology for purchasing card fraud detection |
| US7277869B2 (en) | 1999-12-29 | 2007-10-02 | General Electric Capital Corporation | Delinquency-moving matrices for visualizing loan collections |
| US7917423B2 (en) | 2000-01-06 | 2011-03-29 | Bgc Partners, Inc. | Systems and methods for monitoring credit of trading counterparties |
| US6845448B1 (en) | 2000-01-07 | 2005-01-18 | Pennar Software Corporation | Online repository for personal information |
| US20010034631A1 (en) | 2000-01-21 | 2001-10-25 | Kiselik Daniel R. | Method and apparatus for the automatic selection of parties to an arrangement between a requestor and a satisfier of selected requirements |
| US6871287B1 (en) | 2000-01-21 | 2005-03-22 | John F. Ellingson | System and method for verification of identity |
| US20010029470A1 (en) | 2000-02-03 | 2001-10-11 | R. Steven Schultz | Electronic transaction receipt system and method |
| US7412462B2 (en) | 2000-02-18 | 2008-08-12 | Burnside Acquisition, Llc | Data repository and method for promoting network storage of data |
| US20010027413A1 (en) | 2000-02-23 | 2001-10-04 | Bhutta Hafiz Khalid Rehman | System, software and method of evaluating, buying and selling consumer's present and potential buying power through a clearing house |
| US6873979B2 (en) | 2000-02-29 | 2005-03-29 | Marketswitch Corporation | Method of building predictive models on transactional data |
| US6904412B1 (en) | 2000-03-14 | 2005-06-07 | Everbank | Method and apparatus for a mortgage loan originator compliance engine |
| US7412422B2 (en) | 2000-03-23 | 2008-08-12 | Dekel Shiloh | Method and system for securing user identities and creating virtual users to enhance privacy on a communication network |
| EP1279125A4 (en) | 2000-03-24 | 2006-01-04 | Access Business Group Int Llc | System and method for detecting fraudulent transactions |
| US7263506B2 (en) | 2000-04-06 | 2007-08-28 | Fair Isaac Corporation | Identification and management of fraudulent credit/debit card purchases at merchant ecommerce sites |
| KR100336912B1 (en) | 2000-04-17 | 2002-05-15 | 최영헌 | Security apparatus and method for information processing device using an e-mail |
| US6965881B1 (en) | 2000-04-24 | 2005-11-15 | Intel Corporation | Digital credential usage reporting |
| US7827115B2 (en) | 2000-04-24 | 2010-11-02 | Visa International Service Association | Online payer authentication service |
| US7540021B2 (en) | 2000-04-24 | 2009-05-26 | Justin Page | System and methods for an identity theft protection bot |
| US7007174B2 (en) | 2000-04-26 | 2006-02-28 | Infoglide Corporation | System and method for determining user identity fraud using similarity searching |
| JP2001312586A (en) | 2000-04-28 | 2001-11-09 | Tokio Marine & Fire Insurance Co Ltd | Support system for providing of ranking-related service and support method therefor |
| US6866586B2 (en) | 2000-04-28 | 2005-03-15 | Igt | Cashless transaction clearinghouse |
| WO2001086485A2 (en) | 2000-05-09 | 2001-11-15 | Fair, Isaac And Company | Approach for re-using business rules |
| US20060004663A1 (en) | 2000-05-12 | 2006-01-05 | Singhal Tara C | Method and apparatus for a private information system and service transactions that minimize theft of identity data |
| US20030158960A1 (en) | 2000-05-22 | 2003-08-21 | Engberg Stephan J. | System and method for establishing a privacy communication path |
| US7330871B2 (en) | 2000-06-07 | 2008-02-12 | Telecheck Services, Inc. | Online machine data collection and archiving process |
| US6748426B1 (en) | 2000-06-15 | 2004-06-08 | Murex Securities, Ltd. | System and method for linking information in a global computer network |
| US20020013899A1 (en) | 2000-06-17 | 2002-01-31 | Faul Jacob Joel | Automated document distribution and transaction verification |
| US20020019804A1 (en) | 2000-06-29 | 2002-02-14 | Sutton Robert E. | Method for providing financial and risk management |
| US7376618B1 (en) | 2000-06-30 | 2008-05-20 | Fair Isaac Corporation | Detecting and measuring risk with predictive models using content mining |
| US7890433B2 (en) | 2000-06-30 | 2011-02-15 | Tara Chand Singhal | Private and secure payment system |
| AU7182701A (en) | 2000-07-06 | 2002-01-21 | David Paul Felsher | Information record infrastructure, system and method |
| US7610216B1 (en) | 2000-07-13 | 2009-10-27 | Ebay Inc. | Method and system for detecting fraud |
| ATE323919T1 (en) | 2000-07-14 | 2006-05-15 | Voice Trust Ag | METHOD AND SYSTEM FOR AUTHORIZING A COMMERCIAL TRANSACTION |
| US20040199456A1 (en) | 2000-08-01 | 2004-10-07 | Andrew Flint | Method and apparatus for explaining credit scores |
| US20020019938A1 (en) | 2000-08-04 | 2002-02-14 | Aarons Michael Thomas | Method and apparatus for secure identification for networked environments |
| US20020178112A1 (en) | 2000-08-14 | 2002-11-28 | Visa International Service Association | Point of sale check service |
| US20050154664A1 (en) | 2000-08-22 | 2005-07-14 | Guy Keith A. | Credit and financial information and management system |
| US7870599B2 (en) | 2000-09-05 | 2011-01-11 | Netlabs.Com, Inc. | Multichannel device utilizing a centralized out-of-band authentication system (COBAS) |
| GB2384087A (en) | 2000-09-29 | 2003-07-16 | Fair Isaac And Company Inc | Score based decisioning |
| US6597775B2 (en) | 2000-09-29 | 2003-07-22 | Fair Isaac Corporation | Self-learning real-time prioritization of telecommunication fraud control actions |
| US6850606B2 (en) | 2001-09-25 | 2005-02-01 | Fair Isaac Corporation | Self-learning real-time prioritization of telecommunication fraud control actions |
| US20020040344A1 (en) | 2000-10-04 | 2002-04-04 | Preiser Randall F. | Check guarantee, verification, processing, credit reports and collection system and method awarding purchase points for usage of checks |
| US20020042879A1 (en) | 2000-10-10 | 2002-04-11 | Gould Terry A. | Electronic signature system |
| US7197470B1 (en) | 2000-10-11 | 2007-03-27 | Buzzmetrics, Ltd. | System and method for collection analysis of electronic discussion methods |
| DE10051461A1 (en) | 2000-10-17 | 2002-04-25 | Siemens Ag | Method and system for identifying a user |
| US7983976B2 (en) | 2000-10-17 | 2011-07-19 | Hedgestreet, Inc. | Methods and apparatus for formulation, initial public or private offering, and secondary market trading of risk management contracts |
| WO2002033628A2 (en) | 2000-10-18 | 2002-04-25 | Johnson & Johnson Consumer Companies, Inc. | Intelligent performance-based product recommendation system |
| US20020052841A1 (en) | 2000-10-27 | 2002-05-02 | Guthrie Paul D. | Electronic payment system |
| AU2002239481A1 (en) | 2000-10-30 | 2002-05-27 | Raf Technology, Inc. | Verification engine for user authentication |
| US7844489B2 (en) | 2000-10-30 | 2010-11-30 | Buyerleverage | Buyer-driven targeting of purchasing entities |
| EP1340178A4 (en) | 2000-11-02 | 2005-06-08 | Cybersource Corp | Method and apparatus for evaluating fraud risk in an electronic commerce transaction |
| US8630938B2 (en) | 2000-11-15 | 2014-01-14 | Ebay Inc. | Method and apparatus to detect fraudulent activities within a network-based auction facility |
| IL146597A0 (en) | 2001-11-20 | 2002-08-14 | Gordon Goren | Method and system for creating meaningful summaries from interrelated sets of information |
| US20030233278A1 (en) | 2000-11-27 | 2003-12-18 | Marshall T. Thaddeus | Method and system for tracking and providing incentives for tasks and activities and other behavioral influences related to money, individuals, technology and other assets |
| WO2002046881A2 (en) | 2000-12-09 | 2002-06-13 | Singhal Tara Chand | Method and apparatus for an integrated identity security and payment system |
| US20040190688A1 (en) | 2003-03-31 | 2004-09-30 | Timmins Timothy A. | Communications methods and systems using voiceprints |
| US6930707B2 (en) | 2000-12-22 | 2005-08-16 | International Business Machines Corporation | Digital camera apparatus with biometric capability |
| US20020087460A1 (en) | 2001-01-04 | 2002-07-04 | Hornung Katharine A. | Method for identity theft protection |
| US6983381B2 (en) | 2001-01-17 | 2006-01-03 | Arcot Systems, Inc. | Methods for pre-authentication of users using one-time passwords |
| US20060014129A1 (en) | 2001-02-09 | 2006-01-19 | Grow.Net, Inc. | System and method for processing test reports |
| US6543683B2 (en) | 2001-02-12 | 2003-04-08 | Ncr Corporation | System and method for providing consumer access to a stored digital receipt generated as a result of a purchase transaction and to business/consumer applications related to the stored digital receipt |
| US7711635B2 (en) | 2001-02-22 | 2010-05-04 | Fair Isaac Corporation | System and method for helping consumers understand and interpret credit scores |
| CA2340562A1 (en) | 2001-02-28 | 2002-08-28 | Midway Amusement Games, Llc | Tournament network for linking amusement games |
| JP2002269350A (en) | 2001-03-14 | 2002-09-20 | Hitachi Ltd | Transaction settlement method, transaction settlement system, mobile communication terminal used therefor, and payment terminal for member stores |
| US7089592B2 (en) | 2001-03-15 | 2006-08-08 | Brighterion, Inc. | Systems and methods for dynamic detection and prevention of electronic fraud |
| US20030033261A1 (en) | 2001-03-16 | 2003-02-13 | Knegendorf William A. | Method for performing risk-based pricing of a service or good |
| US20020138417A1 (en) | 2001-03-20 | 2002-09-26 | David Lawrence | Risk management clearinghouse |
| US7370351B1 (en) | 2001-03-22 | 2008-05-06 | Novell, Inc. | Cross domain authentication and security services using proxies for HTTP access |
| US6965997B2 (en) | 2001-03-26 | 2005-11-15 | International Business Machines Corporation | System and method for binding and unbinding ticket items with user-negotiated security features |
| US20090024417A1 (en) | 2001-03-26 | 2009-01-22 | Marks Richard D | Electronic medical record system |
| US6973462B2 (en) | 2001-04-03 | 2005-12-06 | Florida Atlantic University | Integrated guardianship information system |
| US6973575B2 (en) | 2001-04-05 | 2005-12-06 | International Business Machines Corporation | System and method for voice recognition password reset |
| US20020156676A1 (en) | 2001-04-17 | 2002-10-24 | Ahrens John C. | System, method, and apparatus for creating and securely managing accounts holding cash equivalents |
| US20030009426A1 (en) | 2001-04-19 | 2003-01-09 | Marcelo Ruiz-Sanchez | Methods and apparatus for protecting against credit card fraud, check fraud, and identity theft |
| US7272857B1 (en) | 2001-04-20 | 2007-09-18 | Jpmorgan Chase Bank, N.A. | Method/system for preventing identity theft or misuse by restricting access |
| US20020161711A1 (en) | 2001-04-30 | 2002-10-31 | Sartor Karalyn K. | Fraud detection method |
| US6751626B2 (en) | 2001-05-03 | 2004-06-15 | International Business Machines Corporation | Method, system, and program for mining data in a personal information manager database |
| US7028052B2 (en) | 2001-05-10 | 2006-04-11 | Equifax, Inc. | Systems and methods for notifying a consumer of changes made to a credit report |
| US7542993B2 (en) | 2001-05-10 | 2009-06-02 | Equifax, Inc. | Systems and methods for notifying a consumer of changes made to a credit report |
| US20020173994A1 (en) | 2001-05-21 | 2002-11-21 | Ferguson Joseph M. | Method and apparatus for insuring an insured from identity theft peril and identity reclamation and credit restoration |
| US6796497B2 (en) | 2002-04-23 | 2004-09-28 | American Express Travel Related Services Company, Inc. | System and method for facilitating a subsidiary card account |
| US7865427B2 (en) | 2001-05-30 | 2011-01-04 | Cybersource Corporation | Method and apparatus for evaluating fraud risk in an electronic commerce transaction |
| US20070174208A1 (en) | 2001-06-01 | 2007-07-26 | American Express Travel Related Services Company, Inc. | System and Method for Global Automated Address Verification |
| AU2002312381A1 (en) | 2001-06-07 | 2002-12-16 | First Usa Bank, N.A. | System and method for rapid updating of credit information |
| US7430532B2 (en) | 2001-06-12 | 2008-09-30 | Blackrock Financial Management, Inc. | System and method for trade entry |
| US7310743B1 (en) | 2001-06-12 | 2007-12-18 | Emc Corporation | Data recovery method and apparatus |
| WO2002103496A2 (en) | 2001-06-18 | 2002-12-27 | Daon Holdings Limited | An electronic data vault providing biometrically protected electronic signatures |
| US7580884B2 (en) | 2001-06-25 | 2009-08-25 | Intuit Inc. | Collecting and aggregating creditworthiness data |
| US7801828B2 (en) | 2001-07-06 | 2010-09-21 | Candella George J | Method and system for detecting identity theft in non-personal and personal transactions |
| DE60237833D1 (en) | 2001-07-18 | 2010-11-11 | Daon Holdings Ltd | DISTRIBUTED NETWORK SYSTEM WITH BIOMETRIC ACCESS TESTING |
| US20030200447A1 (en) | 2001-08-17 | 2003-10-23 | Lotta Almroth | Identification system |
| US8266451B2 (en) | 2001-08-31 | 2012-09-11 | Gemalto Sa | Voice activated smart card |
| US7313545B2 (en) | 2001-09-07 | 2007-12-25 | First Data Corporation | System and method for detecting fraudulent calls |
| US20030048904A1 (en) | 2001-09-07 | 2003-03-13 | Po-Tong Wang | Web-based biometric authorization apparatus |
| US7333937B2 (en) | 2001-09-13 | 2008-02-19 | Ads Responsecorp, Inc. | Health care financing method |
| US6811082B2 (en) | 2001-09-18 | 2004-11-02 | Jacob Y. Wong | Advanced magnetic stripe bridge (AMSB) |
| US20030208428A1 (en) | 2001-09-26 | 2003-11-06 | Sylain Raynes | Inverse solution for structured finance |
| US20030061163A1 (en) | 2001-09-27 | 2003-03-27 | Durfield Richard C. | Method and apparatus for verification/authorization by credit or debit card owner of use of card concurrently with merchant transaction |
| US20030070101A1 (en) | 2001-10-09 | 2003-04-10 | Buscemi James S. | Method and apparatus for protecting personal information and for verifying identities |
| US7546266B2 (en) | 2001-10-18 | 2009-06-09 | General Electric Company | Method, system, and storage medium for pre-screening customers for credit card approval at a point of sale |
| US7536346B2 (en) | 2001-10-29 | 2009-05-19 | Equifax, Inc. | System and method for facilitating reciprocative small business financial information exchanges |
| US6908030B2 (en) | 2001-10-31 | 2005-06-21 | Arcot Systems, Inc. | One-time credit card number generator and single round-trip authentication |
| US20040103147A1 (en) | 2001-11-13 | 2004-05-27 | Flesher Kevin E. | System for enabling collaboration and protecting sensitive data |
| US8458082B2 (en) | 2001-11-13 | 2013-06-04 | Interthinx, Inc. | Automated loan risk assessment system and method |
| US7370044B2 (en) | 2001-11-19 | 2008-05-06 | Equifax, Inc. | System and method for managing and updating information relating to economic entities |
| WO2003052545A2 (en) | 2001-11-20 | 2003-06-26 | Pierre Bierre | Secure identification system combining forensic/biometric population database and issuance of relationship-specific identifiers toward enhanced privacy |
| US7574396B2 (en) | 2001-12-04 | 2009-08-11 | Andrew Kalotay Associates, Inc. | Method of and apparatus for administering an asset-backed security using coupled lattice efficiency analysis |
| US6891932B2 (en) | 2001-12-11 | 2005-05-10 | Cisco Technology, Inc. | System and methodology for voice activated access to multiple data sources and voice repositories in a single session |
| US20030115133A1 (en) | 2001-12-13 | 2003-06-19 | Dun & Bradstreet, Inc. | Higher risk score for identifying potential illegality in business-to-business relationships |
| US7929951B2 (en) | 2001-12-20 | 2011-04-19 | Stevens Lawrence A | Systems and methods for storage of user information and for verifying user identity |
| US7428509B2 (en) | 2002-01-10 | 2008-09-23 | Mastercard International Incorporated | Method and system for detecting payment account fraud |
| US7630932B2 (en) | 2002-01-31 | 2009-12-08 | Transunion Interactive, Inc. | Loan rate and lending information analysis system |
| US7904360B2 (en) | 2002-02-04 | 2011-03-08 | Alexander William EVANS | System and method for verification, authentication, and notification of a transaction |
| US7813937B1 (en) | 2002-02-15 | 2010-10-12 | Fair Isaac Corporation | Consistency modeling of healthcare claims to detect fraud and abuse |
| AU2003218096A1 (en) | 2002-03-13 | 2003-09-29 | License Monitor Inc. | Method and apparatus for monitoring events concerning record subjects on behalf of third parties |
| US20050262014A1 (en) | 2002-03-15 | 2005-11-24 | Fickes Steven W | Relative valuation system for measuring the relative values, relative risks, and financial performance of corporate enterprises |
| US20030182214A1 (en) | 2002-03-20 | 2003-09-25 | Taylor Michael K. | Fraud detection and security system for financial institutions |
| US20060059110A1 (en) | 2002-04-03 | 2006-03-16 | Ajay Madhok | System and method for detecting card fraud |
| US20030195859A1 (en) | 2002-04-16 | 2003-10-16 | Lawrence Jason E. | System and methods for authenticating and monitoring transactions |
| US20060129840A1 (en) | 2002-04-23 | 2006-06-15 | Michael Milgramm | Multiplatform independent biometric identification system |
| US6993659B2 (en) | 2002-04-23 | 2006-01-31 | Info Data, Inc. | Independent biometric identification system |
| US20060206725A1 (en) | 2002-04-23 | 2006-09-14 | Michael Milgramm | System and method for platform-independent biometrically verified secure information transfer and access control |
| AU2003245253A1 (en) | 2002-05-06 | 2003-11-11 | Zoot Enterprises, Inc. | System and method of application processing |
| US7383227B2 (en) | 2002-05-14 | 2008-06-03 | Early Warning Services, Llc | Database for check risk decisions populated with check activity data from banks of first deposit |
| US7593891B2 (en) | 2003-05-30 | 2009-09-22 | Experian Scorex Llc | Credit score simulation |
| US7610229B1 (en) | 2002-05-30 | 2009-10-27 | Experian Information Solutions, Inc. | System and method for interactively simulating a credit-worthiness score |
| US20040010698A1 (en) | 2002-05-30 | 2004-01-15 | Rolfe Andrew R. | Digital certificate system incorporating voice biometric processing |
| US6700220B2 (en) | 2002-05-30 | 2004-03-02 | Accessories Electroniques Bomar Inc. | Remote control pass-key module for anti-theft system equipped vehicles and installation method |
| US7200619B2 (en) | 2002-05-31 | 2007-04-03 | International Business Machines Corporation | Method and process to optimize correlation of replicated with extracted data from disparate data sources |
| US8224723B2 (en) | 2002-05-31 | 2012-07-17 | Jpmorgan Chase Bank, N.A. | Account opening system, method and computer program product |
| US7509117B2 (en) | 2002-05-31 | 2009-03-24 | Nokia Corporation | Apparatus, and associated method, for notifying a user in a radio communication system of a commercially-related transaction |
| US6907408B2 (en) | 2002-06-04 | 2005-06-14 | Albert J. Angel | Hierarchical authentication process and system for financial transactions |
| US20050021519A1 (en) | 2002-06-12 | 2005-01-27 | Ahmed Ghouri | System and method for creating and maintaining an internet-based, universally accessible and anonymous patient medical home page |
| US7356516B2 (en) | 2002-06-13 | 2008-04-08 | Visa U.S.A. Inc. | Method and system for facilitating electronic dispute resolution |
| US8762237B2 (en) | 2002-06-19 | 2014-06-24 | Citicorp Credit Services, Inc. | Establishing, modifying, and customizing account-based products |
| FR2842059B1 (en) | 2002-07-04 | 2004-12-24 | Cit Alcatel | METHOD FOR LOCKING A MOBILE TELECOMMUNICATION TERMINAL |
| GB2391373A (en) | 2002-07-31 | 2004-02-04 | David Toms | A system for the automatic detection of a fraudulent transaction |
| US20040024709A1 (en) | 2002-08-05 | 2004-02-05 | Yu Paul D. | System and method for determining the identity of a party associated with a transaction |
| US7083090B2 (en) | 2002-08-09 | 2006-08-01 | Patrick Zuili | Remote portable and universal smartcard authentication and authorization device |
| JP2004078435A (en) | 2002-08-13 | 2004-03-11 | Ibm Japan Ltd | Risk management device, risk management system, risk management method, future expected profit calculation method, and program |
| US20040133440A1 (en) | 2002-08-22 | 2004-07-08 | Carolan David B. | System and method for objectively managing complex familial interactions and responsibilities |
| US20040110119A1 (en) | 2002-09-03 | 2004-06-10 | Riconda John R. | Web-based knowledge management system and method for education systems |
| US20040128232A1 (en) | 2002-09-04 | 2004-07-01 | Paul Descloux | Mortgage prepayment forecasting system |
| US7356506B2 (en) | 2002-09-18 | 2008-04-08 | General Electric Capital Corporation | Methods and apparatus for evaluating a credit application |
| US7792715B1 (en) | 2002-09-21 | 2010-09-07 | Mighty Net, Incorporated | Method of on-line credit information monitoring and control |
| US20040059653A1 (en) | 2002-09-24 | 2004-03-25 | Fidelity National Financial, Inc. | System and method for rendering automated real property title decisions |
| US20040064401A1 (en) | 2002-09-27 | 2004-04-01 | Capital One Financial Corporation | Systems and methods for detecting fraudulent information |
| US7277891B2 (en) | 2002-10-11 | 2007-10-02 | Digimarc Corporation | Systems and methods for recognition of individuals using multiple biometric searches |
| US20040078324A1 (en) | 2002-10-16 | 2004-04-22 | Carl Lonnberg | Systems and methods for authenticating a financial account at activation |
| KR20040034063A (en) | 2002-10-21 | 2004-04-28 | 한국신용평가정보주식회사 | Method of credit filtering on line by grouping category of business and/or industry |
| CA2502811C (en) | 2002-10-21 | 2020-09-29 | Raphael Spero | System and method for capture, storage and processing of receipts and related data |
| US7395273B2 (en) | 2002-10-31 | 2008-07-01 | General Electric Company | System providing receipt inspection reporting |
| US7870078B2 (en) | 2002-11-01 | 2011-01-11 | Id Insight Incorporated | System, method and computer program product for assessing risk of identity theft |
| US7240059B2 (en) | 2002-11-14 | 2007-07-03 | Seisint, Inc. | System and method for configuring a parallel-processing database system |
| EP1561178A4 (en) | 2002-11-15 | 2009-08-12 | Fair Isaac Corp | Fraud and abuse detection and entity profiling in hierarchical coded payment systems |
| US20050154665A1 (en) | 2002-11-22 | 2005-07-14 | Florida Bankers Association, Inc. | Fraud prevention system |
| US20040111335A1 (en) | 2002-12-04 | 2004-06-10 | Black Charles Ronald | RFID space monitoring and asset inventory system |
| US20040117235A1 (en) | 2002-12-13 | 2004-06-17 | Nachum Shacham | Automated method and system to recommend one or more supplier-side responses to a transaction request |
| US20070072190A1 (en) | 2002-12-16 | 2007-03-29 | Abhinav Aggarwal | System and method for universal identification of biological humans |
| US8538840B2 (en) | 2002-12-20 | 2013-09-17 | Siebel Systems, Inc. | Financial services data model |
| US7246067B2 (en) | 2002-12-26 | 2007-07-17 | Better Dating Bureau, Inc. | Secure online dating support system and method |
| US20040128227A1 (en) | 2002-12-30 | 2004-07-01 | Fannie Mae | Cash flow system and method |
| AU2003291570A1 (en) | 2002-12-30 | 2004-07-29 | Fannie Mae | System and method for creating financial assets |
| AU2003298688A1 (en) | 2002-12-30 | 2004-07-29 | Fannie Mae | System and method for pricing loans in the secondary mortgage market |
| US7360694B2 (en) | 2003-01-23 | 2008-04-22 | Mastercard International Incorporated | System and method for secure telephone and computer transactions using voice authentication |
| SE525511C2 (en) | 2003-01-24 | 2005-03-01 | Comtrack Ab | Anti-theft transponder systems and transmitter device |
| US7636853B2 (en) | 2003-01-30 | 2009-12-22 | Microsoft Corporation | Authentication surety and decay system and method |
| FI117181B (en) | 2003-01-31 | 2006-07-14 | Qitec Technology Group Oy | A method and system for identifying a user's identity |
| US8549590B1 (en) | 2012-07-03 | 2013-10-01 | Lexisnexis Risk Solutions Fl Inc. | Systems and methods for identity authentication using a social network |
| US8682755B2 (en) | 2012-07-03 | 2014-03-25 | Lexisnexis Risk Solutions Fl Inc. | Systems and methods for detecting tax refund fraud |
| US7657540B1 (en) | 2003-02-04 | 2010-02-02 | Seisint, Inc. | Method and system for linking and delinking data records |
| US10438308B2 (en) | 2003-02-04 | 2019-10-08 | Lexisnexis Risk Solutions Fl Inc. | Systems and methods for identifying entities using geographical and social mapping |
| WO2013126281A1 (en) | 2012-02-24 | 2013-08-29 | Lexisnexis Risk Solutions Fl Inc. | Systems and methods for putative cluster analysis |
| US9412141B2 (en) | 2003-02-04 | 2016-08-09 | Lexisnexis Risk Solutions Fl Inc | Systems and methods for identifying entities using geographical and social mapping |
| US20040153330A1 (en) | 2003-02-05 | 2004-08-05 | Fidelity National Financial, Inc. | System and method for evaluating future collateral risk quality of real estate |
| US20040158523A1 (en) | 2003-02-06 | 2004-08-12 | Dort David Bogart | Method providing contingency access to valuable accounts or information |
| US20040158723A1 (en) | 2003-02-06 | 2004-08-12 | Root David C. | Methods for providing high-integrity enrollments into biometric authentication databases |
| US8566190B2 (en) | 2003-02-06 | 2013-10-22 | Goldman, Sachs & Co. | Method and apparatus for evaluating and monitoring collateralized debt obligations |
| US7222072B2 (en) | 2003-02-13 | 2007-05-22 | Sbc Properties, L.P. | Bio-phonetic multi-phrase speaker identity verification |
| US20040230448A1 (en) | 2003-02-14 | 2004-11-18 | William Schaich | System for managing and reporting financial account activity |
| JP2004258940A (en) | 2003-02-26 | 2004-09-16 | Hitachi Ltd | Network monitoring method for information system and operational risk measurement method |
| US7606790B2 (en) | 2003-03-03 | 2009-10-20 | Digimarc Corporation | Integrating and enhancing searching of media content and biometric databases |
| EP1599845A1 (en) | 2003-03-04 | 2005-11-30 | Gamelogic Inc. | User authentication system and method |
| US20040177046A1 (en) | 2003-03-05 | 2004-09-09 | Ogram Mark Ellery | Credit card protection system |
| US7162640B2 (en) | 2003-03-11 | 2007-01-09 | Microsoft Corporation | System and method for protecting identity information |
| US8255978B2 (en) | 2003-03-11 | 2012-08-28 | Innovatrend, Inc. | Verified personal information database |
| US7451113B1 (en) | 2003-03-21 | 2008-11-11 | Mighty Net, Inc. | Card management system and method |
| US6983882B2 (en) | 2003-03-31 | 2006-01-10 | Kepler, Ltd. | Personal biometric authentication and authorization device |
| US20040193538A1 (en) | 2003-03-31 | 2004-09-30 | Raines Walter L. | Receipt processing system and method |
| US20040199462A1 (en) | 2003-04-02 | 2004-10-07 | Ed Starrs | Fraud control method and system for network transactions |
| US7991751B2 (en) | 2003-04-02 | 2011-08-02 | Portauthority Technologies Inc. | Method and a system for information identification |
| US7246740B2 (en) | 2003-04-03 | 2007-07-24 | First Data Corporation | Suspicious persons database |
| US20040204948A1 (en) | 2003-04-09 | 2004-10-14 | Carol Singletary | Internet service for the travel medical professional staffing industry |
| EP1471450A1 (en) | 2003-04-23 | 2004-10-27 | Sap Ag | A computer system for providing credit information data |
| US8082210B2 (en) | 2003-04-29 | 2011-12-20 | The Western Union Company | Authentication for online money transfers |
| JP2004334527A (en) | 2003-05-07 | 2004-11-25 | Intelligent Wave Inc | Fraud determination score value calculation program, fraud determination score value calculation method, and credit card fraud determination score value calculation system |
| US7458508B1 (en) | 2003-05-12 | 2008-12-02 | Id Analytics, Inc. | System and method for identity-based fraud detection |
| US7686214B1 (en) | 2003-05-12 | 2010-03-30 | Id Analytics, Inc. | System and method for identity-based fraud detection using a plurality of historical identity records |
| US7562814B1 (en) | 2003-05-12 | 2009-07-21 | Id Analytics, Inc. | System and method for identity-based fraud detection through graph anomaly detection |
| US8386377B1 (en) | 2003-05-12 | 2013-02-26 | Id Analytics, Inc. | System and method for credit scoring using an identity network connectivity |
| US20040230538A1 (en) | 2003-05-13 | 2004-11-18 | Clifton John William | Identity theft reduction system |
| US20040243518A1 (en) | 2003-05-13 | 2004-12-02 | Clifton John William | Individual identity authentication system |
| US20030225656A1 (en) | 2003-05-14 | 2003-12-04 | Merrill Lynch And Co. Inc. | Financial instruments and methods |
| US7840459B1 (en) | 2003-05-22 | 2010-11-23 | Visa U.S.A. Inc. | Method and apparatus for identity theft prevention |
| US7647344B2 (en) | 2003-05-29 | 2010-01-12 | Experian Marketing Solutions, Inc. | System, method and software for providing persistent entity identification and linking entity information in an integrated data repository |
| US7212995B2 (en) | 2003-06-02 | 2007-05-01 | Transunion L.L.C. | Loan underwriting system and method |
| US7272853B2 (en) | 2003-06-04 | 2007-09-18 | Microsoft Corporation | Origination/destination features and lists for spam prevention |
| US7548886B2 (en) | 2003-06-12 | 2009-06-16 | International Business Machines Corporation | System and method for early detection and prevention of identity theft |
| US7472275B2 (en) | 2003-06-13 | 2008-12-30 | Michael Arnouse | System and method of electronic signature verification |
| US8700515B2 (en) | 2003-06-13 | 2014-04-15 | Dun & Bradstreet, Inc. | Security-to-entity crosswalk |
| WO2004114160A2 (en) | 2003-06-13 | 2004-12-29 | Equifax, Inc. | Systems and processes for automated criteria and attribute generation, searching, auditing and reporting of data |
| US7444518B1 (en) | 2003-06-16 | 2008-10-28 | Microsoft Corporation | Method and apparatus for communicating authorization data |
| US8296229B1 (en) | 2003-06-17 | 2012-10-23 | Citicorp Credit Services, Inc. | Method and system for associating consumers with purchase transactions |
| US20050010780A1 (en) | 2003-07-09 | 2005-01-13 | Kane John Richard | Method and apparatus for providing access to personal information |
| US7647645B2 (en) | 2003-07-23 | 2010-01-12 | Omon Ayodele Edeki | System and method for securing computer system against unauthorized access |
| US20050027983A1 (en) | 2003-08-01 | 2005-02-03 | Klawon Kevin T. | Integrated verification system |
| US20050038726A1 (en) | 2003-08-12 | 2005-02-17 | Ewt, Llc | On-demand defined securitization methods and systems |
| US20040107363A1 (en) | 2003-08-22 | 2004-06-03 | Emergency 24, Inc. | System and method for anticipating the trustworthiness of an internet site |
| WO2005022348A2 (en) | 2003-08-27 | 2005-03-10 | Equifax, Inc. | Application processing and decision systems and processes |
| JP3926778B2 (en) | 2003-08-28 | 2007-06-06 | 株式会社亀田医療情報研究所 | Medical information system and computer program |
| US20080059366A1 (en) | 2003-09-02 | 2008-03-06 | Augustine Fou | Method and system for secure transactions |
| US20050144143A1 (en) | 2003-09-03 | 2005-06-30 | Steven Freiberg | Method and system for identity theft prevention, detection and victim assistance |
| US7835983B2 (en) | 2003-09-18 | 2010-11-16 | Trans Union Llc | Credit approval monitoring system and method |
| US7392534B2 (en) | 2003-09-29 | 2008-06-24 | Gemalto, Inc | System and method for preventing identity theft using a secure computing device |
| US20050075985A1 (en) | 2003-10-03 | 2005-04-07 | Brian Cartmell | Voice authenticated credit card purchase verification |
| US20050081052A1 (en) | 2003-10-10 | 2005-04-14 | Washington Keith Anthony | Global identity protector |
| US7735125B1 (en) | 2003-10-17 | 2010-06-08 | Nexxo Financial, Inc. | Systems and methods for identifying and verifying a user of a kiosk using an external verification system |
| US7225977B2 (en) | 2003-10-17 | 2007-06-05 | Digimarc Corporation | Fraud deterrence in connection with identity documents |
| US7314162B2 (en) | 2003-10-17 | 2008-01-01 | Digimore Corporation | Method and system for reporting identity document usage |
| US7503488B2 (en) | 2003-10-17 | 2009-03-17 | Davis Bruce L | Fraud prevention in issuance of identification credentials |
| US7444306B2 (en) | 2003-10-24 | 2008-10-28 | Thomas Bryan Varble | Method and apparatus for the rental or sale, and secure distribution of digital content |
| US8052040B2 (en) | 2003-10-29 | 2011-11-08 | Stover Merlin D | Negotiable instrument with fraud protection |
| NZ536210A (en) | 2003-10-29 | 2005-07-29 | Vecommerce Ltd | A method of detecting a likelihood of voice identity fraud in a voice access system |
| JP4059321B2 (en) | 2003-10-30 | 2008-03-12 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Personal information management system, information processing system, personal information management method, program, and recording medium |
| US20050097051A1 (en) | 2003-11-05 | 2005-05-05 | Madill Robert P.Jr. | Fraud potential indicator graphical interface |
| US20050097039A1 (en) | 2003-11-05 | 2005-05-05 | Laszlo Kulcsar | Multiple credit card management system |
| US20050102206A1 (en) | 2003-11-07 | 2005-05-12 | Serkan Savasoglu | Systems and methods for contingent obligation retainable deduction securities |
| US8321946B2 (en) | 2003-12-05 | 2012-11-27 | Hewlett-Packard Development Company, L.P. | Method and system for preventing identity theft in electronic communications |
| TWM256569U (en) | 2003-12-09 | 2005-02-01 | Optimum Care Int Tech Inc | Memory module device |
| US20090224889A1 (en) | 2003-12-12 | 2009-09-10 | Abhinav Aggarwal | System and method for universal identity verification of biological humans |
| US7543739B2 (en) | 2003-12-17 | 2009-06-09 | Qsecure, Inc. | Automated payment card fraud detection and location |
| US7360239B2 (en) | 2003-12-19 | 2008-04-15 | International Business Machines Corporation | Biometric multimodal centralized authentication service |
| US8060915B2 (en) | 2003-12-30 | 2011-11-15 | Entrust, Inc. | Method and apparatus for providing electronic message authentication |
| US20050251474A1 (en) | 2003-12-31 | 2005-11-10 | Michael Shinn | Method of financing home ownership for sub prime prospective home buyers |
| JP4069078B2 (en) | 2004-01-07 | 2008-03-26 | 松下電器産業株式会社 | DRAM control device and DRAM control method |
| US20050154671A1 (en) | 2004-01-08 | 2005-07-14 | International Business Machines Corporation | Systems and methods for mitigating identity theft associated with use of credit and debit cards |
| US20050165797A1 (en) | 2004-01-16 | 2005-07-28 | Girish Nair | Profile verification system |
| US9530132B2 (en) | 2004-01-27 | 2016-12-27 | George Chester Cox | System and method for customer video authentication to prevent identity theft |
| GB2426104A (en) | 2004-02-05 | 2006-11-15 | Veritas Mobile Solutions Pte L | System and method for authenticating the identity of a user |
| US10999298B2 (en) | 2004-03-02 | 2021-05-04 | The 41St Parameter, Inc. | Method and system for identifying users and detecting fraud by use of the internet |
| US20060010072A1 (en) | 2004-03-02 | 2006-01-12 | Ori Eisen | Method and system for identifying users and detecting fraud by use of the Internet |
| US7853533B2 (en) | 2004-03-02 | 2010-12-14 | The 41St Parameter, Inc. | Method and system for identifying users and detecting fraud by use of the internet |
| US7708190B2 (en) | 2004-03-10 | 2010-05-04 | At&T Intellectual Property I, L.P. | Multiple options to decline authorization of payment card charges |
| US20050203885A1 (en) | 2004-03-12 | 2005-09-15 | U.S. Bank Corporation | System and method for storing, creating, and organizing financial information electronically |
| US8201257B1 (en) | 2004-03-31 | 2012-06-12 | Mcafee, Inc. | System and method of managing network security risks |
| US8037512B2 (en) | 2004-04-02 | 2011-10-11 | Paradox Technical Solutions Llc | Protection of privacy data |
| US8296573B2 (en) | 2004-04-06 | 2012-10-23 | International Business Machines Corporation | System and method for remote self-enrollment in biometric databases |
| US7433864B2 (en) | 2004-04-08 | 2008-10-07 | At&T Intellectual Property I, L.P. | Compiling information obtained by combinatorial searching |
| AU2004100268B9 (en) | 2004-04-09 | 2004-07-15 | Lockstep Consulting Pty Ltd | Means and method of using cryptographic devices to combat online institution identity theft |
| US7725300B2 (en) | 2004-04-16 | 2010-05-25 | Fortelligent, Inc. | Target profiling in predictive modeling |
| US20050240578A1 (en) | 2004-04-27 | 2005-10-27 | Caseknowledge, L.L.C. | Litigation management system and method of providing the same |
| US20050279827A1 (en) | 2004-04-28 | 2005-12-22 | First Data Corporation | Methods and systems for providing guaranteed merchant transactions |
| US7971246B1 (en) | 2004-04-29 | 2011-06-28 | James A. Roskind | Identity theft countermeasures |
| US20070067297A1 (en) | 2004-04-30 | 2007-03-22 | Kublickis Peter J | System and methods for a micropayment-enabled marketplace with permission-based, self-service, precision-targeted delivery of advertising, entertainment and informational content and relationship marketing to anonymous internet users |
| US7913302B2 (en) | 2004-05-02 | 2011-03-22 | Markmonitor, Inc. | Advanced responses to online fraud |
| US7222779B1 (en) | 2004-05-04 | 2007-05-29 | Juan Ramon Pineda-Sanchez | Security mail box assembly |
| US20050256809A1 (en) | 2004-05-14 | 2005-11-17 | Pasha Sadri | Systems and methods for providing notification and feedback based on electronic payment transactions |
| EP1756995A4 (en) | 2004-05-21 | 2012-05-30 | Emc Corp | System and method of fraud reduction |
| US20090043637A1 (en) | 2004-06-01 | 2009-02-12 | Eder Jeffrey Scott | Extended value and risk management system |
| US20050273333A1 (en) | 2004-06-02 | 2005-12-08 | Philippe Morin | Speaker verification for security systems with mixed mode machine-human authentication |
| US7720734B2 (en) | 2004-06-04 | 2010-05-18 | Black Diamond Capital Management, L.L.C. | Managing an investment vehicle |
| WO2005125092A1 (en) | 2004-06-09 | 2005-12-29 | John Michael Taylor | Identity verification system |
| US7272728B2 (en) | 2004-06-14 | 2007-09-18 | Iovation, Inc. | Network security and fraud detection system and method |
| US8842887B2 (en) | 2004-06-14 | 2014-09-23 | Rodney Beatson | Method and system for combining a PIN and a biometric sample to provide template encryption and a trusted stand-alone computing device |
| WO2005124677A2 (en) | 2004-06-14 | 2005-12-29 | Dun & Bradstreet | System and method for self-monitoring credit information |
| US20050279869A1 (en) | 2004-06-16 | 2005-12-22 | Kevin Barklage | Portable shredder |
| US7386448B1 (en) | 2004-06-24 | 2008-06-10 | T-Netix, Inc. | Biometric voice authentication |
| US8346593B2 (en) | 2004-06-30 | 2013-01-01 | Experian Marketing Solutions, Inc. | System, method, and software for prediction of attitudinal and message responsiveness |
| US7490356B2 (en) | 2004-07-20 | 2009-02-10 | Reflectent Software, Inc. | End user risk management |
| CA2617235A1 (en) | 2004-08-06 | 2006-02-16 | Entaire Global Intellectual Property, Inc. | Computer system for actively monitoring and enhancing the collateral security for a portfolio of loans to facilitate financing and securitization |
| US6955294B1 (en) | 2004-08-06 | 2005-10-18 | Mark Seegar | Apparatus and method for preventing credit card fraud |
| US7467401B2 (en) | 2004-08-12 | 2008-12-16 | Avatier Corporation | User authentication without prior user enrollment |
| US7774270B1 (en) | 2004-08-19 | 2010-08-10 | Maccloskey Randy | Credit report lock system |
| US20060041464A1 (en) | 2004-08-19 | 2006-02-23 | Transunion Llc. | System and method for developing an analytic fraud model |
| WO2006039003A2 (en) | 2004-08-20 | 2006-04-13 | Viisage Technology, Inc. | Method and system to authenticate an object |
| US20070093234A1 (en) | 2004-08-20 | 2007-04-26 | Willis John A | Identify theft protection and notification system |
| US20060080263A1 (en) | 2004-10-13 | 2006-04-13 | Willis John A | Identity theft protection and notification system |
| US20060045105A1 (en) | 2004-08-25 | 2006-03-02 | Dobosz Paul J | System and method for using a utility meter |
| US20060047605A1 (en) | 2004-08-27 | 2006-03-02 | Omar Ahmad | Privacy management method and apparatus |
| ZA200702524B (en) | 2004-09-13 | 2009-02-25 | Ixept Inc | Purchasing alert methods and apparatus |
| US20060059073A1 (en) | 2004-09-15 | 2006-03-16 | Walzak Rebecca B | System and method for analyzing financial risk |
| US7543740B2 (en) | 2004-09-17 | 2009-06-09 | Digital Envoy, Inc. | Fraud analyst smart cookie |
| US7497374B2 (en) | 2004-09-17 | 2009-03-03 | Digital Envoy, Inc. | Fraud risk advisor |
| US20060064374A1 (en) | 2004-09-17 | 2006-03-23 | David Helsper | Fraud risk advisor |
| US8065525B2 (en) | 2004-09-22 | 2011-11-22 | Bekad Mgmt. Ii, Llc | Device with built-in user authentication and method for user authentication and identity theft protection |
| US20060074798A1 (en) | 2004-09-27 | 2006-04-06 | Din Khaja M | Financial instrument, system, and method for electronic commerce transactions |
| US8056128B1 (en) | 2004-09-30 | 2011-11-08 | Google Inc. | Systems and methods for detecting potential communications fraud |
| US20060136332A1 (en) | 2004-10-01 | 2006-06-22 | Robert Ziegler | System and method for electronic check verification over a network |
| US20060089905A1 (en) | 2004-10-26 | 2006-04-27 | Yuh-Shen Song | Credit and identity protection network |
| US8204774B2 (en) | 2004-10-29 | 2012-06-19 | American Express Travel Related Services Company, Inc. | Estimating the spend capacity of consumer households |
| US7912770B2 (en) | 2004-10-29 | 2011-03-22 | American Express Travel Related Services Company, Inc. | Method and apparatus for consumer interaction based on spend capacity |
| US8543499B2 (en) | 2004-10-29 | 2013-09-24 | American Express Travel Related Services Company, Inc. | Reducing risks related to check verification |
| US20070016500A1 (en) | 2004-10-29 | 2007-01-18 | American Express Travel Related Services Co., Inc. A New York Corporation | Using commercial share of wallet to determine insurance risk |
| US8326671B2 (en) | 2004-10-29 | 2012-12-04 | American Express Travel Related Services Company, Inc. | Using commercial share of wallet to analyze vendors in online marketplaces |
| US7610243B2 (en) | 2004-10-29 | 2009-10-27 | American Express Travel Related Services Company, Inc. | Method and apparatus for rating asset-backed securities |
| US20060106605A1 (en) | 2004-11-12 | 2006-05-18 | Saunders Joseph M | Biometric record management |
| US20060202012A1 (en) | 2004-11-12 | 2006-09-14 | David Grano | Secure data processing system, such as a system for detecting fraud and expediting note processing |
| US7298873B2 (en) | 2004-11-16 | 2007-11-20 | Imageware Systems, Inc. | Multimodal biometric platform |
| WO2006055630A2 (en) | 2004-11-16 | 2006-05-26 | Health Dialog Data Service, Inc. | Systems and methods for predicting healthcare related risk events and financial risk |
| US20060122939A1 (en) | 2004-11-19 | 2006-06-08 | Cohen Mark S | System and method for generating and verifying application licenses |
| WO2006062998A2 (en) | 2004-12-07 | 2006-06-15 | Farsheed Atef | System and method for identity verification and management |
| GB0427205D0 (en) | 2004-12-11 | 2005-01-12 | Ncr Int Inc | Biometric system |
| US7480631B1 (en) | 2004-12-15 | 2009-01-20 | Jpmorgan Chase Bank, N.A. | System and method for detecting and processing fraud and credit abuse |
| US7877304B1 (en) | 2004-12-16 | 2011-01-25 | Coulter David B | System and method for managing consumer information |
| US20060131390A1 (en) | 2004-12-16 | 2006-06-22 | Kim Mike I | Method and system for providing transaction notification and mobile reply authorization |
| US20060178971A1 (en) | 2004-12-20 | 2006-08-10 | Owen John S | Personal credit management and monitoring system and method |
| US20060149674A1 (en) | 2004-12-30 | 2006-07-06 | Mike Cook | System and method for identity-based fraud detection for transactions using a plurality of historical identity records |
| US7581112B2 (en) | 2004-12-30 | 2009-08-25 | Ebay, Inc. | Identifying fraudulent activities and the perpetrators thereof |
| US20050086161A1 (en) | 2005-01-06 | 2005-04-21 | Gallant Stephen I. | Deterrence of phishing and other identity theft frauds |
| US20060153346A1 (en) | 2005-01-11 | 2006-07-13 | Metro Enterprises, Inc. | On-line authentication registration system |
| US20060173792A1 (en) | 2005-01-13 | 2006-08-03 | Glass Paul H | System and method for verifying the age and identity of individuals and limiting their access to appropriate material |
| US20060173776A1 (en) | 2005-01-28 | 2006-08-03 | Barry Shalley | A Method of Authentication |
| US20060195351A1 (en) | 2005-02-07 | 2006-08-31 | Bagrat Bayburtian | Internet-based system and method for leasing rental property to a prospective tenant based on criminal history |
| US7533808B2 (en) | 2005-02-09 | 2009-05-19 | Yuh-Shen Song | Privacy protected cooperation network |
| JP4672003B2 (en) | 2005-02-18 | 2011-04-20 | 富士通株式会社 | Voice authentication system |
| US7584503B1 (en) | 2005-02-22 | 2009-09-01 | Juniper Networks, Inc. | Federating trust in a heterogeneous network |
| US7734523B1 (en) | 2005-03-03 | 2010-06-08 | Federal Home Loan Mortgage Corporation (Freddie Mac) | Method, system, and computer program product for grading a collateralized mortgage obligation or other asset-backed security |
| US8813181B2 (en) | 2005-03-07 | 2014-08-19 | Taun Eric Willis | Electronic verification systems |
| US7314167B1 (en) | 2005-03-08 | 2008-01-01 | Pisafe, Inc. | Method and apparatus for providing secure identification, verification and authorization |
| US7983979B2 (en) | 2005-03-10 | 2011-07-19 | Debix One, Inc. | Method and system for managing account information |
| US20060212386A1 (en) | 2005-03-15 | 2006-09-21 | Willey Dawn M | Credit scoring method and system |
| US7676433B1 (en) | 2005-03-24 | 2010-03-09 | Raf Technology, Inc. | Secure, confidential authentication with private data |
| US9547780B2 (en) | 2005-03-28 | 2017-01-17 | Absolute Software Corporation | Method for determining identification of an electronic device |
| US20060229961A1 (en) | 2005-04-08 | 2006-10-12 | Efunds Corporation | Risk evaluation method and system using ACH data |
| US20060253358A1 (en) | 2005-04-08 | 2006-11-09 | David Delgrosso | System and method for identifying and managing customers in a financial institution |
| US7908242B1 (en) | 2005-04-11 | 2011-03-15 | Experian Information Solutions, Inc. | Systems and methods for optimizing database queries |
| US7802723B2 (en) | 2005-04-19 | 2010-09-28 | American Exrpess Travel Related Services Company, Inc. | System and method for nameless biometric authentication and non-repudiation validation |
| US7630924B1 (en) | 2005-04-20 | 2009-12-08 | Authorize.Net Llc | Transaction velocity counting for fraud detection |
| US8924285B2 (en) | 2005-04-21 | 2014-12-30 | Verint Americas Inc. | Building whitelists comprising voiceprints not associated with fraud and screening calls using a combination of a whitelist and blacklist |
| US20060239512A1 (en) | 2005-04-22 | 2006-10-26 | Imme, Llc | Anti-identity theft system and method |
| US7522060B1 (en) | 2005-04-25 | 2009-04-21 | Anytransactions, Inc. | Graduated sanction/progressive response system and method for automated monitoring, scheduling and notification |
| US7779456B2 (en) | 2005-04-27 | 2010-08-17 | Gary M Dennis | System and method for enhanced protection and control over the use of identity |
| US8566726B2 (en) | 2005-05-03 | 2013-10-22 | Mcafee, Inc. | Indicating website reputations based on website handling of personal information |
| US20070078908A1 (en) | 2005-05-17 | 2007-04-05 | Santu Rohatgi | Method and system for child safety |
| US20060265243A1 (en) | 2005-05-20 | 2006-11-23 | Jeffrey Racho | System and method for establishing or verifying a person's identity using SMS and MMS over a wireless communications network |
| US7853518B2 (en) | 2005-05-24 | 2010-12-14 | Corelogic Information Solutions, Inc. | Method and apparatus for advanced mortgage diagnostic analytics |
| US7707163B2 (en) | 2005-05-25 | 2010-04-27 | Experian Marketing Solutions, Inc. | Software and metadata structures for distributed and interactive database architecture for parallel and asynchronous data processing of complex data and for real-time query processing |
| US8510329B2 (en) | 2005-05-25 | 2013-08-13 | Experian Marketing Solutions, Inc. | Distributed and interactive database architecture for parallel and asynchronous data processing of complex data and for real-time query processing |
| US20060271633A1 (en) | 2005-05-25 | 2006-11-30 | Adler Robert M | Geographically specific broadcasting system providing advisory alerts of sexual predators |
| US20060271457A1 (en) | 2005-05-26 | 2006-11-30 | Romain Martin R | Identity theft monitoring and prevention |
| US10643217B2 (en) | 2005-05-26 | 2020-05-05 | Efunds Corporation | Debit-based identity theft monitoring and prevention |
| US7536304B2 (en) | 2005-05-27 | 2009-05-19 | Porticus, Inc. | Method and system for bio-metric voice print authentication |
| US20060282395A1 (en) | 2005-05-30 | 2006-12-14 | Joe Leibowitz | Methods for using a mobile communications device in consumer, medical and law enforcement transactions |
| JP2008543233A (en) | 2005-06-01 | 2008-11-27 | フェア・アイザック・コーポレイション | Network maintenance analysis system |
| WO2006130874A2 (en) | 2005-06-02 | 2006-12-07 | Fair Isaac Corporation | Comprehensive identity protection system |
| US20060277043A1 (en) | 2005-06-06 | 2006-12-07 | Edward Tomes | Voice authentication system and methods therefor |
| US20060282372A1 (en) | 2005-06-09 | 2006-12-14 | Endres Timothy G | Method to secure credit card information stored electronically |
| US8028329B2 (en) | 2005-06-13 | 2011-09-27 | Iamsecureonline, Inc. | Proxy authentication network |
| US7343149B2 (en) | 2005-06-13 | 2008-03-11 | Lucent Technologies Inc. | Network support for credit card notification |
| US20070047770A1 (en) | 2005-06-13 | 2007-03-01 | Swope Guy G | Multiple biometrics enrollment and verification system |
| CN1881877A (en) | 2005-06-16 | 2006-12-20 | 国际商业机器公司 | Method, device and system for preventing illegal subscriber log-on |
| US20060287764A1 (en) | 2005-06-20 | 2006-12-21 | Kraft Harold H | Privacy Information Reporting Systems Event Classification and Reporting |
| WO2007002196A2 (en) | 2005-06-21 | 2007-01-04 | Corestreet, Ltd. | Preventing identity theft |
| TW200701732A (en) | 2005-06-21 | 2007-01-01 | Ite2 Technology Inc | Method and system for verifying personal identity in internet trades |
| US7290704B1 (en) | 2005-06-21 | 2007-11-06 | Robert Ball | Method and system relating to a multi-lateral trade engine for payment transactions |
| US20070110282A1 (en) | 2005-06-23 | 2007-05-17 | Millsapp Deena L | Protecting social security numbers from identity theft |
| US7761379B2 (en) | 2005-06-24 | 2010-07-20 | Fair Isaac Corporation | Mass compromise/point of compromise analytic detection and compromised card portfolio management system |
| US7676418B1 (en) | 2005-06-24 | 2010-03-09 | Experian Information Solutions, Inc. | Credit portfolio benchmarking system and method |
| US20060294023A1 (en) | 2005-06-25 | 2006-12-28 | Lu Hongqian K | System and method for secure online transactions using portable secure network devices |
| EP3617979B1 (en) | 2005-06-27 | 2023-03-01 | The 41st Parameter, Inc. | Method and system for identifying users and detecting fraud by use of the internet |
| US7578438B2 (en) | 2005-07-15 | 2009-08-25 | Revolution Money Inc. | System and method for user selection of fraud detection rules |
| US20070016521A1 (en) | 2005-07-15 | 2007-01-18 | Zhiping Wang | Data processing system for a billing address-based credit watch |
| US20070016522A1 (en) | 2005-07-15 | 2007-01-18 | Zhiping Wang | Data processing system for a billing address-based credit watch |
| US20070022141A1 (en) | 2005-07-19 | 2007-01-25 | Singleton Shawn D | System and method for acquiring and assembling real property data |
| US7747520B2 (en) | 2005-08-05 | 2010-06-29 | First American Corelogic, Inc. | Method and system for monitoring for and reporting of lien distress events |
| US7832006B2 (en) | 2005-08-09 | 2010-11-09 | At&T Intellectual Property I, L.P. | System and method for providing network security |
| US7860805B2 (en) | 2005-08-15 | 2010-12-28 | Personal Estate Manager, Inc. | Computer-implemented personal information manager method and system |
| US20070043577A1 (en) * | 2005-08-16 | 2007-02-22 | Sheldon Kasower | Apparatus and method of enabling a victim of identity theft to resolve and prevent fraud |
| US7984849B2 (en) | 2005-08-16 | 2011-07-26 | University of Nevada, Las Vegas | Portable magnetic stripe reader for criminality security applications |
| US20070059442A1 (en) | 2005-08-16 | 2007-03-15 | Anton Sabeta | Method & System for Color Matching |
| US20070040017A1 (en) | 2005-08-22 | 2007-02-22 | Douglas Kozlay | Wireless biometric cardholder apparatus, method, & system |
| US8069256B2 (en) | 2005-08-23 | 2011-11-29 | Mehran Randall Rasti | System and method to curb identity theft |
| US20070048765A1 (en) | 2005-08-24 | 2007-03-01 | Abramson Fredric D | Use of genetic information for identity authentication |
| US9313307B2 (en) | 2005-09-01 | 2016-04-12 | Xtone Networks, Inc. | System and method for verifying the identity of a user by voiceprint analysis |
| US20080208726A1 (en) | 2005-09-02 | 2008-08-28 | Intersections, Inc. | Method and system for securing credit accounts |
| WO2007028048A2 (en) | 2005-09-02 | 2007-03-08 | Fair Isaac Corporation | Systems and methods for detecting fraud |
| US7333635B2 (en) | 2005-09-02 | 2008-02-19 | Intersections Inc. | Method and system for confirming personal identity |
| US20070109103A1 (en) | 2005-09-07 | 2007-05-17 | California Institute Of Technology | Commercial product activation and monitoring using radio frequency identification (RFID) technology |
| US7689007B2 (en) | 2005-09-16 | 2010-03-30 | Privacy Card, Llc | Methods and systems for protection of identity |
| GB0519424D0 (en) | 2005-09-23 | 2005-11-02 | Smithies Christopher P K | Method and system for verification of personal identity |
| US7788184B2 (en) | 2005-09-23 | 2010-08-31 | Kane Larry J | Method for preventing identity theft |
| US8019130B2 (en) | 2005-09-30 | 2011-09-13 | Aletto Mark V | Collectable fingerprinted apparatus and methods |
| US7668769B2 (en) | 2005-10-04 | 2010-02-23 | Basepoint Analytics, LLC | System and method of detecting fraud |
| US8719106B2 (en) | 2005-10-07 | 2014-05-06 | Kemesa Inc. | Identity theft and fraud protection system and method |
| US8396747B2 (en) | 2005-10-07 | 2013-03-12 | Kemesa Inc. | Identity theft and fraud protection system and method |
| US20070100774A1 (en) | 2005-10-14 | 2007-05-03 | Jerry Abdon | Method of providing identity theft protection |
| WO2007047901A2 (en) | 2005-10-18 | 2007-04-26 | Lacy Kolo | Credit fraud prevention systems and methods |
| US7340042B2 (en) | 2005-10-21 | 2008-03-04 | Voiceverified, Inc. | System and method of subscription identity authentication utilizing multiple factors |
| US7672865B2 (en) | 2005-10-21 | 2010-03-02 | Fair Isaac Corporation | Method and apparatus for retail data mining using pair-wise co-occurrence consistency |
| US20080228635A1 (en) | 2005-10-24 | 2008-09-18 | Megdal Myles G | Reducing risks related to check verification |
| US20080243680A1 (en) | 2005-10-24 | 2008-10-02 | Megdal Myles G | Method and apparatus for rating asset-backed securities |
| US8069485B2 (en) | 2005-10-25 | 2011-11-29 | Novell, Inc. | Techniques to pollute electronic profiling |
| US8346638B2 (en) | 2005-10-26 | 2013-01-01 | Capital One Financial Corporation | Systems and methods for processing transaction data to perform a merchant chargeback |
| WO2007053630A2 (en) | 2005-10-31 | 2007-05-10 | Dun & Bradstreet, Inc. | System and method for providing a fraud risk score |
| US20070107050A1 (en) | 2005-11-07 | 2007-05-10 | Jexp, Inc. | Simple two-factor authentication |
| US7860783B2 (en) | 2005-11-07 | 2010-12-28 | Fair Isaac Corporation | Account-level fraud detector and associated methods |
| US20070106611A1 (en) | 2005-11-09 | 2007-05-10 | Larsen Christian P | Method and system for preventing identity theft and providing credit independent completion of transactions |
| CA2527538A1 (en) | 2005-11-12 | 2007-05-14 | Matt Celano | Method and apparatus for a consumer interactive credit report analysis and score reconciliation adaptive education and counseling system |
| WO2008054403A2 (en) | 2005-11-15 | 2008-05-08 | Probity Laboratories, Llc | Systems and methods for identifying, categorizing, quantifying and evaluating risks |
| EP1952363A1 (en) | 2005-11-24 | 2008-08-06 | Consensum As | Method for handling of a bank note and system therefore |
| US20070266439A1 (en) | 2005-11-30 | 2007-11-15 | Harold Kraft | Privacy management and transaction system |
| US20060179004A1 (en) | 2005-12-07 | 2006-08-10 | BIll Fuchs | BioMetric PayPoint System |
| US20070180263A1 (en) | 2005-12-16 | 2007-08-02 | David Delgrosso | Identification and remote network access using biometric recognition |
| US7466235B1 (en) | 2005-12-30 | 2008-12-16 | Kenneth Allen Kolb | Wireless device with emergency medical and related information |
| US20070155411A1 (en) | 2006-01-04 | 2007-07-05 | James Morrison | Interactive mobile messaging system |
| US7644868B2 (en) | 2006-01-05 | 2010-01-12 | Hare William D | User identity security system for computer-based account access |
| US8280805B1 (en) | 2006-01-10 | 2012-10-02 | Sas Institute Inc. | Computer-implemented risk evaluation systems and methods |
| US20070168480A1 (en) | 2006-01-13 | 2007-07-19 | Microsoft Corporation | Interactive Robot Creation |
| US7917715B2 (en) | 2006-01-28 | 2011-03-29 | Tallman Jr Leon C | Internet-safe computer |
| US20070179903A1 (en) | 2006-01-30 | 2007-08-02 | Microsoft Corporation | Identity theft mitigation |
| US7664691B2 (en) | 2006-02-01 | 2010-02-16 | Intuit Inc. | Method and apparatus for facilitating financial monitoring by guardians |
| US20070186276A1 (en) | 2006-02-09 | 2007-08-09 | Mcrae Matthew | Auto-detection and notification of access point identity theft |
| US8374973B2 (en) | 2006-02-16 | 2013-02-12 | Microsoft Corporation | Reputation system |
| WO2007101040A2 (en) | 2006-02-22 | 2007-09-07 | First American Corelogic Holdings, Inc. | System and method for monitoring events associated with a person or property |
| US8567669B2 (en) | 2006-02-24 | 2013-10-29 | Fair Isaac Corporation | Method and apparatus for a merchant profile builder |
| US9996880B2 (en) | 2006-02-28 | 2018-06-12 | Intersections, Inc. | Method and system for preventing and detecting identity theft |
| US20070220594A1 (en) | 2006-03-04 | 2007-09-20 | Tulsyan Surendra K | Software based Dynamic Key Generator for Multifactor Authentication |
| US20070214037A1 (en) | 2006-03-10 | 2007-09-13 | Eric Shubert | System and method of obtaining and using anonymous data |
| US7711636B2 (en) | 2006-03-10 | 2010-05-04 | Experian Information Solutions, Inc. | Systems and methods for analyzing data |
| US20070214365A1 (en) | 2006-03-13 | 2007-09-13 | Cornett John D | Document repository |
| US7761384B2 (en) | 2006-03-16 | 2010-07-20 | Sushil Madhogarhia | Strategy-driven methodology for reducing identity theft |
| US7587348B2 (en) | 2006-03-24 | 2009-09-08 | Basepoint Analytics Llc | System and method of detecting mortgage related fraud |
| US20070233614A1 (en) | 2006-03-30 | 2007-10-04 | Early Warning Services, Llc | Management of biometric information |
| US8151327B2 (en) | 2006-03-31 | 2012-04-03 | The 41St Parameter, Inc. | Systems and methods for detection of session tampering and fraud prevention |
| US20080022414A1 (en) | 2006-03-31 | 2008-01-24 | Robert Cahn | System and method of providing unique personal identifiers for use in the anonymous and secure exchange of data |
| WO2007120844A2 (en) | 2006-04-12 | 2007-10-25 | Chimento Marc A | System and method for screening for fraud in commercial transactions |
| US7552467B2 (en) | 2006-04-24 | 2009-06-23 | Jeffrey Dean Lindsay | Security systems for protecting an asset |
| US8607044B2 (en) | 2006-04-25 | 2013-12-10 | Verisign, Inc. | Privacy enhanced identity scheme using an un-linkable identifier |
| US20070282729A1 (en) | 2006-05-01 | 2007-12-06 | Carpenter Steven A | Consolidation, sharing and analysis of investment information |
| US20070288360A1 (en) | 2006-05-03 | 2007-12-13 | Joseph Guy Seeklus | Systems and methods for determining whether candidates are qualified for desired situations based on credit scores |
| EP2021996A2 (en) | 2006-05-05 | 2009-02-11 | Securant Inc. | Securing card transactions |
| WO2007133502A2 (en) | 2006-05-08 | 2007-11-22 | Tele Communication Systems, Inc. | Location input mistake correction |
| WO2007133799A2 (en) | 2006-05-15 | 2007-11-22 | Fair Isaac Corporation | Comprehensive online fraud detection system and method |
| US20070288355A1 (en) | 2006-05-26 | 2007-12-13 | Bruce Roland | Evaluating customer risk |
| US7668921B2 (en) | 2006-05-30 | 2010-02-23 | Xerox Corporation | Method and system for phishing detection |
| US7844520B1 (en) | 2006-05-31 | 2010-11-30 | Intuit Inc. | Method and apparatus for monitoring credit reports using a computing system implemented financial management system |
| US20070288559A1 (en) | 2006-06-08 | 2007-12-13 | Walter Parsadayan | Matching Website with Context Sensitive Profiling |
| US20070291995A1 (en) | 2006-06-09 | 2007-12-20 | Rivera Paul G | System, Method, and Apparatus for Preventing Identity Fraud Associated With Payment and Identity Cards |
| US8285636B2 (en) | 2006-06-14 | 2012-10-09 | Curry Edith L | Methods of monitoring behavior/activity of an individual associated with an organization |
| US7792864B1 (en) | 2006-06-14 | 2010-09-07 | TransUnion Teledata, L.L.C. | Entity identification and/or association using multiple data elements |
| US20070294104A1 (en) | 2006-06-15 | 2007-12-20 | Carmeli Boaz | System, Method, and Means, to Detect and Prevent Fraudulent Medical Insurance Claims |
| US20070299759A1 (en) | 2006-06-19 | 2007-12-27 | Keith Kelly | Hybrid mortgage-backed investment vehicles and a method and system for hybrid mortgage-backed investment vehicles |
| US10152736B2 (en) | 2006-07-06 | 2018-12-11 | Fair Isaac Corporation | Auto adaptive anomaly detection system for streams |
| US8615800B2 (en) | 2006-07-10 | 2013-12-24 | Websense, Inc. | System and method for analyzing web content |
| US8069084B2 (en) | 2006-07-14 | 2011-11-29 | Wells Fargo Bank, N.A. | Customer controlled account, system, and process |
| US20080015887A1 (en) | 2006-07-14 | 2008-01-17 | Aegon Direct Marketing Services, Inc. | System and process for enrollment and sales |
| US7860769B2 (en) | 2006-07-26 | 2010-12-28 | Benson Tracey M | Method of preventing fraud |
| US20080066188A1 (en) | 2006-08-08 | 2008-03-13 | Dusic Kwak | Identity verification system |
| JP4816321B2 (en) | 2006-08-14 | 2011-11-16 | ソニー株式会社 | Authentication apparatus, authentication method, and program |
| US20090021349A1 (en) | 2007-07-19 | 2009-01-22 | Stephen Errico | Method to record and authenticate a participant's biometric identification of an event via a network |
| US8321342B2 (en) | 2006-08-28 | 2012-11-27 | Choicepay, Inc. | Method and system to accept and settle transaction payments for an unbanked consumer |
| US8799148B2 (en) | 2006-08-31 | 2014-08-05 | Rohan K. K. Chandran | Systems and methods of ranking a plurality of credit card offers |
| US20080059236A1 (en) | 2006-08-31 | 2008-03-06 | Cartier Joseph C | Emergency medical information device |
| US7848987B2 (en) | 2006-09-01 | 2010-12-07 | Cabot Research, Llc | Determining portfolio performance measures by weight-based action detection |
| US20080059364A1 (en) | 2006-09-01 | 2008-03-06 | Tidwell Lisa C | Systems and methods for performing a financial trustworthiness assessment |
| US20090079539A1 (en) | 2006-09-12 | 2009-03-26 | Linsley A. Johnson | JSI Key |
| US8321524B2 (en) | 2006-09-15 | 2012-11-27 | General Motors Llc | Method for obtaining electronic vehicle identification number (VIN) |
| US8027439B2 (en) | 2006-09-18 | 2011-09-27 | Fair Isaac Corporation | Self-calibrating fraud detection |
| US20080077526A1 (en) | 2006-09-20 | 2008-03-27 | First Data Corporation | Online payer authorization systems and methods |
| US7995994B2 (en) | 2006-09-22 | 2011-08-09 | Kineto Wireless, Inc. | Method and apparatus for preventing theft of service in a communication system |
| US7912865B2 (en) | 2006-09-26 | 2011-03-22 | Experian Marketing Solutions, Inc. | System and method for linking multiple entities in a business database |
| EP2103082A2 (en) | 2006-10-03 | 2009-09-23 | ViaSat, Inc. | Multi-service provider authentication |
| US7752554B2 (en) | 2006-10-05 | 2010-07-06 | Microsoft Corporation | Bot identification and control |
| US8239677B2 (en) | 2006-10-10 | 2012-08-07 | Equifax Inc. | Verification and authentication systems and methods |
| US7801811B1 (en) | 2006-10-10 | 2010-09-21 | United Services Automobile Association (Usaa) | Methods of and systems for money laundering risk assessment |
| US7805362B1 (en) | 2006-10-10 | 2010-09-28 | United Services Automobile Association (Usaa) | Methods of and systems for money laundering risk assessment |
| US20080104672A1 (en) | 2006-10-25 | 2008-05-01 | Iovation, Inc. | Detecting and preventing man-in-the-middle phishing attacks |
| GB0621189D0 (en) | 2006-10-25 | 2006-12-06 | Payfont Ltd | Secure authentication and payment system |
| US20080103800A1 (en) | 2006-10-25 | 2008-05-01 | Domenikos Steven D | Identity Protection |
| US8359278B2 (en) | 2006-10-25 | 2013-01-22 | IndentityTruth, Inc. | Identity protection |
| US20080103798A1 (en) | 2006-10-25 | 2008-05-01 | Domenikos Steven D | Identity Protection |
| US20080104021A1 (en) | 2006-10-30 | 2008-05-01 | Yigang Cai | Systems and methods for controlling access to online personal information |
| US20080103811A1 (en) | 2006-11-01 | 2008-05-01 | Nestor Sosa | Postal security system |
| US7752236B2 (en) | 2006-11-03 | 2010-07-06 | Experian Marketing Solutions, Inc. | Systems and methods of enhancing leads |
| US8060916B2 (en) | 2006-11-06 | 2011-11-15 | Symantec Corporation | System and method for website authentication using a shared secret |
| US8752181B2 (en) | 2006-11-09 | 2014-06-10 | Touchnet Information Systems, Inc. | System and method for providing identity theft security |
| US8256006B2 (en) | 2006-11-09 | 2012-08-28 | Touchnet Information Systems, Inc. | System and method for providing identity theft security |
| US8145708B2 (en) | 2006-11-10 | 2012-03-27 | Microsoft Corporation | On-line virtual robot (bot) security agent |
| US7856494B2 (en) | 2006-11-14 | 2010-12-21 | Fmr Llc | Detecting and interdicting fraudulent activity on a network |
| US20080120237A1 (en) | 2006-11-20 | 2008-05-22 | Chung-Yu Lin | Method for prevent crime of finance service system using telephone number codes and identification code |
| US20080126233A1 (en) | 2006-11-29 | 2008-05-29 | Verizon Services Organization Inc. | Purchase notification system |
| US7778885B1 (en) | 2006-12-04 | 2010-08-17 | Lower My Bills, Inc. | System and method of enhancing leads |
| US8612320B2 (en) | 2006-12-14 | 2013-12-17 | Corelogic Solutions, Llc | Method and apparatus for detecting fraudulent loans |
| US20090187507A1 (en) | 2006-12-20 | 2009-07-23 | Brown Kerry D | Secure financial transaction network |
| US20080154758A1 (en) | 2006-12-21 | 2008-06-26 | Friedrich Schattmaier | Systems and methods for maintaining credit information about an entity |
| US8516439B2 (en) | 2006-12-27 | 2013-08-20 | Iovation, Inc. | Visualizing object relationships |
| US20080162202A1 (en) | 2006-12-29 | 2008-07-03 | Richendra Khanna | Detecting inappropriate activity by analysis of user interactions |
| US8280978B2 (en) | 2006-12-29 | 2012-10-02 | Prodea Systems, Inc. | Demarcation between service provider and user in multi-services gateway device at user premises |
| US20080162383A1 (en) | 2007-01-02 | 2008-07-03 | Kraft Harold H | Methods, systems, and apparatus for lowering the incidence of identity theft in consumer credit transactions |
| US20080167883A1 (en) | 2007-01-05 | 2008-07-10 | Ramin Thavildar Khazaneh | Method and System for Monitoring and Protecting Real Estate Title (Ownership) Against Fraudulent Transaction (Title Theft) and Mortgage Fraud |
| US20080168001A1 (en) | 2007-01-05 | 2008-07-10 | Kagarlis Marios A | Price Indexing |
| US7933835B2 (en) | 2007-01-17 | 2011-04-26 | The Western Union Company | Secure money transfer systems and methods using biometric keys associated therewith |
| US8239325B2 (en) | 2007-01-18 | 2012-08-07 | Paymentone Corporation | Method and system to verify the identity of a user |
| US8209381B2 (en) | 2007-01-19 | 2012-06-26 | Yahoo! Inc. | Dynamic combatting of SPAM and phishing attacks |
| US20080177655A1 (en) | 2007-01-23 | 2008-07-24 | David Zalik | Systems and methods of underwriting business credit |
| US20080189789A1 (en) | 2007-02-01 | 2008-08-07 | Elaine Lamontagne | System, method and apparatus for the detection and capturing of technological crime instances |
| US7805391B2 (en) | 2007-02-26 | 2010-09-28 | International Business Machines Corporation | Inference of anomalous behavior of members of cohorts and associate actors related to the anomalous behavior |
| US20080208548A1 (en) | 2007-02-27 | 2008-08-28 | Transunion Interactive, Inc., A Delaware Corporation | Credit Report-Based Predictive Models |
| US20080208610A1 (en) | 2007-02-28 | 2008-08-28 | Nicholas Arthur Thomas | Methods and Systems for Script Operations Management |
| US20080217400A1 (en) | 2007-03-06 | 2008-09-11 | Portano Michael D | System for preventing fraudulent purchases and identity theft |
| US8032449B2 (en) | 2007-03-08 | 2011-10-04 | Soft Route Corporation | Method of processing online payments with fraud analysis and management system |
| US20080256613A1 (en) | 2007-03-13 | 2008-10-16 | Grover Noel J | Voice print identification portal |
| US8042159B2 (en) | 2007-03-15 | 2011-10-18 | Glynntech, Inc. | Website log in system with user friendly combination lock |
| US8116731B2 (en) | 2007-11-01 | 2012-02-14 | Finsphere, Inc. | System and method for mobile identity protection of a user of multiple computer applications, networks or devices |
| US7853998B2 (en) | 2007-03-22 | 2010-12-14 | Mocana Corporation | Firewall propagation |
| US8347365B2 (en) | 2007-03-29 | 2013-01-01 | Cardiac Pacemakers, Inc. | System and method for confirming identity and authority by a patient medical device |
| US20090048957A1 (en) | 2007-04-02 | 2009-02-19 | Matthew Celano | Method and system for financial counseling |
| US8955122B2 (en) | 2007-04-04 | 2015-02-10 | Sri International | Method and apparatus for detecting malware infection |
| US7975299B1 (en) | 2007-04-05 | 2011-07-05 | Consumerinfo.Com, Inc. | Child identity monitor |
| AU2008239682B2 (en) | 2007-04-12 | 2012-01-19 | Kroll Information Assurance, Llc | A system and method for creating a list of shared information on a peer-to-peer network |
| US20080255922A1 (en) | 2007-04-12 | 2008-10-16 | Jon Feldman | Preferred cost bidding for online advertising |
| US7742982B2 (en) | 2007-04-12 | 2010-06-22 | Experian Marketing Solutions, Inc. | Systems and methods for determining thin-file records and determining thin-file risk levels |
| CN101291329A (en) | 2007-04-16 | 2008-10-22 | 林仲宇 | Method for on-line card-swiping dual authentication by using telephone number and identification code as network |
| US20100094664A1 (en) | 2007-04-20 | 2010-04-15 | Carfax, Inc. | Insurance claims and rate evasion fraud system based upon vehicle history |
| US7853526B2 (en) | 2007-05-04 | 2010-12-14 | Fair Isaac Corporation | Data transaction profile compression |
| US8058972B2 (en) | 2007-05-09 | 2011-11-15 | University Of North Texas | Methods and devices for enrollment and verification of biometric information in identification documents |
| US10769290B2 (en) | 2007-05-11 | 2020-09-08 | Fair Isaac Corporation | Systems and methods for fraud detection via interactive link analysis |
| US20080288382A1 (en) | 2007-05-15 | 2008-11-20 | Smith Steven B | Methods and Systems for Early Fraud Protection |
| US20090018934A1 (en) | 2007-05-15 | 2009-01-15 | Chaorong Peng | System and Method for defense ID theft attack security service system in marketing environment |
| US7575157B2 (en) | 2007-05-22 | 2009-08-18 | Bank Of America Corporation | Fraud protection |
| US20080294689A1 (en) | 2007-05-23 | 2008-11-27 | Transunion Interactive, Inc., A Delaware Corporation | Credit Report Locking/Unlocking Via Telephone Interface |
| WO2008147918A2 (en) | 2007-05-25 | 2008-12-04 | Experian Information Solutions, Inc. | System and method for automated detection of never-pay data sets |
| US8831941B2 (en) | 2007-05-29 | 2014-09-09 | At&T Intellectual Property Ii, L.P. | System and method for tracking fraudulent electronic transactions using voiceprints of uncommon words |
| US8794524B2 (en) | 2007-05-31 | 2014-08-05 | Toshiba Global Commerce Solutions Holdings Corporation | Smart scanning system |
| US7874488B2 (en) | 2007-05-31 | 2011-01-25 | Red Hat, Inc. | Electronic ink for identity card |
| US7620596B2 (en) | 2007-06-01 | 2009-11-17 | The Western Union Company | Systems and methods for evaluating financial transaction risk |
| CA2690025C (en) | 2007-06-06 | 2014-05-20 | Boldstreet Inc. | Remote service access system and method |
| US7877784B2 (en) | 2007-06-07 | 2011-01-25 | Alcatel Lucent | Verifying authenticity of webpages |
| US7739169B2 (en) | 2007-06-25 | 2010-06-15 | Visa U.S.A. Inc. | Restricting access to compromised account information |
| US8027518B2 (en) | 2007-06-25 | 2011-09-27 | Microsoft Corporation | Automatic configuration of devices based on biometric data |
| US20090024505A1 (en) | 2007-06-28 | 2009-01-22 | Cashedge, Inc. | Global Risk Administration Method and System |
| US8522344B2 (en) | 2007-06-29 | 2013-08-27 | Verizon Patent And Licensing Inc. | Theft of service architectural integrity validation tools for session initiation protocol (SIP)-based systems |
| US20090024663A1 (en) | 2007-07-19 | 2009-01-22 | Mcgovern Mark D | Techniques for Information Security Assessment |
| US20090026270A1 (en) | 2007-07-24 | 2009-01-29 | Connell Ii Jonathan H | Secure checkout system |
| US9194899B2 (en) | 2007-08-13 | 2015-11-24 | Fair Isaac Corporation | Utility network and revenue assurance |
| US8280993B2 (en) | 2007-10-04 | 2012-10-02 | Yahoo! Inc. | System and method for detecting Internet bots |
| US8027947B2 (en) | 2007-10-12 | 2011-09-27 | Fair Isaac Corporation | Rapidly maturing expanded data transaction profiles |
| US20090106846A1 (en) | 2007-10-23 | 2009-04-23 | Identity Rehab Corporation | System and method for detection and mitigation of identity theft |
| US8548903B2 (en) | 2007-10-23 | 2013-10-01 | Trans Union Llc. | Systems and methods for minimizing effects of authorized user credit tradelines |
| US7865439B2 (en) | 2007-10-24 | 2011-01-04 | The Western Union Company | Systems and methods for verifying identities |
| US20090125369A1 (en) | 2007-10-26 | 2009-05-14 | Crowe Horwath Llp | System and method for analyzing and dispositioning money laundering suspicious activity alerts |
| US20090112650A1 (en) | 2007-10-31 | 2009-04-30 | Iwane Donna S | Online method of procuring mortgage loans |
| US8250097B2 (en) | 2007-11-02 | 2012-08-21 | Hue Rhodes | Online identity management and identity verification |
| US7962404B1 (en) | 2007-11-07 | 2011-06-14 | Experian Information Solutions, Inc. | Systems and methods for determining loan opportunities |
| US7653593B2 (en) | 2007-11-08 | 2010-01-26 | Equifax, Inc. | Macroeconomic-adjusted credit risk score systems and methods |
| WO2009064840A1 (en) | 2007-11-13 | 2009-05-22 | Equifax, Inc. | Systems and methods for detecting child identity theft |
| JP5142135B2 (en) | 2007-11-13 | 2013-02-13 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Technology for classifying data |
| US7996521B2 (en) | 2007-11-19 | 2011-08-09 | Experian Marketing Solutions, Inc. | Service for mapping IP addresses to user segments |
| US8751394B2 (en) | 2007-11-28 | 2014-06-10 | Sybase 365, Inc. | System and method for enhanced transaction security |
| US20090141318A1 (en) | 2007-12-03 | 2009-06-04 | Hughes Terence J | Secure scanning system |
| US20090151005A1 (en) | 2007-12-05 | 2009-06-11 | International Business Machines Corporation | Method for identity theft protection with self-destructing information |
| US20110289322A1 (en) | 2007-12-14 | 2011-11-24 | Rasti Mehran | Protected use of identity identifier objects |
| US20090157560A1 (en) | 2007-12-14 | 2009-06-18 | Bank Of America Corporation | Information banking and monetization of personal information |
| US8220034B2 (en) | 2007-12-17 | 2012-07-10 | International Business Machines Corporation | User authentication based on authentication credentials and location information |
| US7546271B1 (en) | 2007-12-20 | 2009-06-09 | Choicepoint Asset Company | Mortgage fraud detection systems and methods |
| US20090182653A1 (en) | 2008-01-07 | 2009-07-16 | Daylight Forensic & Advisory Llc | System and method for case management |
| US8635662B2 (en) | 2008-01-31 | 2014-01-21 | Intuit Inc. | Dynamic trust model for authenticating a user |
| US10430604B2 (en) | 2008-02-05 | 2019-10-01 | Equifax Inc. | Systems and methods for securing data in electronic communications |
| US8782759B2 (en) | 2008-02-11 | 2014-07-15 | International Business Machines Corporation | Identification and access control of users in a disconnected mode environment |
| WO2009102861A1 (en) | 2008-02-12 | 2009-08-20 | Bio-Tech Medical Software, Inc. | System and method for monitoring medication prescriptions using biometric identification and verification |
| US20090222378A1 (en) | 2008-02-29 | 2009-09-03 | American Express Travel Related Services Company, Inc. | Total structural risk model |
| US8458083B2 (en) | 2008-02-29 | 2013-06-04 | American Express Travel Related Services Company, Inc. | Total structural risk model |
| US7849004B2 (en) | 2008-02-29 | 2010-12-07 | American Express Travel Related Services Company, Inc. | Total structural risk model |
| US10510025B2 (en) | 2008-02-29 | 2019-12-17 | Fair Isaac Corporation | Adaptive fraud detection |
| US7814008B2 (en) | 2008-02-29 | 2010-10-12 | American Express Travel Related Services Company, Inc. | Total structural risk model |
| US7853520B2 (en) | 2008-02-29 | 2010-12-14 | American Express Travel Related Services Company, Inc. | Total structural risk model |
| US20090222376A1 (en) | 2008-02-29 | 2009-09-03 | American Express Travel Related Services Company, Inc. | Total structural risk model |
| US8621641B2 (en) | 2008-02-29 | 2013-12-31 | Vicki L. James | Systems and methods for authorization of information access |
| US20090222380A1 (en) | 2008-02-29 | 2009-09-03 | American Express Travel Related Services Company, Inc | Total structural risk model |
| US20090222373A1 (en) | 2008-02-29 | 2009-09-03 | American Express Travel Related Services Company, Inc. | Total structural risk model |
| US20090222308A1 (en) | 2008-03-03 | 2009-09-03 | Zoldi Scott M | Detecting first party fraud abuse |
| US8229191B2 (en) | 2008-03-05 | 2012-07-24 | International Business Machines Corporation | Systems and methods for metadata embedding in streaming medical data |
| US20090224875A1 (en) | 2008-03-06 | 2009-09-10 | Vira Manufacturing, Inc. | System for preventing theft of articles from an enclosure |
| US8805736B2 (en) | 2008-03-08 | 2014-08-12 | Stefan Melik-Aslanian | Fraud prevention and replacement of credit/debit cards—lost, stolen, defective or fraudulently used |
| US20090234738A1 (en) | 2008-03-11 | 2009-09-17 | Zachary Edward Britton | Method and apparatus for targeted advertising based on venue indentification and event criteria |
| US8365246B2 (en) | 2008-03-18 | 2013-01-29 | International Business Machines Corporation | Protecting confidential information on network sites based on security awareness |
| US9130986B2 (en) | 2008-03-19 | 2015-09-08 | Websense, Inc. | Method and system for protection against information stealing software |
| WO2009117518A1 (en) | 2008-03-19 | 2009-09-24 | Experian Information Solutions, Inc. | System and method for tracking and analyzing loans involved in asset-backed securities |
| US20090240609A1 (en) | 2008-03-19 | 2009-09-24 | Soogyung Cho | System and method for tracking and analyzing loans involved in asset-backed securities |
| US8260456B2 (en) | 2008-03-25 | 2012-09-04 | Fasteners For Retail, Inc. | Retail shelf supply monitoring system |
| US8078569B2 (en) | 2008-03-26 | 2011-12-13 | Fair Isaac Corporation | Estimating transaction risk using sub-models characterizing cross-interaction among categorical and non-categorical variables |
| US7844544B2 (en) | 2008-03-28 | 2010-11-30 | American Express Travel Related Services Company, Inc. | Consumer behaviors at lender level |
| US7877323B2 (en) | 2008-03-28 | 2011-01-25 | American Express Travel Related Services Company, Inc. | Consumer behaviors at lender level |
| US20090248573A1 (en) | 2008-03-28 | 2009-10-01 | American Express Travel Related Services Company, Inc. | Consumer behaviors at lender level |
| US20090248572A1 (en) | 2008-03-28 | 2009-10-01 | American Express Travel Related Services Company, Inc. | Consumer behaviors at lender level |
| US7882027B2 (en) | 2008-03-28 | 2011-02-01 | American Express Travel Related Services Company, Inc. | Consumer behaviors at lender level |
| US20090248569A1 (en) | 2008-03-28 | 2009-10-01 | American Express Travel Related Services Company, Inc. | Consumer behaviors at lender level |
| US7805363B2 (en) | 2008-03-28 | 2010-09-28 | American Express Travel Related Services Company, Inc. | Consumer behaviors at lender level |
| US8566256B2 (en) | 2008-04-01 | 2013-10-22 | Certona Corporation | Universal system and method for representing and predicting human behavior |
| US20090254484A1 (en) | 2008-04-03 | 2009-10-08 | Forero Julio C | Anon virtual prepaid internet shopping card |
| US20090254476A1 (en) | 2008-04-04 | 2009-10-08 | Quickreceipt Solutions Incorporated | Method and system for managing personal and financial information |
| US20090259855A1 (en) | 2008-04-15 | 2009-10-15 | Apple Inc. | Code Image Personalization For A Computing Device |
| US8150039B2 (en) | 2008-04-15 | 2012-04-03 | Apple Inc. | Single security model in booting a computing device |
| US20090261189A1 (en) | 2008-04-17 | 2009-10-22 | Ellis Jr William Rogers | Secure, street-side, personal information, mail shredder |
| CN101568119A (en) | 2008-04-24 | 2009-10-28 | 鸿富锦精密工业(深圳)有限公司 | Mobile terminal with antitheft function and antitheft method thereof |
| US8121962B2 (en) | 2008-04-25 | 2012-02-21 | Fair Isaac Corporation | Automated entity identification for efficient profiling in an event probability prediction system |
| US20090271265A1 (en) | 2008-04-28 | 2009-10-29 | Cyndigo, Corp. | Electronic receipt system and method |
| US20090272801A1 (en) | 2008-04-30 | 2009-11-05 | Connell Ii Jonathan H | Deterring checkout fraud |
| US20090281951A1 (en) | 2008-05-09 | 2009-11-12 | Shakkarwar Rajesh G | Payment Processing Platform |
| US11080678B2 (en) | 2008-05-09 | 2021-08-03 | Verient, Inc. | Payment processing platform |
| US8006291B2 (en) | 2008-05-13 | 2011-08-23 | Veritrix, Inc. | Multi-channel multi-factor authentication |
| US20090289110A1 (en) | 2008-05-22 | 2009-11-26 | Paul Regen | Wireless Biometric Computer Mouse with Integrated Credit Card Reader |
| US8037097B2 (en) | 2008-05-30 | 2011-10-11 | Yahoo! Inc. | Universal device identifier for globally identifying and binding disparate device identifiers to the same mobile device |
| US20090307140A1 (en) | 2008-06-06 | 2009-12-10 | Upendra Mardikar | Mobile device over-the-air (ota) registration and point-of-sale (pos) payment |
| EP3553713A1 (en) | 2008-06-12 | 2019-10-16 | Guardian Analytics, Inc. | Modeling users for fraud detection and analysis |
| US20090326972A1 (en) | 2008-06-25 | 2009-12-31 | Keith Anthony Washington | Global identity protector e-commerce payment code certified processing system |
| US8131615B2 (en) | 2008-06-27 | 2012-03-06 | Fair Isaac Corporation | Incremental factorization-based smoothing of sparse multi-dimensional risk tables |
| US8646103B2 (en) | 2008-06-30 | 2014-02-04 | Gabriel Jakobson | Method and system for securing online identities |
| US9390384B2 (en) | 2008-07-01 | 2016-07-12 | The 41 St Parameter, Inc. | Systems and methods of sharing information through a tagless device consortium |
| US7991689B1 (en) | 2008-07-23 | 2011-08-02 | Experian Information Solutions, Inc. | Systems and methods for detecting bust out fraud using credit data |
| TWI426762B (en) | 2008-08-04 | 2014-02-11 | Ind Tech Res Inst | Method and system for managing network identity |
| US8316310B2 (en) | 2008-08-05 | 2012-11-20 | International Business Machines Corporation | System and method for human identification proof for use in virtual environments |
| US8041597B2 (en) | 2008-08-08 | 2011-10-18 | Fair Isaac Corporation | Self-calibrating outlier model and adaptive cascade model for fraud detection |
| US8943549B2 (en) | 2008-08-12 | 2015-01-27 | First Data Corporation | Methods and systems for online fraud protection |
| US20100042526A1 (en) | 2008-08-13 | 2010-02-18 | Martinov Norman P | Credit-debit-chargecard and identity theft fraud prevention method |
| US8069053B2 (en) | 2008-08-13 | 2011-11-29 | Hartford Fire Insurance Company | Systems and methods for de-identification of personal data |
| US8805836B2 (en) | 2008-08-29 | 2014-08-12 | Fair Isaac Corporation | Fuzzy tagging method and apparatus |
| US8355896B2 (en) | 2008-09-02 | 2013-01-15 | Fair Isaac Corporation | Co-occurrence consistency analysis method and apparatus for finding predictive variable groups |
| US20100085146A1 (en) | 2008-09-08 | 2010-04-08 | Linsley Anthony Johnson | JSI residential and commercial access unit (RCA) |
| US8433785B2 (en) | 2008-09-16 | 2013-04-30 | Yahoo! Inc. | System and method for detecting internet bots |
| US8316054B2 (en) | 2008-09-22 | 2012-11-20 | University Of Ottawa | Re-identification risk in de-identified databases containing personal information |
| US20100088338A1 (en) | 2008-10-03 | 2010-04-08 | Pavoni Jr Donald Gordon | Red flag identification verification system and method |
| US8307412B2 (en) | 2008-10-20 | 2012-11-06 | Microsoft Corporation | User authentication management |
| US20100100406A1 (en) | 2008-10-21 | 2010-04-22 | Beng Lim | Method for protecting personal identity information |
| WO2010047801A1 (en) | 2008-10-22 | 2010-04-29 | Azigo, Inc. | Brokered information sharing system |
| US8682785B2 (en) | 2008-10-30 | 2014-03-25 | Bank Of America Corporation | Bank card authorization with balance indicator |
| US8117106B2 (en) | 2008-10-30 | 2012-02-14 | Telesign Corporation | Reputation scoring and reporting system |
| US8060424B2 (en) | 2008-11-05 | 2011-11-15 | Consumerinfo.Com, Inc. | On-line method and system for monitoring and reporting unused available credit |
| US8244643B2 (en) | 2008-11-08 | 2012-08-14 | Fonwallet Transaction Solutions, Inc. | System and method for processing financial transaction data using an intermediary service |
| PL2359290T3 (en) | 2008-11-10 | 2017-09-29 | Censornet A/S | Method and system protecting against identity theft or replication abuse |
| US8621642B2 (en) | 2008-11-17 | 2013-12-31 | Digitalpersona, Inc. | Method and apparatus for an end user identity protection suite |
| US8442824B2 (en) | 2008-11-26 | 2013-05-14 | Nuance Communications, Inc. | Device, system, and method of liveness detection utilizing voice biometrics |
| US8588744B2 (en) | 2008-11-26 | 2013-11-19 | Ringcentral, Inc. | Fraud prevention techniques |
| JP5191376B2 (en) | 2008-12-25 | 2013-05-08 | 株式会社野村総合研究所 | Risk-based authentication system, risk information acquisition server, and risk-based authentication method |
| US8380989B2 (en) | 2009-03-05 | 2013-02-19 | Sybase, Inc. | System and method for second factor authentication |
| US10115153B2 (en) | 2008-12-31 | 2018-10-30 | Fair Isaac Corporation | Detection of compromise of merchants, ATMS, and networks |
| US9100222B2 (en) | 2008-12-31 | 2015-08-04 | Sybase, Inc. | System and method for mobile user authentication |
| WO2010081218A1 (en) | 2009-01-13 | 2010-07-22 | Neville Stephen W | Secure protocol for transactions |
| US20100188684A1 (en) | 2009-01-23 | 2010-07-29 | Kabushiki Kaisha Toshiba | Method and system for identification of scanning/transferring of confidential document |
| US9357384B2 (en) | 2009-02-09 | 2016-05-31 | International Business Machines Corporation | System and method to support identity theft protection as part of a distributed service oriented ecosystem |
| WO2010093770A2 (en) | 2009-02-14 | 2010-08-19 | Net2Text Limited | Secure payment and billing method using mobile phone number or account |
| US20100218255A1 (en) | 2009-02-24 | 2010-08-26 | Keith Adam Ritman | Procedure for the 100% infection free installation/re-installation, patching and maintenance of a personal computers operating system |
| US8090648B2 (en) | 2009-03-04 | 2012-01-03 | Fair Isaac Corporation | Fraud detection based on efficient frequent-behavior sorted lists |
| US12423709B2 (en) | 2009-03-05 | 2025-09-23 | Tara Chand Singhal | System of security that prevents abuse of identity data in global commerce via mobile wireless authorizations |
| US20100250509A1 (en) | 2009-03-27 | 2010-09-30 | Bank Of America Corporation | File scanning tool |
| US7783515B1 (en) | 2009-03-27 | 2010-08-24 | Bank Of America Corporation | Itemized receipt tracking system |
| US9886693B2 (en) | 2009-03-30 | 2018-02-06 | Yuh-Shen Song | Privacy protected anti identity theft and payment network |
| US8447687B2 (en) | 2009-03-30 | 2013-05-21 | Albert OGRODSKI | Method and system for centralized identity and account controls |
| US20100268557A1 (en) | 2009-04-17 | 2010-10-21 | Patrick Faith | Enrollment server |
| US20100275265A1 (en) | 2009-04-27 | 2010-10-28 | Michael Stephen Fiske | System for securing transactions across insecure networks |
| US20100274653A1 (en) | 2009-04-28 | 2010-10-28 | Ayman Hammad | Notification social networking |
| WO2010132492A2 (en) | 2009-05-11 | 2010-11-18 | Experian Marketing Solutions, Inc. | Systems and methods for providing anonymized user profile data |
| US20100293090A1 (en) | 2009-05-14 | 2010-11-18 | Domenikos Steven D | Systems, methods, and apparatus for determining fraud probability scores and identity health scores |
| US20100293114A1 (en) | 2009-05-15 | 2010-11-18 | Mohammed Salahuddin Khan | Real estate investment method for purchasing a plurality of distressed properties from a single institution at formula-derived prices |
| US7690032B1 (en) | 2009-05-22 | 2010-03-30 | Daon Holdings Limited | Method and system for confirming the identity of a user |
| US20100313273A1 (en) | 2009-06-06 | 2010-12-09 | Walter Stewart Freas | Securing or Protecting from Theft, Social Security or Other Sensitive Numbers in a Computerized Environment |
| US20100325035A1 (en) | 2009-06-18 | 2010-12-23 | Nancy Hilgers | Fraud/risk bureau |
| US8020763B1 (en) | 2009-06-30 | 2011-09-20 | Intuit Inc. | Method and system for assessing merchant risk during payment transaction |
| US20100332292A1 (en) | 2009-06-30 | 2010-12-30 | Experian Information Solutions, Inc. | System and method for evaluating vehicle purchase loyalty |
| US8140413B2 (en) | 2009-06-30 | 2012-03-20 | Accenture Global Services Limited | Tax return evaluation system |
| US20110004498A1 (en) | 2009-07-01 | 2011-01-06 | International Business Machines Corporation | Method and System for Identification By A Cardholder of Credit Card Fraud |
| US7865937B1 (en) | 2009-08-05 | 2011-01-04 | Daon Holdings Limited | Methods and systems for authenticating users |
| US10242540B2 (en) | 2009-09-02 | 2019-03-26 | Fair Isaac Corporation | Visualization for payment card transaction fraud analysis |
| US7950577B1 (en) | 2009-09-04 | 2011-05-31 | F3M3 Companies, Inc. | Apparatus, system and method for verifying authorized using an immigration customs visa card |
| US8214285B2 (en) | 2009-10-05 | 2012-07-03 | Cybersource Corporation | Real time adaptive control of transaction review rate score curve |
| US20110126197A1 (en) | 2009-11-25 | 2011-05-26 | Novell, Inc. | System and method for controlling cloud and virtualized data centers in an intelligent workload management system |
| US20110145899A1 (en) | 2009-12-10 | 2011-06-16 | Verisign, Inc. | Single Action Authentication via Mobile Devices |
| JP5165670B2 (en) | 2009-12-25 | 2013-03-21 | ヤフー株式会社 | Unauthorized use determination server and method |
| US8578496B1 (en) | 2009-12-29 | 2013-11-05 | Symantec Corporation | Method and apparatus for detecting legitimate computer operation misrepresentation |
| US8600855B2 (en) | 2010-01-26 | 2013-12-03 | Visa International Service Association | Transaction data repository for risk analysis |
| US10089683B2 (en) | 2010-02-08 | 2018-10-02 | Visa International Service Association | Fraud reduction system for transactions |
| US20110238566A1 (en) | 2010-02-16 | 2011-09-29 | Digital Risk, Llc | System and methods for determining and reporting risk associated with financial instruments |
| US20110295721A1 (en) | 2010-03-01 | 2011-12-01 | Apple Inc. | User information and distribution system |
| EP2548153A1 (en) | 2010-03-16 | 2013-01-23 | Carlo Trugenberger | Authentication system, method for authenticating an object, apparatus for producing an identication device, method for producing an identification device |
| US9652802B1 (en) | 2010-03-24 | 2017-05-16 | Consumerinfo.Com, Inc. | Indirect monitoring and reporting of a user's credit data |
| US8676684B2 (en) | 2010-04-12 | 2014-03-18 | Iovation Inc. | System and method for evaluating risk in fraud prevention |
| US8725613B1 (en) | 2010-04-27 | 2014-05-13 | Experian Information Solutions, Inc. | Systems and methods for early account score and notification |
| US20110260832A1 (en) | 2010-04-27 | 2011-10-27 | Joe Ross | Secure voice biometric enrollment and voice alert delivery system |
| US8296225B2 (en) | 2010-05-20 | 2012-10-23 | Fair Isaac Corporation | Time-efficient and deterministic adaptive score calibration techniques for maintaining a predefined score distribution |
| EP2572338A4 (en) | 2010-05-21 | 2016-04-27 | Hsbc Technology & Services Usa Inc | Account opening computer system architecture and process for implementing same |
| US8364959B2 (en) | 2010-05-26 | 2013-01-29 | Google Inc. | Systems and methods for using a domain-specific security sandbox to facilitate secure transactions |
| WO2011153539A1 (en) | 2010-06-04 | 2011-12-08 | Northwestern University | Pseudonymous public keys based authentication |
| US8260914B1 (en) | 2010-06-22 | 2012-09-04 | Narus, Inc. | Detecting DNS fast-flux anomalies |
| US8489479B2 (en) | 2010-07-29 | 2013-07-16 | Accenture Global Services Limited | Risk scoring system and method for risk-based data assessment |
| US20120030080A1 (en) | 2010-07-29 | 2012-02-02 | Accenture Global Services Gmbh | Systemic Risk Monitoring System And Method For Revenue Agencies |
| WO2012031239A2 (en) | 2010-09-02 | 2012-03-08 | Compass Labs, Inc. | User interest analysis systems and methods |
| US9361597B2 (en) | 2010-10-19 | 2016-06-07 | The 41St Parameter, Inc. | Variable risk engine |
| US20120101938A1 (en) | 2010-10-25 | 2012-04-26 | Sheldon Kasower | Method and system for secure online payments |
| US20120158654A1 (en) | 2010-12-17 | 2012-06-21 | Google Inc. | Receipt storage in a digital wallet |
| US8676726B2 (en) | 2010-12-30 | 2014-03-18 | Fair Isaac Corporation | Automatic variable creation for adaptive analytical models |
| US8613086B2 (en) | 2011-01-31 | 2013-12-17 | Bank Of America Corporation | Ping and scan of computer systems |
| US9235728B2 (en) | 2011-02-18 | 2016-01-12 | Csidentity Corporation | System and methods for identifying compromised personally identifiable information on the internet |
| US8949981B1 (en) | 2011-02-28 | 2015-02-03 | Symantec Corporation | Techniques for providing protection against unsafe links on a social networking website |
| US20120278226A1 (en) | 2011-04-26 | 2012-11-01 | Black Oak Partners, Llc | Systems and methods for using data metrics for credit score analysis |
| US9704195B2 (en) | 2011-08-04 | 2017-07-11 | Fair Isaac Corporation | Multiple funding account payment instrument analytics |
| CN102957652A (en) | 2011-08-22 | 2013-03-06 | 华为技术有限公司 | Secondary carrier activating method, terminal and base station |
| US8819793B2 (en) | 2011-09-20 | 2014-08-26 | Csidentity Corporation | Systems and methods for secure and efficient enrollment into a federation which utilizes a biometric repository |
| US9135306B2 (en) | 2011-12-09 | 2015-09-15 | Tiversa Ip, Inc. | System for forensic analysis of search terms |
| US8918891B2 (en) | 2012-06-12 | 2014-12-23 | Id Analytics, Inc. | Identity manipulation detection system and method |
| US8813228B2 (en) | 2012-06-29 | 2014-08-19 | Deloitte Development Llc | Collective threat intelligence gathering system |
| US10043213B2 (en) | 2012-07-03 | 2018-08-07 | Lexisnexis Risk Solutions Fl Inc. | Systems and methods for improving computation efficiency in the detection of fraud indicators for loans with multiple applicants |
| US10089686B2 (en) | 2012-07-03 | 2018-10-02 | Lexisnexis Risk Solutions Fl Inc. | Systems and methods for increasing efficiency in the detection of identity-based fraud indicators |
| US20160012561A1 (en) | 2014-07-10 | 2016-01-14 | Lexisnexis Risk Solutions Fl Inc. | Systems and Methods for Detecting Identity Theft of a Dependent |
| US20150199784A1 (en) | 2012-07-03 | 2015-07-16 | Lexisnexis Risk Solutions Fl Inc. | Systems and Methods For Estimating Probability Of Identity-Based Fraud |
| US20140058910A1 (en) | 2012-08-21 | 2014-02-27 | Gary E. Abeles | Method for detecting identity misrepresentation in fraudulent tax returns |
| US9953321B2 (en) | 2012-10-30 | 2018-04-24 | Fair Isaac Corporation | Card fraud detection utilizing real-time identification of merchant test sites |
| US9367520B2 (en) | 2012-12-20 | 2016-06-14 | Fair Isaac Corporation | Scorecard models with measured variable interactions |
| US9489497B2 (en) | 2012-12-28 | 2016-11-08 | Equifax, Inc. | Systems and methods for network risk reduction |
| US8812387B1 (en) | 2013-03-14 | 2014-08-19 | Csidentity Corporation | System and method for identifying related credit inquiries |
| US9965937B2 (en) | 2013-03-15 | 2018-05-08 | Palantir Technologies Inc. | External malware data item clustering and analysis |
| US9280658B2 (en) | 2013-03-15 | 2016-03-08 | Stephen Coggeshall | System and method for systematic detection of fraud rings |
| WO2014150987A1 (en) | 2013-03-22 | 2014-09-25 | Lexisnexis Risk Solutions Fl Inc. | Systems and methods for identifying entites using geographical and social mapping |
| US9191403B2 (en) | 2014-01-07 | 2015-11-17 | Fair Isaac Corporation | Cyber security adaptive analytics threat monitoring system and method |
| US9210156B1 (en) * | 2014-06-16 | 2015-12-08 | Lexisnexis Risk Solutions Inc. | Systems and methods for multi-stage identity authentication |
| US10373061B2 (en) | 2014-12-10 | 2019-08-06 | Fair Isaac Corporation | Collaborative profile-based detection of behavioral anomalies and change-points |
| CN104877993B (en) | 2015-04-24 | 2018-01-16 | 浙江省农业科学院 | Two kinds of plant eIF4A genes and its application for the water-fast cercosporiosis of rice poisonous plant body of prepare transgenosis |
| US10528948B2 (en) | 2015-05-29 | 2020-01-07 | Fair Isaac Corporation | False positive reduction in abnormality detection system models |
| US10178121B2 (en) | 2015-10-01 | 2019-01-08 | Michael Klatt | Domain reputation evaluation process and method |
| US10579938B2 (en) | 2016-01-20 | 2020-03-03 | Fair Isaac Corporation | Real time autonomous archetype outlier analytics |
| US10872389B2 (en) * | 2016-03-15 | 2020-12-22 | Hrb Innovations, Inc. | Taxpayer identity determination through external verfication |
| US20170374076A1 (en) | 2016-06-28 | 2017-12-28 | Viewpost Ip Holdings, Llc | Systems and methods for detecting fraudulent system activity |
| US10791136B2 (en) | 2017-03-20 | 2020-09-29 | Fair Isaac Corporation | System and method for empirical organizational cybersecurity risk assessment using externally-visible data |
| US11100506B2 (en) | 2017-05-09 | 2021-08-24 | Fair Isaac Corporation | Fraud score manipulation in self-defense of adversarial artificial intelligence learning |
| ES2975067T3 (en) | 2017-06-30 | 2024-07-03 | Equifax Inc | Detection of online synthetic entities facilitated by primary entities |
| US11636485B2 (en) | 2018-04-06 | 2023-04-25 | Fair Isaac Corporation | Efficient parallelized computation of global behavior profiles in real-time transaction scoring systems |
-
2018
- 2018-11-13 US US16/189,990 patent/US10896472B1/en active Active
-
2022
- 2022-09-21 US US17/934,038 patent/US20230245246A1/en not_active Abandoned
-
2024
- 2024-03-21 US US18/612,735 patent/US20240311927A1/en not_active Abandoned
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20040205008A1 (en) * | 2004-03-29 | 2004-10-14 | Haynie Robert M. | Systems and methods for computing cash flows |
| US20140214636A1 (en) * | 2013-01-29 | 2014-07-31 | Iguehi Rajsky | Remote tax return system |
| US20160063645A1 (en) * | 2014-08-29 | 2016-03-03 | Hrb Innovations, Inc. | Computer program, method, and system for detecting fraudulently filed tax returns |
| US10339527B1 (en) * | 2014-10-31 | 2019-07-02 | Experian Information Solutions, Inc. | System and architecture for electronic fraud detection |
| US10482542B1 (en) * | 2015-10-23 | 2019-11-19 | Hrb Innovations, Inc. | Tax fraud detection through linked relationships |
| US11087334B1 (en) * | 2017-04-04 | 2021-08-10 | Intuit Inc. | Method and system for identifying potential fraud activity in a tax return preparation system, at least partially based on data entry characteristics of tax return content |
Non-Patent Citations (1)
| Title |
|---|
| Torgler, Benno. "What do we know about tax fraud? An overview of recent developments." Social Research (2008): 1239-1270. (Year: 2008) * |
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US12045755B1 (en) | 2011-10-31 | 2024-07-23 | Consumerinfo.Com, Inc. | Pre-data breach monitoring |
| US11941635B1 (en) | 2014-10-31 | 2024-03-26 | Experian Information Solutions, Inc. | System and architecture for electronic fraud detection |
| US12099940B1 (en) | 2015-07-02 | 2024-09-24 | Experian Information Solutions, Inc. | Behavior analysis using distributed representations of event data |
| US12455978B1 (en) | 2017-09-28 | 2025-10-28 | Csidentity Corporation | Identity security architecture systems and methods |
| US12430646B2 (en) | 2021-04-12 | 2025-09-30 | Csidentity Corporation | Systems and methods of generating risk scores and predictive fraud modeling |
Also Published As
| Publication number | Publication date |
|---|---|
| US10896472B1 (en) | 2021-01-19 |
| US20240311927A1 (en) | 2024-09-19 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20240311927A1 (en) | Security and identity verification system and architecture | |
| US11941635B1 (en) | System and architecture for electronic fraud detection | |
| US12190327B1 (en) | Adjustment of knowledge-based authentication | |
| US11748717B2 (en) | Systems and methods for distributing personally identifiable information across geographic boundaries | |
| US11290441B1 (en) | Systems and methods for blockchain validation of user identity and authority | |
| CN110688425B (en) | Method and system for conditionally deferring transactions for blockchains | |
| US20240171377A1 (en) | Systems and methods for generating a blockchain-based user profile | |
| US8793804B2 (en) | Computer implemented method, computer system and nontransitory computer readable storage medium having HTTP module | |
| US9652802B1 (en) | Indirect monitoring and reporting of a user's credit data | |
| US11080375B2 (en) | Policy based adaptive identity proofing | |
| WO2020051154A1 (en) | Authenticated access and aggregation database platform | |
| US9197648B2 (en) | System and method for verifying the identity of an internet user | |
| US20200265442A1 (en) | System and method for a vehicle customer support blockchain-based platform | |
| US11451538B2 (en) | Methods and systems of authenticating of personal communications | |
| Smith | Control and Security of E-commerce | |
| US20070271221A1 (en) | Securing social security numbers with pins | |
| US12236427B2 (en) | Systems and methods for automated validation for proprietary security implementations | |
| HK40063990A (en) | Information processing method, system and device, electronic equipment and storage medium | |
| CN113810192A (en) | Information processing method, system and device, electronic equipment and storage medium |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
| STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |