WO2014182801A4 - Privacy protection system and method - Google Patents

Privacy protection system and method Download PDF

Info

Publication number
WO2014182801A4
WO2014182801A4 PCT/US2014/037130 US2014037130W WO2014182801A4 WO 2014182801 A4 WO2014182801 A4 WO 2014182801A4 US 2014037130 W US2014037130 W US 2014037130W WO 2014182801 A4 WO2014182801 A4 WO 2014182801A4
Authority
WO
WIPO (PCT)
Prior art keywords
user
information sources
identification data
records
subscriber
Prior art date
Application number
PCT/US2014/037130
Other languages
French (fr)
Other versions
WO2014182801A2 (en
WO2014182801A3 (en
WO2014182801A9 (en
Inventor
Llc De Beasley Group
Raymond De Beasley
Original Assignee
Llc De Beasley Group
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Llc De Beasley Group filed Critical Llc De Beasley Group
Publication of WO2014182801A2 publication Critical patent/WO2014182801A2/en
Publication of WO2014182801A9 publication Critical patent/WO2014182801A9/en
Publication of WO2014182801A3 publication Critical patent/WO2014182801A3/en
Publication of WO2014182801A4 publication Critical patent/WO2014182801A4/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/40User authentication by quorum, i.e. whereby two or more security principals are required
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/042Payment circuits characterized in that the payment protocol involves at least one cheque
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)
  • Telephonic Communication Services (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Disclosed herein are privacy protection systems and related methods for providing subscribers of the system or method, such as credit card issuers, banks, etc., independent verification of the identity of individuals attempting to do business with the subscriber. The independent verification disclosed herein does not rely solely on the information accessible or maintained by an entity that issued a piece of identification data to the individual.

Claims

AMENDED CLAIMS received by the International Bureau on 10 February 2015 (10.02.2015) CLAIMS What is claimed is:
1. A privacy protection method, comprising:
registering a subscriber, wherein the subscriber provides goods or services to users; receiving identification data purported to identify a user of the subscriber's goods or services;
accessing at least two information sources having records related to the
identification data, wherein the at least two information sources are unrelated to one another;
determining if the identification data accurately identifies the user using one or more of the related records from each of the at least two information sources;
verifying the identity of the user to the subscriber based on the determination;
receiving information regarding one or more unverified accounts after verifying the identity of the user; and
verifying the one or more accounts is correctly associated with the user with verified identity based on the received information.
2. The method of claim 1, wherein one of the at least two information sources is associated with an entity responsible for maintaining records related to the identification data of the user.
3. The method of claim 1, wherein the identification data comprises at least a finger print of the user.
4. The method of claim 1, wherein the identification data comprises at least a photo of the user.
5. The method of claim 4, wherein the determining comprising comparing the photo of the user to an image on a state identification card in one of the records of the at least two information sources and issued in the name of the user.
6. The method of claim 1, wherein the identification data comprises at least a social security number of the user.
7. The method of claim 6, wherein the determining comprises accessing one or more records found from one of the at least two information sources to determine whether the social security number has been reported stolen.
8. The method of claim 7, the determining comprises accessing one or more records from one of the at least two information sources to determine whether the social security number has been associated with a deceased person .
9. The method of claim 7, wherein the determining comprises accessing one or more records from one of the at least two information sources to determine whether the social security number is issued to at least a legalized citizen.
10. The method of claim 1, wherein the determining comprises determining if one or more records from one of the at least two information sources comprise a financial account of a utility associated with a residential address of the user and is less than three years old, and wherein the verifying comprises thereafter verifying the identity of the user if the financial account is determined to be greater than three years old.
11. A privacy protection system, comprising:
a control center configured to register a subscriber providing goods or services to users to the privacy protection system;
a registration center associated with the control center and configured to receive identification data from a user purported to identify a user of a subscriber's goods or services;
wherein the control center is configured to:
access at least two information sources having records related to the identification data, wherein the at least two information sources are unrelated to one another,
determine if the identification data accurately identifies the user using one or more of the related records from each of the at least two information sources, and verify the identity of the user to the subscriber based on the determination; and at least one kiosk in communication with the control center and the registration center, wherein the kiosk is operable by the user with verified identity to provide the system information regarding one or more unverified accounts, and wherein the control center is further configured to receive the information from the kiosk and to verify the one or more accounts is correctly
33 associated with the user based on the information.
12. The system of claim 11, wherein one of the at least two information sources is associated with an entity responsible for maintaining records related to the identification data of the user.
13. The system of claim 11, wherein the identification data comprises one or more of a finger print of the user, a photo of the user, or a social security number of the user.
14. The system of claim 11, wherein at least one of the one or more related records from either of the at least two information sources comprises a financial account of a utility associated with a residential address of the user and is less than three years old, and wherein the control center is further configured to verify the identity of the user if the financial account is determined to be greater than three years old.
15. The system of claim 11, wherein the kiosk comprises one or more of a finger print scanner, a keypad, or magnetic card strip reader.
16. A privacy protection method, comprising:
providing a check having a check number and issued in the name of a user;
generating a unique security number and a unique security code for the check; storing the check number, security number and security code in a database; and providing access to the database to a subscriber of the privacy protection method
34 such that the subscriber may verify the authenticity of the check, when presented to the subscriber for payment, based on a comparison of at least the security number and security code on the check with the security number and security code stored in the database.
17. The method of claim 16, further comprising randomly generating the security number and the security code.
18. The method of claim 16, further comprising assigning a pin number to the check.
19. The method of claim 16, further comprising displaying the security number and security code on the check in a bar code format.
20. The method of claim 16, further comprising assigning an identification number associated with the user to the check.
35
PCT/US2014/037130 2013-05-07 2014-05-07 Privacy protection system and method WO2014182801A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201361820408P 2013-05-07 2013-05-07
US61/820,408 2013-05-07

Publications (4)

Publication Number Publication Date
WO2014182801A2 WO2014182801A2 (en) 2014-11-13
WO2014182801A9 WO2014182801A9 (en) 2014-12-31
WO2014182801A3 WO2014182801A3 (en) 2015-03-05
WO2014182801A4 true WO2014182801A4 (en) 2015-04-16

Family

ID=51867860

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2014/037130 WO2014182801A2 (en) 2013-05-07 2014-05-07 Privacy protection system and method

Country Status (1)

Country Link
WO (1) WO2014182801A2 (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070033139A1 (en) * 2005-08-08 2007-02-08 Brad Handler Credit applicant and user authentication solution
US20070277244A1 (en) * 2006-05-23 2007-11-29 The De Beasley Group, Llc. Privacy protection system and method
US8711751B2 (en) * 2009-09-25 2014-04-29 Apple Inc. Methods and apparatus for dynamic identification (ID) assignment in wireless networks
US8265602B2 (en) * 2009-12-15 2012-09-11 At&T Mobility Ii Llc Visual voicemail privacy protection

Also Published As

Publication number Publication date
WO2014182801A2 (en) 2014-11-13
WO2014182801A3 (en) 2015-03-05
WO2014182801A9 (en) 2014-12-31

Similar Documents

Publication Publication Date Title
US10320807B2 (en) Systems and methods relating to the authenticity and verification of photographic identity documents
US10607211B2 (en) Method for authenticating a user to a machine
US8625838B2 (en) Cardless financial transactions system
CN101783039B (en) Method and terminal for controlling security of financial transactions
US20110302089A1 (en) Electronic credit card with fraud protection
US20140297527A1 (en) System and method for location based validation via mobile device
CN104715371A (en) Safe payment method adopting voiceprint to identify identity and corresponding system
JP2009535900A (en) Privacy-enhanced identifier scheme using non-linkable identifiers
US20150235226A1 (en) Method of Witnessed Fingerprint Payment
US20150161595A1 (en) Digital payment card presentation systems, methods, and apparatuses
US20060179481A1 (en) System and method for automatic verification of the holder of an authorisation document
JP4890774B2 (en) Financial transaction system
US20130046689A1 (en) System and Method for Facilitating Transactions
CN104410968A (en) Portable universal integrated circuit card (UICC) subscriber terminal equipment and identity authentication system thereof
CN105847270A (en) Loan authentication system
JP2011164880A (en) Device for management of fund transfer transaction
US20230139948A1 (en) Authentication system, authentication method and program
CN105354471A (en) Financial transaction security control method
WO2014182801A4 (en) Privacy protection system and method
US20240202743A1 (en) Learning model evaluation system, learning model evaluation method, and program
US10650381B2 (en) Method for detecting a risk of substitution of a terminal, corresponding device, program and recording medium
JP6270005B1 (en) Magnetic recording card and information verification system
KR101152892B1 (en) Method and apparatus for mmanaging withdrawal with bank card
CN107294909B (en) Electronic identity real-name authentication product and method
CN109146022A (en) Method and system based on living things feature recognition identity information

Legal Events

Date Code Title Description
DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
NENP Non-entry into the national phase in:

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 14.04.16)

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14794596

Country of ref document: EP

Kind code of ref document: A2

122 Ep: pct application non-entry in european phase

Ref document number: 14794596

Country of ref document: EP

Kind code of ref document: A2