1
Harold E Gottschalk Jr: Systems and methods for secure and efficient enrollment into a federation which utilizes a biometric repository. CSIdentity Corporation, Winstead PC, August 26, 2014: US08819793 (3 worldwide citation)

A method includes receiving data related to an individual, the data comprising a plurality of elements of personally-identifying information (PII). The method further includes building, via the plurality of elements of the PII, a compositional key for the individual. In addition, the method includes ...


2
GOTTSCHALK Harold E Jr, CALDWELL Michael, CARLETON Joel: SYSTÈME ET PROCÉDÉS PERMETTANT DIDENTIFIER DES INFORMATIONS DIDENTIFICATION PERSONNELLE COMPROMISES SUR INTERNET, SYSTEM AND METHODS FOR IDENTIFYING COMPROMISED PERSONALLY IDENTIFIABLE INFORMATION ON THE INTERNET. CSIDENTITY CORPORATION, GOTTSCHALK Harold E Jr, CALDWELL Michael, CARLETON Joel, ROBINSON Ross T, August 23, 2012: WO/2012/112781 (2 worldwide citation)

In one embodiment, a method includes generating, by a computer system, a search-engine query from stored identity-theft nomenclature. The method also includes querying, by the computer system, at least one search engine via the search-engine query. Further, the method includes crawling, by the compu ...


3
Harold E Gottschalk Jr, Michael Caldwell, Joel Carleton: System and methods for identifying compromised personally identifiable information on the internet. CSIdentity Corporation, Knobbe Martens Olson & Bear, July 18, 2017: US09710868

In one embodiment, a method includes generating, by a computer system, a search-engine query from stored identity-theft nomenclature. The method also includes querying, by the computer system, at least one search engine via the search-engine query. Further, the method includes crawling, by the compu ...


4
Harold E Gottschalk Jr, Michael Caldwell, Joel Carleton: System and methods for identifying compromised personally identifiable information on the internet. CSIDENTITY CORPORATION, Winstead PC, January 31, 2017: US09558368

In one embodiment, a method includes generating, by a computer system, a search-engine query from stored identity-theft nomenclature. The method also includes querying, by the computer system, at least one search engine via the search-engine query. Further, the method includes crawling, by the compu ...


5
Harold E Gottschalk Jr: Systems and methods for secure and efficient enrollment into a federation which utilizes a biometric repository. CSIDENTITY CORPORATION, Winstead PC, January 12, 2016: US09237152

A method includes receiving data related to an individual, the data comprising a plurality of elements of personally-identifying information (PII). The method further includes building, via the plurality of elements of the PII, a compositional key for the individual. In addition, the method includes ...


6
Harold E Gottschalk Jr, Michael Caldwell, Joel Carleton: System and methods for identifying compromised personally identifiable information on the internet. CSIDENTITY CORPORATION, Winstead PC, January 12, 2016: US09235728

In one embodiment, a method includes generating, by a computer system, a search-engine query from stored identity-theft nomenclature. The method also includes querying, by the computer system, at least one search engine via the search-engine query. Further, the method includes crawling, by the compu ...


7
Steven E Samler, Matthew Hall: System and method for identifying related credit inquiries. Csidentity Corporation, Winstead PC, August 19, 2014: US08812387

In one embodiment, a method includes receiving a credit inquiry for a monitored consumer. The method further includes performing at least one credit-inquiry analysis on the credit inquiry. The performing yields at least one of a matched creditor from master creditor records and an inferred credit ca ...


8
Steven E Samler, Matthew Hall: System and method for identifying related credit inquiries. CSIDENTITY CORPORATION, Winstead PC, March 14, 2017: US09595066

In one embodiment, a method includes receiving a credit inquiry for a monitored consumer. The method further includes performing at least one credit-inquiry analysis on the credit inquiry. The performing yields at least one of a matched creditor from master creditor records and an inferred credit ca ...


9
ROSS Joe, CHAPA Isaac, CRUZ Adrian, GOTTSCHALK Harold E Jr: Système de distribution dalertes vocales et dinscription biométriques vocales sûres, Secure voice biometric enrollment and voice alert delivery system. Csidentity Corporation, ROSS Joe, CHAPA Isaac, CRUZ Adrian, GOTTSCHALK Harold E Jr, ROBINSON Ross T, November 10, 2011: WO/2011/139689

In one embodiment, a method includes enrolling a potential enrollee for an identity-monitoring service. The enrolling includes acquiring personally-identifying information (PII) and capturing a voiceprint. Following successful completion of the enrolling, the potential enrollee is an enrollee. The m ...


10
SYSTEM AND METHOD OF DELAYED BILLING FOR ON-DEMAND PRODUCTS. CSIDENTITY CORPORATION, September 18, 2014: US20140279467-A1

In one embodiment, a method includes receiving a binding request for an on-demand identity product from a consumer. The method also includes attempting to provide the on-demand identity product. The method further includes, responsive to the binding request, ascertaining delayed-billing settings tha ...



Click the thumbnails below to visualize the patent trend.