1
Tuomas Aura: Method for user identity protection. Nokia Networks Oy, Altera Law Group, April 16, 2002: US06373949 (33 worldwide citation)

In the method in accordance with the present invention, the subscriber identifier to be sent to the transmission network is encrypted using a cipher key common to a specific group of subscribers, and a random number is attached to the identifier to be sent to the network. For example, a subscriber g ...


2
Randolph W McKernan, Christian Christmas: Identity protection method for use with wireless telephone systems. August 5, 1997: US05655019 (25 worldwide citation)

A cellular phone identity protection system that protects the identities of cellular telephones as they initiate calls through a cellular telephone system. The identity protection is provided through the use of jamming techniques and intentional false and tagged identity transmissions designed to pr ...


3
Michael Burger, Mark Joseph Kapczynski: Systems and methods of identity protection and management. CONSUMERINFO COM, Knobbe Martens Olson & Bear, August 11, 2015: US09106691 (21 worldwide citation)

In an embodiment, a computing system, such as a monitoring computer, receives a request from a user to monitor an account of the user with an online service provider. The request may include personal information and user preferences for one or more protective actions. The system periodically monitor ...


4
Michael F Buhrmann, Randall A Snyder, Charles L Dennis, Robert C Boxberger, William M Ferguson: System and method for mobile identity protection of a user of multiple computer applications, networks or devices. Finsphere, Foster Pepper PLLC, Richard T Black, February 14, 2012: US08116731 (20 worldwide citation)

An automated system and method for authenticating entities or individuals engaging in automated or electronic transactions or activities such as financial transactions, accessing computer applications, computer software, data networks or other automated or electronic devices requiring identity verif ...


5
David M Raihi, Joseph Adler, Siddharth Bajaj, Nicolas Popp, Kerry E Loftus, Bruce Ong, Alin M Mutu, Jeffrey Burstein, Yueqin Lin: System and method for network-based fraud and authentication services. Symantec Software Corporation, Townsend and Townsend and Crew, December 28, 2010: US07861286 (15 worldwide citation)

A system and method for providing identity protection services. According to an embodiment, a validation server receives over a network a response from a credential associated with a user, the credential response provided by the user in order to authenticate the user to one of a plurality of sites o ...


6
Randall A Snyder, Devin P Miller, William M Ferguson: System and method for identity protection using mobile device signaling network derived location pattern recognition. Finsphere Corporation, Foster Pepper PLLC, Richard T Black, P G Scott Born, October 2, 2012: US08280348 (10 worldwide citation)

A system and method for recognizing patterns in wireless device locations using wireless device location data derived from a communications signaling network is provided. By using wireless network supported signaling operations and messages, location data concerning the whereabouts of wireless devic ...


7
Arkady G Zilberman: User input authentication and identity protection. April 20, 2010: US07701364 (8 worldwide citation)

A method and system for user authentication and identity theft protection. A typing typeprint is used to validate users for access to a computer system. The typeprint may also include a watermark, a timestamp, or voice stamp for further security. The method and system provide multi-modal biometric p ...


8
Michael F Buhrman, Randall A Snyder, Charles L Dennis, Robert C Boxberger, William M Ferguson: System and method for mobile identity protection of a user of multiple computer applications, networks or devices. Finsphere Corporation, Foster Pepper PLLC, Richard T Black, P G Scott Born, November 19, 2013: US08588748 (7 worldwide citation)

An automated system and method for authenticating entities or individuals engaging in automated or electronic transactions or activities such as financial transactions, accessing computer applications, computer software, data networks or other automated or electronic devices requiring identity verif ...


9
Steven D Domenikos, Stamatis Astras, Iris Seri: Identity protection. IndentityTruth, Winstead PC, January 22, 2013: US08359278 (6 worldwide citation)

In general, in one aspect, the invention relates to a system for providing identity protection that, in one embodiment, includes a fraud model for specifying patterns of events indicative of identity fraud and a business rules subsystem used to identify fraud that is specified by the fraud models. T ...


10
Gregory Howard Wolfond, Jaime Shapiro, Robert Paul Mansz: Multi-mode credential authorization. Authenticor Identity Protection Services, Greenberg Traurig, May 10, 2011: US07941835 (5 worldwide citation)

A method for authenticating an identity involves first receiving a first credential over a first communications channel, and determining a second communications channel provisionally associated with the first credential. The second communications channel is different from the first communications ch ...



Click the thumbnails below to visualize the patent trend.