Information security – Access control or authentication – Network
Reexamination Certificate
2007-07-03
2007-07-03
Revak, Christopher (Department: 2131)
Information security
Access control or authentication
Network
C726S007000, C726S021000, C705S064000, C705S072000, C705S075000, C705S076000
Reexamination Certificate
active
09679916
ABSTRACT:
Registered users including businesses attach a one-time-use identity verifier to as many financial and other transactions as they choose to protect themselves from identity thieves. They may also attach a security message to any identity verifier to ensure that a thief cannot steal a registered user's check from a mailbox and use the unused identity verifier. By using one list for all of a person's transactions, applications for new credit by identity thieves are also prevented. All of this is made possible by allowing the identity verifiers to be approved nonsequentially.
REFERENCES:
patent: 3985998 (1976-10-01), Crafton
patent: 4013894 (1977-03-01), Foote et al.
patent: 4025759 (1977-05-01), Scheffel
patent: 4109238 (1978-08-01), Creekmore
patent: 4123747 (1978-10-01), Lancto et al.
patent: 4186871 (1980-02-01), Anderson et al.
patent: 4472626 (1984-09-01), Frid
patent: 4601011 (1986-07-01), Grynberg
patent: 4630201 (1986-12-01), White
patent: 4933969 (1990-06-01), Marshall et al.
patent: 4967366 (1990-10-01), Kaehler
patent: 4998279 (1991-03-01), Weiss
patent: 5019942 (1991-05-01), Clemens
patent: 5097505 (1992-03-01), Weiss
patent: 5103221 (1992-04-01), Memmola
patent: 5131038 (1992-07-01), Puhl et al.
patent: 5144667 (1992-09-01), Pogue, Jr. et al.
patent: 5224173 (1993-06-01), Kuhns et al.
patent: 5283829 (1994-02-01), Anderson
patent: 5285200 (1994-02-01), Kuriyama
patent: 5321751 (1994-06-01), Ray et al.
patent: 5337358 (1994-08-01), Axelrod et al.
patent: 5367572 (1994-11-01), Weiss
patent: 5524072 (1996-06-01), Labaton et al.
patent: 5534855 (1996-07-01), Shockley et al.
patent: 5553155 (1996-09-01), Kuhns et al.
patent: 5630201 (1997-05-01), Suzuki et al.
patent: 5638444 (1997-06-01), Chou et al.
patent: 5661807 (1997-08-01), Guski et al.
patent: 5680131 (1997-10-01), Utz
patent: 5721779 (1998-02-01), Funk
patent: 5754653 (1998-05-01), Canfield
patent: 5770844 (1998-06-01), Henn
patent: 5812764 (1998-09-01), Heinz, Sr.
patent: 5864623 (1999-01-01), Messina et al.
patent: 5864829 (1999-01-01), Tago
patent: 5883810 (1999-03-01), Franklin et al.
patent: 5890140 (1999-03-01), Clark et al.
patent: 5955961 (1999-09-01), Wallerstein
patent: 5956699 (1999-09-01), Wong et al.
patent: 5971272 (1999-10-01), Hsiao
patent: 5991750 (1999-11-01), Watson
patent: 6011858 (2000-01-01), Stock et al.
patent: 6014650 (2000-01-01), Zampese
patent: 6016480 (2000-01-01), Houvener et al.
patent: 6040783 (2000-03-01), Houvener et al.
patent: 6044362 (2000-03-01), Neely
patent: 6047268 (2000-04-01), Bartoli et al.
patent: 6047270 (2000-04-01), Joao et al.
patent: 6047281 (2000-04-01), Wilson et al.
patent: 6052675 (2000-04-01), Checchio
patent: 6070141 (2000-05-01), Houvener et al.
patent: 6081793 (2000-06-01), Challener et al.
patent: 6092196 (2000-07-01), Reiche
patent: 6095413 (2000-08-01), Tetro et al.
patent: 6105007 (2000-08-01), Norris
patent: 6105010 (2000-08-01), Musgrave
patent: 6105011 (2000-08-01), Morrison, Jr.
patent: 6112078 (2000-08-01), Sormunen et al.
patent: 6122624 (2000-09-01), Tetro et al.
patent: 6154879 (2000-11-01), Pare et al.
patent: 6236972 (2001-05-01), Shkedy
patent: 6636833 (2003-10-01), Flitcroft et al.
patent: 6796494 (2004-09-01), Gonzalo
patent: 6908030 (2005-06-01), Rajasekaran et al.
patent: 6957185 (2005-10-01), Labaton
patent: 2001/0037451 (2001-11-01), Bhagavatula et al.
patent: 2001/0047281 (2001-11-01), Keresman et al.
patent: 2002/0052214 (2002-05-01), Maggenti et al.
patent: WO97/04394 (1997-02-01), None
patent: WO99/56520 (1999-11-01), None
Wahab et al, Biometrics Electronic Purse, 1999, IEEE, pp. 958-961.
Sanchez-Reillo, Raul, Smart Card Information and Operations using Biometrics, 2001, IEEE, pp. 3-6.
Anonymous, CIC Annouces SignatureOne, Jan. 2004, PR Newswire, pp. 1-3.
Kroenke, D. et al., “Secondary-key Representations”,Database Processing and Fundamentals, Design, Implementation, 3rd Edition, Science Research Assoc., Inc., (an IBM Company), Chicago, pp. 657-664 (1988, 1983, 1977).
Tanenbaum, A., “Security”,Operating Systems: Design and Implementation, Prentice-Hall, Inc., (a Division of Simon & Schuster), Englewood Cliffs, NJ, pp. 285-289 (1987).
Merchant & Gould P.C.
Moorthy Aravind K
Revak Christopher
LandOfFree
System and method for thwarting identity theft and other... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for thwarting identity theft and other..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for thwarting identity theft and other... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3731135